First published: Tue Mar 16 2021(Updated: )
Last updated 24 March 2025
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Kernel | <5.9 | 5.9 |
Linux Kernel | >=3.3<4.9.298 | |
Linux Kernel | >=4.10<4.14.263 | |
Linux Kernel | >=4.15<4.19.140 | |
Linux Kernel | >=4.20<5.4.59 | |
Linux Kernel | >=5.5<5.7.16 | |
Linux Kernel | >=5.8<5.8.2 | |
Red Hat Fedora | =33 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Debian Linux | =9.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20292 is considered a high-severity vulnerability due to its potential for local privilege escalation.
To fix CVE-2021-20292, update your kernel to a version that is 5.10.223-1 or later.
CVE-2021-20292 affects various versions of the Linux Kernel and associated distributions like Red Hat and Debian.
No, CVE-2021-20292 requires local access to exploit, making it a local privilege escalation vulnerability.
The CVE-2021-20292 vulnerability is located in drivers/gpu/drm/nouveau/nouveau_sgdma.c in the Nouveau DRM subsystem.