CVE-2020-25211
Public on 2020-09-09
Modified on 2020-11-16
Description
A flaw was found in the Linux kernel. A local attacker, able to inject conntrack netlink configuration, could overflow a local buffer causing crashes or triggering the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Severity
See what this means
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 1 | kernel | 2020-11-18 | ALAS-2020-1446 | Fixed |
Amazon Linux 2 - Core | kernel | 2020-10-02 | ALAS2-2020-1495 | Fixed |
Amazon Linux 2 - Core | kernel | 2020-11-11 | ALAS2-2020-1556 | Fixed |
Amazon Linux 2 - Kernel-5.4 Extra | kernel | 2022-01-28 | ALAS2KERNEL-5.4-2022-017 | Fixed |
Amazon Linux 2 - Livepatch Extra | kernel-livepatch-4.14.192-147.314 | 2020-12-18 | ALAS2LIVEPATCH-2020-028 | Fixed |
Amazon Linux 2 - Livepatch Extra | kernel-livepatch-4.14.193-149.317 | 2020-12-18 | ALAS2LIVEPATCH-2020-029 | Fixed |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 6.7 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
NVD | CVSSv3 | 6.0 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H |
NVD | CVSSv2 | 3.6 | AV:L/AC:L/Au:N/C:N/I:P/A:P |