A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
|
History
21 Nov 2024, 05:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html - Mailing List, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1879981 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105 - Mailing List, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/10/msg00028.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html - Mailing List, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20201103-0002/ - Third Party Advisory | |
References | () https://www.debian.org/security/2020/dsa-4774 - Third Party Advisory | |
References | () https://www.starwindsoftware.com/security/sw-20210325-0002/ - Third Party Advisory |
25 Oct 2022, 16:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12533:*:*:*:vsphere:*:* cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13586:*:*:*:vsphere:*:* cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13170:*:*:*:vsphere:*:* cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13861:*:*:*:vsphere:*:* cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12658:*:*:*:vsphere:*:* cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12859:*:*:*:vsphere:*:* |
|
References | (MISC) https://www.starwindsoftware.com/security/sw-20210325-0002/ - Third Party Advisory |
11 Oct 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Oct 2021, 13:45
Type | Values Removed | Values Added |
---|---|---|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20201103-0002/ - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2020/10/msg00028.html - Mailing List, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2020/dsa-4774 - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:* |
Information
Published : 2020-10-06 14:15
Updated : 2024-11-21 05:18
NVD link : CVE-2020-25643
Mitre link : CVE-2020-25643
CVE.ORG link : CVE-2020-25643
JSON object : View
Products Affected
redhat
- enterprise_linux
opensuse
- leap
netapp
- h410c
- h410c_firmware
linux
- linux_kernel
debian
- debian_linux
starwindsoftware
- starwind_virtual_san
CWE
CWE-20
Improper Input Validation