CVE-2020-25643
Summary
| CVE | CVE-2020-25643 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-10-06 14:15:00 UTC |
| Updated | 2023-05-16 10:48:00 UTC |
| Description | A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [security-announce] openSUSE-SU-2020:1655-1: important: Security update |
SUSE |
lists.opensuse.org |
Third Party Advisory |
| [SECURITY] [DLA 2420-2] linux regression update |
MLIST |
lists.debian.org |
|
| Debian -- Security Information -- DSA-4774-1 linux |
DEBIAN |
www.debian.org |
|
| CVE-2020-25643 Linux Kernel vulnerability in StarWind VSAN for vSphere (VSA) |
MISC |
www.starwindsoftware.com |
|
| [security-announce] openSUSE-SU-2020:1698-1: important: Security update |
SUSE |
lists.opensuse.org |
|
| CVE-2020-25643 Linux Kernel Vulnerability in NetApp Products | NetApp Product Security |
CONFIRM |
security.netapp.com |
|
| 1879981 – (CVE-2020-25643) CVE-2020-25643 kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow |
MISC |
bugzilla.redhat.com |
Issue Tracking, Patch, Third Party Advisory |
| [SECURITY] [DLA 2417-1] linux-4.19 security update |
MLIST |
lists.debian.org |
|
| kernel/git/torvalds/linux.git - Linux kernel source tree |
MISC |
git.kernel.org |
Mailing List, Patch, Third Party Advisory |
| [SECURITY] [DLA 2420-1] linux security update |
MLIST |
lists.debian.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 159185 Oracle Enterprise Linux Security Update for kernel (ELSA-2021-1578)
- 239314 Red Hat Update for kernel-rt (RHSA-2021:1739)
- 239339 Red Hat Update for kernel (RHSA-2021:1578)
- 353100 Amazon Linux Security Advisory for kernel : ALAC2012-2021-024
- 353101 Amazon Linux Security Advisory for kmod-mlx5 : ALAC2012-2021-025
- 353102 Amazon Linux Security Advisory for kmod-sfc : ALAC2012-2021-026
- 377038 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX2-SA-2020:0198)
- 750376 OpenSUSE Security Update for RT kernel (openSUSE-SU-2021:0242-1)
- 750533 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2020:2112-1)
- 900076 CBL-Mariner Linux Security Update for kernel 5.4.91
- 902957 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (3509)
- 906038 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (3509-1)
- 940354 AlmaLinux Security Update for kernel (ALSA-2021:1578)