Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-25643

Опубликовано: 25 сент. 2020
Источник: redhat
CVSS3: 7.2
EPSS Низкий

Описание

A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

A flaw was found in the HDLC_PPP module of the Linux kernel. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Отчет

This flaw is rated as a having Moderate impact, because the bug can be triggered only if PPP protocol enabled.

Меры по смягчению последствий

To mitigate this issue, prevent modules hdlc_ppp, syncppp from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernel-altWill not fix
Red Hat Enterprise MRG 2kernel-rtOut of support scope
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2020:544115.12.2020
Red Hat Enterprise Linux 7kernelFixedRHSA-2020:543715.12.2020
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2021:173918.05.2021
Red Hat Enterprise Linux 8kernelFixedRHSA-2021:157818.05.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1879981kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow

EPSS

Процентиль: 59%
0.00394
Низкий

7.2 High

CVSS3

Связанные уязвимости

CVSS3: 7.2
ubuntu
больше 4 лет назад

A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 7.2
nvd
больше 4 лет назад

A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 7.2
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 7.2
debian
больше 4 лет назад

A flaw was found in the HDLC_PPP module of the Linux kernel in version ...

CVSS3: 7.2
github
около 3 лет назад

A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

EPSS

Процентиль: 59%
0.00394
Низкий

7.2 High

CVSS3