First published: Wed Dec 16 2020(Updated: )
An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system's integrity and availability. As .x25_addr[] array comes from the user and is not necessarily NUL terminated. Using strnlen() instead of strlen() will prevent a read overflow problem.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.12<4.4.248 | |
Linux Kernel | >=4.5<4.9.248 | |
Linux Kernel | >=4.10<4.14.211 | |
Linux Kernel | >=4.15<4.19.162 | |
Linux Kernel | >=4.20<5.4.82 | |
Linux Kernel | >=5.5<5.9.13 | |
netapp cloud backup | ||
All of | ||
netapp solidfire baseboard management controller firmware | ||
netapp solidfire baseboard management controller | ||
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h300e firmware | ||
netapp h300e | ||
All of | ||
netapp h500e firmware | ||
netapp h500e | ||
All of | ||
netapp h700e firmware | ||
netapp h700e | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
Linux Kernel | =5.12-rc5 | |
netapp solidfire baseboard management controller firmware | ||
netapp solidfire baseboard management controller | ||
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h300e firmware | ||
netapp h300e | ||
netapp h500e firmware | ||
netapp h500e | ||
netapp h700e firmware | ||
netapp h700e | ||
netapp h410s firmware | ||
netapp h410s | ||
netapp h410c firmware | ||
netapp h410c | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35519 is considered to have a high severity due to the potential for an attacker to exploit the out-of-bounds memory access flaw.
To fix CVE-2020-35519, you should upgrade to a patched version of the Linux kernel, specifically versions 5.10.223, 5.10.226, or later.
CVE-2020-35519 affects multiple versions of the Linux kernel ranging from versions 2.6.12 to 5.9.13.
Yes, CVE-2020-35519 can lead to system crashes or even a leak of internal kernel information.
As a temporary measure, limiting user access and minimizing the number of local users can reduce the risk of exploitation until the vulnerability is patched.