vulnerability
Ubuntu: (Multiple Advisories) (CVE-2021-20194): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | Feb 23, 2021 | Mar 17, 2021 | Aug 18, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Feb 23, 2021
Added
Mar 17, 2021
Modified
Aug 18, 2025
Description
There is a vulnerability in the linux kernel versions higher than 5.2 (if kernel compiled with config params CONFIG_BPF_SYSCALL=y , CONFIG_BPF=y , CONFIG_CGROUPS=y , CONFIG_CGROUP_BPF=y , CONFIG_HARDENED_USERCOPY not set, and BPF hook to getsockopt is registered). As result of BPF execution, the local user can trigger bug in __cgroup_bpf_run_filter_getsockopt() function that can lead to heap overflow (because of non-hardened usercopy). The impact of attack could be deny of service or possibly privileges escalation.
Solutions
ubuntu-upgrade-linux-image-5-10-0-1017-oemubuntu-upgrade-linux-image-5-4-0-1013-gkeopubuntu-upgrade-linux-image-5-4-0-1033-raspiubuntu-upgrade-linux-image-5-4-0-1037-kvmubuntu-upgrade-linux-image-5-4-0-1040-gkeubuntu-upgrade-linux-image-5-4-0-1041-gcpubuntu-upgrade-linux-image-5-4-0-1042-oracleubuntu-upgrade-linux-image-5-4-0-1043-awsubuntu-upgrade-linux-image-5-4-0-1044-azureubuntu-upgrade-linux-image-5-4-0-71-genericubuntu-upgrade-linux-image-5-4-0-71-generic-lpaeubuntu-upgrade-linux-image-5-4-0-71-lowlatencyubuntu-upgrade-linux-image-5-6-0-1053-oemubuntu-upgrade-linux-image-5-8-0-1017-raspiubuntu-upgrade-linux-image-5-8-0-1017-raspi-nolpaeubuntu-upgrade-linux-image-5-8-0-1020-kvmubuntu-upgrade-linux-image-5-8-0-1022-oracleubuntu-upgrade-linux-image-5-8-0-1024-azureubuntu-upgrade-linux-image-5-8-0-1024-gcpubuntu-upgrade-linux-image-5-8-0-1025-awsubuntu-upgrade-linux-image-5-8-0-45-genericubuntu-upgrade-linux-image-5-8-0-45-generic-64kubuntu-upgrade-linux-image-5-8-0-45-generic-lpaeubuntu-upgrade-linux-image-5-8-0-45-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-4ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04bubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.