First published: Thu Oct 15 2020(Updated: )
A flaw was found in Linux Kernel, where a race in KDGKBSENT and KDSKBSENT leads to use-after-free read in vt_do_kdgkb_ioctl References: <a href="https://groups.google.com/g/syzkaller-bugs/c/kZsmxkpq3UI/m/J35PFexWBgAJ?pli=1">https://groups.google.com/g/syzkaller-bugs/c/kZsmxkpq3UI/m/J35PFexWBgAJ?pli=1</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.21.1.rt56.1158.el7 | 0:3.10.0-1160.21.1.rt56.1158.el7 |
redhat/kernel | <0:3.10.0-1160.21.1.el7 | 0:3.10.0-1160.21.1.el7 |
redhat/kernel | <5.10 | 5.10 |
Linux Kernel | <5.10 | |
Linux Kernel | =5.10-rc1 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
StarWind Virtual SAN | =v8-build12533 | |
StarWind Virtual SAN | =v8-build12658 | |
StarWind Virtual SAN | =v8-build12859 | |
StarWind Virtual SAN | =v8-build13170 | |
StarWind Virtual SAN | =v8-build13586 | |
StarWind Virtual SAN | =v8-build13861 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25656 has a medium severity rating due to the potential for a use-after-free vulnerability in the Linux Kernel.
To fix CVE-2020-25656, update your Linux Kernel to the recommended versions, such as 5.10 or apply specific patches provided by your distribution.
CVE-2020-25656 affects various versions of the Linux Kernel, particularly those in Red Hat Enterprise Linux 7, 8, and Debian 9.0, among others.
CVE-2020-25656 is considered exploitable under specific conditions where a race condition may lead to unauthorized memory access.
Currently, the primary mitigation for CVE-2020-25656 is to ensure that relevant software is updated to patched versions that address the vulnerability.