carnil> Issue introduced with 855b7717f44b1 ("nvme: fine-granular
carnil> CAP_SYS_ADMIN for nvme io commands") in 6.2-rc1.
carnil> To exploit the issue it's still required that root changes the
carnil> device node persmissions. Though this was allowed unter the
carnil> assumtion it was safe to allow (which turns out not to be).
| Branch | Status |
|---|---|
| 4.19-buster-security | N/A "Vulnerable code not present" |
| 4.19-upstream-stable | N/A "Vulnerable code not present" |
| 5.10-bullseye-security | N/A "Vulnerable code not present" |
| 5.10-upstream-stable | N/A "Vulnerable code not present" |
| 6.1-bookworm-security | N/A "Vulnerable code not present" |
| 6.1-upstream-stable | N/A "Vulnerable code not present" |
| 6.6-upstream-stable | unknown |
| 6.8-upstream-stable | unknown |
| sid | needed |
| upstream | needed |