A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2385-1 | linux-4.19 security update |
Debian DLA |
DLA-2420-1 | linux security update |
Debian DLA |
DLA-2420-2 | linux regression update |
EUVD |
EUVD-2020-17902 | A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452. |
Ubuntu USN |
USN-4525-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4527-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4578-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4752-1 | Linux kernel (OEM) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T15:33:05.351Z
Reserved: 2020-09-09T00:00:00
Link: CVE-2020-25212
No data.
Status : Modified
Published: 2020-09-09T16:15:12.063
Modified: 2024-11-21T05:17:39.973
Link: CVE-2020-25212
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN