CVE-2021-20194

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

There is a vulnerability in the linux kernel versions higher than 5.2 (if kernel compiled with config params CONFIG_BPF_SYSCALL=y , CONFIG_BPF=y , CONFIG_CGROUPS=y , CONFIG_CGROUP_BPF=y , CONFIG_HARDENED_USERCOPY not set, and BPF hook to getsockopt is registered). As result of BPF execution, the local user can trigger bug in __cgroup_bpf_run_filter_getsockopt() function that can lead to heap overflow (because of non-hardened usercopy). The impact of attack could be deny of service or possibly privileges escalation.

References

https://bugzilla.redhat.com/show_bug.cgi?id=1912683

https://security.netapp.com/advisory/ntap-20210326-0003/

Details

Source: MITRE

Published: 2021-02-23

Updated: 2021-03-31

Type: CWE-20

Risk Information

CVSS v2

Base Score: 4.6

Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 3.9

Severity: MEDIUM

CVSS v3

Base Score: 7.8

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 1.8

Severity: HIGH

Tenable Plugins

View all (6 total)

IDNameProductFamilySeverity
148497Ubuntu 18.04 LTS / 20.04 LTS : Linux kernel vulnerabilities (USN-4909-1)NessusUbuntu Local Security Checks
high
148494Ubuntu 20.04 LTS : Linux kernel (OEM) vulnerabilities (USN-4912-1)NessusUbuntu Local Security Checks
high
147974Ubuntu 20.04 LTS / 20.10 : Linux kernel vulnerabilities (USN-4879-1)NessusUbuntu Local Security Checks
medium
147973Ubuntu 20.04 LTS : Linux kernel (OEM) vulnerabilities (USN-4884-1)NessusUbuntu Local Security Checks
high
146525Fedora 33 : kernel (2021-76aaa904e2)NessusFedora Local Security Checks
high
146519Fedora 32 : kernel (2021-f8ede2fdfc)NessusFedora Local Security Checks
high