First published: Thu Sep 17 2020(Updated: )
A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.11.1.rt56.1145.el7 | 0:3.10.0-1160.11.1.rt56.1145.el7 |
redhat/kernel | <0:3.10.0-1160.11.1.el7 | 0:3.10.0-1160.11.1.el7 |
redhat/kernel-rt | <0:4.18.0-305.rt7.72.el8 | 0:4.18.0-305.rt7.72.el8 |
redhat/kernel | <0:4.18.0-305.el8 | 0:4.18.0-305.el8 |
redhat/Linux kernel | <5.9 | 5.9 |
Linux Kernel | >=2.6.29<4.4.238 | |
Linux Kernel | >=4.5<4.9.238 | |
Linux Kernel | >=4.10<4.14.200 | |
Linux Kernel | >=4.15<4.19.148 | |
Linux Kernel | >=4.20<5.4.68 | |
Linux Kernel | >=5.5<5.8.12 | |
Linux Kernel | =5.9.0-rc1 | |
Linux Kernel | =5.9.0-rc2 | |
Linux Kernel | =5.9.0-rc3 | |
Linux Kernel | =5.9.0-rc4 | |
Linux Kernel | =5.9.0-rc5 | |
Linux Kernel | =5.9.0-rc6 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
openSUSE | =15.1 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
openSUSE | =15.2 | |
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
StarWind Virtual SAN | =v8-build12533 | |
StarWind Virtual SAN | =v8-build12658 | |
StarWind Virtual SAN | =v8-build12859 | |
StarWind Virtual SAN | =v8-build13170 | |
StarWind Virtual SAN | =v8-build13586 | |
StarWind Virtual SAN | =v8-build13861 | |
netapp h410c firmware | ||
netapp h410c | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
To mitigate this issue, prevent modules hdlc_ppp, syncppp from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-25643 has a high severity rating due to its potential to cause memory corruption and denial of service.
To fix CVE-2020-25643, update your Linux kernel to version 5.9 or later, or to the latest patched version such as 0:3.10.0-1160.11.1.el7.
CVE-2020-25643 affects Linux kernel versions prior to 5.9-rc7, specifically versions 2.6.29 to 5.8.12.
CVE-2020-25643 impacts various Linux distributions, including Red Hat Enterprise Linux, Debian, and openSUSE.
Yes, CVE-2020-25643 can lead to system crashes or denial of service due to improper input validation in the HDLC_PPP module.