CVE-2020-25643

A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html Mailing List Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1879981 Issue Tracking Patch Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105 Mailing List Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/10/msg00028.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20201103-0002/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4774 Third Party Advisory
https://www.starwindsoftware.com/security/sw-20210325-0002/ Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html Mailing List Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1879981 Issue Tracking Patch Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105 Mailing List Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/10/msg00028.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20201103-0002/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4774 Third Party Advisory
https://www.starwindsoftware.com/security/sw-20210325-0002/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9.0:rc6:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12533:*:*:*:vsphere:*:*
cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12658:*:*:*:vsphere:*:*
cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12859:*:*:*:vsphere:*:*
cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13170:*:*:*:vsphere:*:*
cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13586:*:*:*:vsphere:*:*
cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13861:*:*:*:vsphere:*:*

History

21 Nov 2024, 05:18

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html - Mailing List, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1879981 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1879981 - Issue Tracking, Patch, Third Party Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105 - Mailing List, Patch, Third Party Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105 - Mailing List, Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/10/msg00028.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/10/msg00028.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20201103-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20201103-0002/ - Third Party Advisory
References () https://www.debian.org/security/2020/dsa-4774 - Third Party Advisory () https://www.debian.org/security/2020/dsa-4774 - Third Party Advisory
References () https://www.starwindsoftware.com/security/sw-20210325-0002/ - Third Party Advisory () https://www.starwindsoftware.com/security/sw-20210325-0002/ - Third Party Advisory

Information

Published : 2020-10-06 14:15

Updated : 2024-11-21 05:18


NVD link : CVE-2020-25643

Mitre link : CVE-2020-25643

CVE.ORG link : CVE-2020-25643


JSON object : View

Products Affected

redhat

  • enterprise_linux

starwindsoftware

  • starwind_virtual_san

opensuse

  • leap

netapp

  • h410c_firmware
  • h410c

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-20

Improper Input Validation