First published: Tue Jan 05 2021(Updated: )
Last updated 29 November 2024
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >5.2 | |
redhat openshift container platform | =4.4 | |
redhat openshift container platform | =4.5 | |
redhat openshift container platform | =4.6 | |
Red Hat Enterprise Linux | =8.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20194 has a severity rating that indicates it could lead to serious security issues within the affected Linux kernel versions.
To fix CVE-2021-20194, update the Linux kernel to a version that is patched against this vulnerability, such as those mentioned in the advisory.
CVE-2021-20194 affects Linux kernel versions above 5.2 and specific versions of Red Hat OpenShift Container Platform and Red Hat Enterprise Linux.
The risk of CVE-2021-20194 increases if the kernel is compiled with specific configuration parameters like CONFIG_BPF_SYSCALL and CONFIG_BPF.
Yes, CVE-2021-20194 can be exploited remotely under certain conditions, making it critical to address in impacted environments.