An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12.
CVE-2020-36694 - Medium Severity Vulnerability
Vulnerable Libraries - linux-yoctov5.4.51, linux-yoctov5.4.51, linux-yoctov5.4.51, linux-yoctov5.4.51, linux-yoctov5.4.51
Vulnerability Details
An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12.
Publish Date: 2023-05-21
URL: CVE-2020-36694
CVSS 3 Score Details (6.7)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://www.linuxkernelcves.com/cves/CVE-2020-36694
Release Date: 2023-05-21
Fix Resolution: v4.19.164,v5.4.86,v5.10
Step up your Open Source Security Game with Mend here