CVE-2020-25641

CVSS v3.1 5.5 (Medium)
55% Progress
CVSS v2.0 4.9 (Medium)
49% Progress
EPSS 0.04 % (5th)
0.04% Progress
Affected Products 5
Advisories 25

A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

Weaknesses
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE Status
PUBLISHED
CNA
Red Hat, Inc.
Published Date
2020-10-06 14:15:12
(4 years ago)
Updated Date
2022-11-21 19:36:16
(22 months ago)

Affected Products

Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel 5.8.13 and prior versions cpe:2.3:o:linux:linux_kernel <= 5.8.13
  Linux Kernel 5.9.0 cpe:2.3:o:linux:linux_kernel:5.9.0:-
  Linux Kernel 5.9.0 Rc1 cpe:2.3:o:linux:linux_kernel:5.9.0:rc1
  Linux Kernel 5.9.0 Rc2 cpe:2.3:o:linux:linux_kernel:5.9.0:rc2
  Linux Kernel 5.9.0 Rc3 cpe:2.3:o:linux:linux_kernel:5.9.0:rc3
  Linux Kernel 5.9.0 Rc4 cpe:2.3:o:linux:linux_kernel:5.9.0:rc4
  Linux Kernel 5.9.0 Rc5 cpe:2.3:o:linux:linux_kernel:5.9.0:rc5
  Linux Kernel 5.9.0 Rc6 cpe:2.3:o:linux:linux_kernel:5.9.0:rc6

Configuration #2

    CPE23 From Up To
  Redhat Enterprise Linux 7.0 cpe:2.3:o:redhat:enterprise_linux:7.0
  Redhat Enterprise Linux 8.0 cpe:2.3:o:redhat:enterprise_linux:8.0

Configuration #3

    CPE23 From Up To
  Opensuse Leap 15.1 cpe:2.3:o:opensuse:leap:15.1
  Opensuse Leap 15.2 cpe:2.3:o:opensuse:leap:15.2

Configuration #4

    CPE23 From Up To
  Debian Linux 9.0 cpe:2.3:o:debian:debian_linux:9.0

Configuration #5

    CPE23 From Up To
  Canonical Ubuntu Linux 18.04 cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts
  Canonical Ubuntu Linux 20.04 cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...