First published: Thu May 14 2020(Updated: )
A flaw was found in the Linux kernel, where it allows userspace processes, for example, a guest VM, to directly access h/w devices via its VFIO driver modules. The VFIO modules allow users to enable or disable access to the devices' MMIO memory address spaces. If a user attempts to access the read/write devices' MMIO address space when it is disabled, some h/w devices issue an interrupt to the CPU to indicate a fatal error condition, crashing the system. This flaw allows a guest user or process to crash the host system resulting in a denial of service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1127.13.1.rt56.1110.el7 | 0:3.10.0-1127.13.1.rt56.1110.el7 |
redhat/kernel | <0:3.10.0-1127.13.1.el7 | 0:3.10.0-1127.13.1.el7 |
redhat/kernel-alt | <0:4.14.0-115.26.1.el7a | 0:4.14.0-115.26.1.el7a |
redhat/kernel | <0:3.10.0-327.89.1.el7 | 0:3.10.0-327.89.1.el7 |
redhat/kernel | <0:3.10.0-514.78.1.el7 | 0:3.10.0-514.78.1.el7 |
redhat/kernel | <0:3.10.0-693.71.2.el7 | 0:3.10.0-693.71.2.el7 |
redhat/kernel | <0:3.10.0-957.56.1.el7 | 0:3.10.0-957.56.1.el7 |
redhat/kernel | <0:3.10.0-1062.30.1.el7 | 0:3.10.0-1062.30.1.el7 |
redhat/kernel-rt | <0:4.18.0-193.13.2.rt13.65.el8_2 | 0:4.18.0-193.13.2.rt13.65.el8_2 |
redhat/kernel | <0:4.18.0-193.13.2.el8_2 | 0:4.18.0-193.13.2.el8_2 |
redhat/kernel | <0:4.18.0-80.27.1.el8_0 | 0:4.18.0-80.27.1.el8_0 |
redhat/kernel | <0:4.18.0-147.24.2.el8_1 | 0:4.18.0-147.24.2.el8_1 |
IBM Data Risk Manager | <=2.0.6 | |
Linux Kernel | <=5.6.13 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
openSUSE | =15.1 | |
openSUSE | =15.2 | |
Debian GNU/Linux | =9.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =20.04 | |
NetApp Active IQ Unified Manager for VMware vSphere | ||
netapp cloud backup | ||
NetApp Element Software | ||
netapp hci management node | ||
netapp solidfire | ||
NetApp SteelStore | ||
All of | ||
netapp solidfire baseboard management controller firmware | ||
netapp solidfire baseboard management controller | ||
All of | ||
netapp bootstrap os | ||
netapp hci compute node | ||
All of | ||
NetApp AFF A700s Firmware | ||
netapp a700s | ||
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h300e firmware | ||
netapp h300e | ||
All of | ||
netapp h500e firmware | ||
netapp h500e | ||
All of | ||
netapp h700e firmware | ||
netapp h700e | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
All of | ||
netapp h610c firmware | ||
netapp h610c | ||
All of | ||
netapp h610s firmware | ||
netapp h610s | ||
All of | ||
netapp h615c firmware | ||
netapp h615c | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 | |
Linux kernel | <=5.6.13 | |
Fedora | =31 | |
Fedora | =32 | |
SUSE Linux | =15.1 | |
SUSE Linux | =15.2 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
NetApp Cloud Backup | ||
NetApp Element OS | ||
NetApp HCI Management Node | ||
NetApp SolidFire & HCI Storage Node | ||
NetApp SteelStore Cloud Integrated Storage | ||
NetApp SolidFire Baseboard Management Controller Firmware | ||
NetApp SolidFire Baseboard Management Controller | ||
NetApp HCI Bootstrap OS | ||
NetApp HCI Compute Node | ||
NetApp AFF A700s Firmware | ||
NetApp A700s | ||
NetApp H300S Firmware | ||
NetApp H300S | ||
NetApp H500S Firmware | ||
NetApp H500s | ||
NetApp H700S | ||
NetApp H700S | ||
NetApp H300E Firmware | ||
NetApp H300E Firmware | ||
NetApp H500E | ||
NetApp H500E | ||
NetApp H700E | ||
NetApp H700E | ||
NetApp H410S Firmware | ||
NetApp H410S Firmware | ||
NetApp H410C Firmware | ||
NetApp H410C | ||
NetApp H610C Firmware | ||
NetApp H610C Firmware | ||
NetApp H610S Firmware | ||
NetApp H610S Firmware | ||
NetApp H615C | ||
NetApp H615C |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-12888 is categorized as a high-severity vulnerability affecting the Linux kernel.
To fix CVE-2020-12888, update your Linux kernel to the patched version provided by your distribution.
CVE-2020-12888 affects multiple distributions of the Linux kernel, including specific versions from RedHat, Debian, Ubuntu, and Fedora.
CVE-2020-12888 can be exploited by malicious userspace processes to gain unauthorized access to hardware devices.
CVE-2020-12888 was disclosed in July 2020.