First published: Wed Sep 09 2020(Updated: )
A flaw was found in the NFSv4 implementation where when mounting a remote attacker controlled server it could return specially crafted response allow for local memory corruption and possibly privilege escalation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.11.1.rt56.1145.el7 | 0:3.10.0-1160.11.1.rt56.1145.el7 |
redhat/kernel-alt | <0:4.14.0-115.32.1.el7a | 0:4.14.0-115.32.1.el7a |
redhat/kernel | <0:3.10.0-1160.11.1.el7 | 0:3.10.0-1160.11.1.el7 |
redhat/kernel | <0:3.10.0-693.82.1.el7 | 0:3.10.0-693.82.1.el7 |
redhat/kernel | <0:3.10.0-957.70.1.el7 | 0:3.10.0-957.70.1.el7 |
redhat/kernel | <0:3.10.0-1062.45.1.el7 | 0:3.10.0-1062.45.1.el7 |
redhat/kernel-rt | <0:4.18.0-305.rt7.72.el8 | 0:4.18.0-305.rt7.72.el8 |
redhat/kernel | <0:4.18.0-305.el8 | 0:4.18.0-305.el8 |
Linux Kernel | <5.8.3 | |
Debian | =9.0 | |
SUSE Linux | =15.1 | |
SUSE Linux | =15.2 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
While there is no known mitigation to this flaw, configuring authentication and only mounting authenticated NFSv4 servers will significantly reduce the risk of this flaw being successfully exploited.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-25212 has a high severity rating due to the potential for memory corruption and privilege escalation.
To fix CVE-2020-25212, update to the latest kernel versions provided in the remediation section for your specific distribution.
CVE-2020-25212 affects various versions of the Linux kernel, particularly those prior to version 5.8.3.
Yes, CVE-2020-25212 can lead to significant security risks including unauthorized privilege escalation.
Yes, CVE-2020-25212 can be exploited by a remote attacker through specially crafted NFS requests.