Description
An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12.
Published: 2023-05-21
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-24136 An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12.
History

Fri, 31 Jan 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Linux Linux Kernel
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-01-31T17:46:04.151Z

Reserved: 2023-05-21T00:00:00.000Z

Link: CVE-2020-36694

cve-icon Vulnrichment

Updated: 2024-08-04T17:37:05.278Z

cve-icon NVD

Status : Modified

Published: 2023-05-21T23:15:08.960

Modified: 2025-01-31T18:15:29.737

Link: CVE-2020-36694

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-05-22T06:30:00Z

Links: CVE-2020-36694 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses