A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1881424 | issue tracking third party advisory patch |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124 | mailing list patch vendor advisory |
https://www.kernel.org/doc/html/latest/block/biovecs.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2020/10/06/9 | third party advisory mailing list |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html | mailing list third party advisory vendor advisory |
https://usn.ubuntu.com/4576-1/ | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html | mailing list third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html | third party advisory mailing list |