Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-20292
HistoryMar 24, 2021 - 12:00 a.m.

CVE-2021-20292

2021-03-2400:00:00
ubuntu.com
ubuntu.com
21
linux kernel
nouveau drm
privilege escalation
local account
root privilege
code execution
object validation

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

12.6%

There is a flaw reported in the Linux kernel in versions before 5.9 in
drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in
Nouveau DRM subsystem. The issue results from the lack of validating the
existence of an object prior to performing operations on the object. An
attacker with a local account with a root privilege, can leverage this
vulnerability to escalate privileges and execute code in the context of the
kernel.

Notes

Author Note
sbeattie kernels with CONFIG_SLAB_FREELIST_HARDENED=y (which Ubuntu enables) are probably not affected.
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchlinux< 4.15.0-143.147UNKNOWN
ubuntu20.04noarchlinux< 5.4.0-48.52UNKNOWN
ubuntu16.04noarchlinux< 4.4.0-222.255UNKNOWN
ubuntu18.04noarchlinux-aws< 4.15.0-1102.109UNKNOWN
ubuntu20.04noarchlinux-aws< 5.4.0-1025.25UNKNOWN
ubuntu14.04noarchlinux-aws< 4.4.0-1102.107UNKNOWN
ubuntu16.04noarchlinux-aws< 4.4.0-1138.152UNKNOWN
ubuntu18.04noarchlinux-aws-5.4< 5.4.0-1025.25~18.04.1UNKNOWN
ubuntu16.04noarchlinux-aws-hwe< 4.15.0-1102.109~16.04.1UNKNOWN
ubuntu20.04noarchlinux-azure< 5.4.0-1026.26UNKNOWN
Rows per page:
1-10 of 341

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

12.6%