carnil> Issue introduced with 855b7717f44b1 ("nvme: fine-granular carnil> CAP_SYS_ADMIN for nvme io commands") in 6.2-rc1. carnil> To exploit the issue it's still required that root changes the carnil> device node persmissions. Though this was allowed unter the carnil> assumtion it was safe to allow (which turns out not to be).
Branch | Status |
---|---|
4.19-buster-security | N/A "Vulnerable code not present" |
4.19-upstream-stable | N/A "Vulnerable code not present" |
5.10-bullseye-security | N/A "Vulnerable code not present" |
5.10-upstream-stable | N/A "Vulnerable code not present" |
6.1-bookworm-security | N/A "Vulnerable code not present" |
6.1-upstream-stable | N/A "Vulnerable code not present" |
6.6-upstream-stable | unknown |
6.8-upstream-stable | unknown |
sid | needed |
upstream | needed |