CVE 2020-25641
A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
Related bugs and status
CVE-2020-25641 (Candidate) is related to these bugs:
Bug #1908499: udpgro.sh in net from ubuntu_kernel_selftests seems not reflecting sub-test result
Bug #1909453: S3 stress test fails with amdgpu errors
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1909453 | S3 stress test fails with amdgpu errors | linux-oem-5.6 (Ubuntu) | Undecided | Invalid | ||
1909453 | S3 stress test fails with amdgpu errors | linux-oem-5.6 (Ubuntu Focal) | Undecided | Fix Released | ||
1909453 | S3 stress test fails with amdgpu errors | HWE Next | Undecided | Fix Released |
Bug #1913153: focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow kernel-signoff | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow prepare-package-lrm | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | linux-oem-5.6 (Ubuntu Focal) | Medium | Fix Released |
See the
CVE page on Mitre.org
for more details.