We found results for “”
CVE-2020-25211
Good to know:
Date: September 9, 2020
In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff. After conducting further research, Mend has determined that CVE-2020-25211 only affects environments with versions v2.6.11-tree--v4.4.238, v4.5-rc1--v4.9.238, v4.10-rc1--v4.14.200, v4.15-rc1--v4.19.149, v5.0-rc1--v5.4.69, v5.5-rc1--v5.8.12 and v5.9-rc1--v5.9-rc6 of Linux Kernel.
Language: C
Severity Score
Related Resources (16)
Severity Score
Weakness Type (CWE)
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE-120Top Fix
Upgrade Version
Upgrade to version linux-yocto - 4.8.26+gitAUTOINC+1c60e003c7_27efc3ba68;linux-yocto - 4.10+gitAUTOINC+805ea440c7_b259a5d744;linux-libc-headers - 5.10
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | LOCAL |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | HIGH |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
CVSS v2
| Base Score: |
|
|---|---|
| Access Vector (AV): | LOCAL |
| Access Complexity (AC): | LOW |
| Authentication (AU): | NONE |
| Confidentiality (C): | NONE |
| Integrity (I): | PARTIAL |
| Availability (A): | PARTIAL |
| Additional information: |
Vulnerabilities
Projects
Contact Us


