oss-sec mailing list archives

Re: Vulnerability in the Linux Audit Framework Auditd


From: Salvatore Bonaccorso <carnil () debian org>
Date: Thu, 25 Feb 2021 21:48:38 +0100

Hi,

On Thu, Feb 18, 2021 at 03:52:54PM +0000, Felix Kosterhon wrote:
Hello Mr. Grubb,
 
thank you for your insight.
First and foremost we would like to clarify that our intent is not
to put blame on anyone but to improve the level of security for the
affected systems and the organisations utilising Auditd.
According to the rules.conf manual page, file-watch rules are meant
to monitor any accesses to files based on their permission level.
For the syscalls mentioned in this report this is not the case.
 
RedHat Inc. shares our perspective on this issue and has assigned a
CVE for the vulnerability. Additionally they informed us that they
will work together with the Upstream Linux Kernel Developers on
behalf of fixing this issue.

Is there a reference to this which can be followed/tracked? Asking
because the Red Hat bugzilla entry for CVE-2020-35501 for now would
still be restricted, but would like to get a better idea on how to
track this issue within Debian.

Regards,
Salvatore


Current thread: