CVE-2020-16119

Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 Nov 2023, 03:18

Type Values Removed Values Added
References
  • {'url': 'https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza@canonical.com/T/', 'name': 'https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza@canonical.com/T/', 'tags': ['Patch', 'Vendor Advisory'], 'refsource': 'CONFIRM'}
  • () https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza%40canonical.com/T/ -

01 Jan 2022, 18:13

Type Values Removed Values Added
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html - Third Party Advisory

17 Dec 2021, 01:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html -

12 Nov 2021, 19:53

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2021/dsa-4978 - (DEBIAN) https://www.debian.org/security/2021/dsa-4978 - Third Party Advisory

16 Oct 2021, 01:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html -

25 Sep 2021, 15:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2021/dsa-4978 -

04 Mar 2021, 21:40

Type Values Removed Values Added
References (CONFIRM) https://security.netapp.com/advisory/ntap-20210304-0006/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20210304-0006/ - Third Party Advisory

04 Mar 2021, 13:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20210304-0006/ -

23 Jan 2021, 01:37

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : 4.6
v3 : 7.8
References (CONFIRM) https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza@canonical.com/T/ - (CONFIRM) https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza@canonical.com/T/ - Patch, Vendor Advisory
References (UBUNTU) https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=01872cb896c76cedeabe93a08456976ab55ad695 - (UBUNTU) https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=01872cb896c76cedeabe93a08456976ab55ad695 - Patch, Third Party Advisory
References (UBUNTU) https://ubuntu.com/USN-4579-1 - (UBUNTU) https://ubuntu.com/USN-4579-1 - Third Party Advisory
References (UBUNTU) https://launchpad.net/bugs/1883840 - (UBUNTU) https://launchpad.net/bugs/1883840 - Issue Tracking, Patch, Third Party Advisory
References (UBUNTU) https://ubuntu.com/USN-4578-1 - (UBUNTU) https://ubuntu.com/USN-4578-1 - Third Party Advisory
References (UBUNTU) https://ubuntu.com/USN-4580-1 - (UBUNTU) https://ubuntu.com/USN-4580-1 - Third Party Advisory
References (UBUNTU) https://ubuntu.com/USN-4576-1 - (UBUNTU) https://ubuntu.com/USN-4576-1 - Third Party Advisory
References (UBUNTU) https://ubuntu.com/USN-4577-1 - (UBUNTU) https://ubuntu.com/USN-4577-1 - Third Party Advisory

14 Jan 2021, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-01-14 01:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-16119

Mitre link : CVE-2020-16119

CVE.ORG link : CVE-2020-16119


JSON object : View

Products Affected

linux

  • linux_kernel

canonical

  • ubuntu_linux

debian

  • debian_linux
CWE
CWE-416

Use After Free