Name | CVE-2020-25211 |
Description | In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2417-1, DLA-2420-1, DSA-4774-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
linux (PTS) | bullseye | 5.10.223-1 | fixed |
bullseye (security) | 5.10.234-1 | fixed | |
bookworm | 6.1.129-1 | fixed | |
bookworm (security) | 6.1.128-1 | fixed | |
sid, trixie | 6.12.21-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
linux | source | stretch | 4.9.240-1 | DLA-2420-1 | ||
linux | source | buster | 4.19.152-1 | DSA-4774-1 | ||
linux | source | (unstable) | 5.8.14-1 | |||
linux-4.19 | source | stretch | 4.19.152-1~deb9u1 | DLA-2417-1 |
https://git.kernel.org/linus/1cc5ef91d2ff94d2bf2de3b3585423e8a1051cb6