First published: Wed Dec 16 2020(Updated: )
An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system's integrity and availability. As .x25_addr[] array comes from the user and is not necessarily NUL terminated. Using strnlen() instead of strlen() will prevent a read overflow problem.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.12<4.4.248 | |
Linux Kernel | >=4.5<4.9.248 | |
Linux Kernel | >=4.10<4.14.211 | |
Linux Kernel | >=4.15<4.19.162 | |
Linux Kernel | >=4.20<5.4.82 | |
Linux Kernel | >=5.5<5.9.13 | |
NetApp Cloud Backup | ||
All of | ||
NetApp SolidFire Baseboard Management Controller Firmware | ||
NetApp SolidFire | ||
All of | ||
NetApp H300S Firmware | ||
NetApp H300S Firmware | ||
All of | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
All of | ||
NetApp H700S | ||
NetApp H700S | ||
All of | ||
NetApp H300E | ||
NetApp H300E Firmware | ||
All of | ||
NetApp H500S Firmware | ||
NetApp H500e Firmware | ||
All of | ||
NetApp H700E | ||
NetApp H700E | ||
All of | ||
NetApp H410S | ||
NetApp H410S Firmware | ||
All of | ||
NetApp H410C | ||
NetApp H410C Firmware | ||
Linux Kernel | =5.12-rc5 | |
NetApp SolidFire Baseboard Management Controller Firmware | ||
NetApp SolidFire | ||
NetApp H300S Firmware | ||
NetApp H300S Firmware | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
NetApp H700S | ||
NetApp H700S | ||
NetApp H300E | ||
NetApp H300E Firmware | ||
NetApp H500S Firmware | ||
NetApp H500e Firmware | ||
NetApp H700E | ||
NetApp H700E | ||
NetApp H410S | ||
NetApp H410S Firmware | ||
NetApp H410C | ||
NetApp H410C Firmware | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35519 is considered to have a high severity due to the potential for an attacker to exploit the out-of-bounds memory access flaw.
To fix CVE-2020-35519, you should upgrade to a patched version of the Linux kernel, specifically versions 5.10.223, 5.10.226, or later.
CVE-2020-35519 affects multiple versions of the Linux kernel ranging from versions 2.6.12 to 5.9.13.
Yes, CVE-2020-35519 can lead to system crashes or even a leak of internal kernel information.
As a temporary measure, limiting user access and minimizing the number of local users can reduce the risk of exploitation until the vulnerability is patched.