跳转到帖子

SUSE: CVE-2020-36694: SUSE Linux Security Advisory

recommended_posts

发布于
  • Members

SUSE: CVE-2020-36694: SUSE Linux Security Advisory

Severity
7
CVSS
(AV:L/AC:L/Au:M/C:C/I:C/A:C)
Published
05/21/2023
Created
08/16/2024
Added
08/09/2024
Modified
01/28/2025

Description

An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12.

Solution(s)

  • suse-upgrade-dtb-al
  • suse-upgrade-dtb-zte
  • suse-upgrade-kernel-64kb
  • suse-upgrade-kernel-64kb-devel
  • suse-upgrade-kernel-default
  • suse-upgrade-kernel-default-base
  • suse-upgrade-kernel-default-devel
  • suse-upgrade-kernel-devel
  • suse-upgrade-kernel-docs
  • suse-upgrade-kernel-macros
  • suse-upgrade-kernel-obs-build
  • suse-upgrade-kernel-preempt
  • suse-upgrade-kernel-preempt-devel
  • suse-upgrade-kernel-source
  • suse-upgrade-kernel-syms
  • suse-upgrade-kernel-zfcpdump
  • suse-upgrade-reiserfs-kmp-default

References

  • https://attackerkb.com/topics/cve-2020-36694
  • CVE - 2020-36694
  • 查看数 703
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…