icon

We found results for “

CVE-2020-25211

Good to know:

icon
icon

Date: September 9, 2020

In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff. After conducting further research, Mend has determined that CVE-2020-25211 only affects environments with versions v2.6.11-tree--v4.4.238, v4.5-rc1--v4.9.238, v4.10-rc1--v4.14.200, v4.15-rc1--v4.19.149, v5.0-rc1--v5.4.69, v5.5-rc1--v5.8.12 and v5.9-rc1--v5.9-rc6 of Linux Kernel.

Language: C

Severity Score

Severity Score

Weakness Type (CWE)

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-120

Top Fix

icon

Upgrade Version

Upgrade to version linux-yocto - 4.8.26+gitAUTOINC+1c60e003c7_27efc3ba68;linux-yocto - 4.10+gitAUTOINC+805ea440c7_b259a5d744;linux-libc-headers - 5.10

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): HIGH
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): HIGH
Availability (A): HIGH

CVSS v2

Base Score:
Access Vector (AV): LOCAL
Access Complexity (AC): LOW
Authentication (AU): NONE
Confidentiality (C): NONE
Integrity (I): PARTIAL
Availability (A): PARTIAL
Additional information:

Do you need more information?

Contact Us