Bug 1181362 - (CVE-2020-35513) VUL-1: CVE-2020-35513: kernel: nfsd failure to clear umask after processing an open or create
(CVE-2020-35513)
VUL-1: CVE-2020-35513: kernel: nfsd failure to clear umask after processing a...
Status: RESOLVED INVALID
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P4 - Low : Minor
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/276218/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-01-25 13:47 UTC by Wolfgang Frisch
Modified: 2021-01-25 17:52 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Wolfgang Frisch 2021-01-25 13:47:12 UTC
rh#1911309

A flaw was found in nfsd. A failure to clear umask after processing an open or create operation results in wrong permissions on a newly-created objects. 

References:
https://patchwork.kernel.org/project/linux-nfs/patch/20180403203916.GH20297@fieldses.org/
https://bugzilla.redhat.com/show_bug.cgi?id=1911309
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35513
Comment 1 Takashi Iwai 2021-01-25 14:42:48 UTC
Do I understand correctly that the problem was fixed by the upstream commit 880a3a5325489a143269a8e172e7563ebf9897bc
    nfsd: fix incorrect umasks
in March 2018 (in 4.17 kernel)?

The umask was introduced in 4.10 kernel and not backported to SLE 4.4 kernels, so our old branches are unaffected, and cve/linux-4.12 already contains the fix (backported via git-fixes).
Comment 2 Wolfgang Frisch 2021-01-25 17:52:15 UTC
(In reply to Takashi Iwai from comment #1)
> Do I understand correctly that the problem was fixed by the upstream commit
> 880a3a5325489a143269a8e172e7563ebf9897bc
>     nfsd: fix incorrect umasks
> in March 2018 (in 4.17 kernel)?
> 
> The umask was introduced in 4.10 kernel and not backported to SLE 4.4
> kernels, so our old branches are unaffected, and cve/linux-4.12 already
> contains the fix (backported via git-fixes).

That's how I read it as well. Thanks for the analysis.