In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlinkparsetuplefilter in net/netfilter/nfconntrack_netlink.c, aka CID-1cc5ef91d2ff.
[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"227308720120167709542308754878224854586",
"261612512421052613246982957378281163477",
"103447702499069620800922976022580321397"
]
},
"signature_type": "Line",
"id": "CVE-2020-25211-520bd9b5",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@1cc5ef91d2ff94d2bf2de3b3585423e8a1051cb6",
"target": {
"file": "net/netfilter/nf_conntrack_netlink.c"
},
"deprecated": false
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-25211.json"