First published: Tue Sep 22 2020(Updated: )
A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-alt | <0:4.14.0-115.33.1.el7a | 0:4.14.0-115.33.1.el7a |
redhat/kernel-rt | <0:4.18.0-240.rt7.54.el8 | 0:4.18.0-240.rt7.54.el8 |
redhat/kernel | <0:4.18.0-240.el8 | 0:4.18.0-240.el8 |
redhat/kernel | <0:4.18.0-147.34.1.el8_1 | 0:4.18.0-147.34.1.el8_1 |
redhat/kernel-rt | <0:4.18.0-193.40.1.rt13.90.el8_2 | 0:4.18.0-193.40.1.rt13.90.el8_2 |
redhat/kernel | <0:4.18.0-193.40.1.el8_2 | 0:4.18.0-193.40.1.el8_2 |
redhat/kernel | <5.9 | 5.9 |
Linux Kernel | <=5.8.13 | |
Linux Kernel | =5.9.0 | |
Linux Kernel | =5.9.0-rc1 | |
Linux Kernel | =5.9.0-rc2 | |
Linux Kernel | =5.9.0-rc3 | |
Linux Kernel | =5.9.0-rc4 | |
Linux Kernel | =5.9.0-rc5 | |
Linux Kernel | =5.9.0-rc6 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
SUSE Linux | =15.1 | |
SUSE Linux | =15.2 | |
Debian | =9.0 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-25641 is classified as a high severity vulnerability due to its potential for causing a denial of service.
To fix CVE-2020-25641, update to the kernel versions 5.9 or higher as specified in the advisory.
CVE-2020-25641 affects Linux kernel versions prior to 5.9-rc7.
Yes, CVE-2020-25641 can be exploited by local attackers with basic privileges.
The impact of CVE-2020-25641 is a denial of service, leading to potential system unavailability.