First published: Tue Sep 08 2020(Updated: )
A flaw was found in the Linux kernel where an unprivileged console user can crash kernel via a nouveau ioctl. Reference: <a href="https://lists.freedesktop.org/archives/nouveau/2020-August/036682.html">https://lists.freedesktop.org/archives/nouveau/2020-August/036682.html</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Linux kernel | <5.12 | 5.12 |
Linux Kernel | <=5.11.2 | |
Red Hat Fedora | =32 | |
Red Hat Fedora | =33 | |
Red Hat OpenShift Container Platform | =4.4 | |
Red Hat OpenShift Container Platform | =4.5 | |
Red Hat OpenShift Container Platform | =4.6 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Messaging Realtime Grid | =2.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25639 has a medium severity rating due to the potential for an unprivileged console user to crash the kernel.
To resolve CVE-2020-25639, you should upgrade your Linux kernel to version 5.12 or apply the relevant patches provided by your distribution.
CVE-2020-25639 affects multiple Linux distributions, including specific versions of Red Hat Enterprise Linux and Fedora.
CVE-2020-25639 is caused by a flaw in the Linux kernel's handling of a nouveau ioctl, leading to a NULL pointer dereference.
Yes, CVE-2020-25639 can be exploited by unprivileged console users on affected systems.