CVE-2020-25643

A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9.0:rc6:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12533:*:*:*:vsphere:*:*
cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12658:*:*:*:vsphere:*:*
cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12859:*:*:*:vsphere:*:*
cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13170:*:*:*:vsphere:*:*
cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13586:*:*:*:vsphere:*:*
cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13861:*:*:*:vsphere:*:*

History

25 Oct 2022, 16:55

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.9.0:-:*:*:*:*:*:* cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13586:*:*:*:vsphere:*:*
cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12533:*:*:*:vsphere:*:*
cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12658:*:*:*:vsphere:*:*
cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13861:*:*:*:vsphere:*:*
cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12859:*:*:*:vsphere:*:*
cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13170:*:*:*:vsphere:*:*
References (MISC) https://www.starwindsoftware.com/security/sw-20210325-0002/ - (MISC) https://www.starwindsoftware.com/security/sw-20210325-0002/ - Third Party Advisory
First Time Starwindsoftware starwind Virtual San
Starwindsoftware

11 Oct 2022, 19:15

Type Values Removed Values Added
References
  • (MISC) https://www.starwindsoftware.com/security/sw-20210325-0002/ -

19 Oct 2021, 13:45

Type Values Removed Values Added
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/10/msg00028.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/10/msg00028.html - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2020/dsa-4774 - (DEBIAN) https://www.debian.org/security/2020/dsa-4774 - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20201103-0002/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20201103-0002/ - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html - Mailing List, Third Party Advisory
CPE cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Information

Published : 2020-10-06 14:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-25643

Mitre link : CVE-2020-25643

CVE.ORG link : CVE-2020-25643


JSON object : View

Products Affected

redhat

  • enterprise_linux

netapp

  • h410c
  • h410c_firmware

opensuse

  • leap

linux

  • linux_kernel

starwindsoftware

  • starwind_virtual_san

debian

  • debian_linux
CWE
CWE-20

Improper Input Validation