CVE-2020-8648

There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

History

28 Jul 2022, 00:08

Type Values Removed Values Added
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html - Mailing List, Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20200924-0004/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20200924-0004/ - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html - Mailing List, Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4344-1/ - (UBUNTU) https://usn.ubuntu.com/4344-1/ - Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4346-1/ - (UBUNTU) https://usn.ubuntu.com/4346-1/ - Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2020/dsa-4698 - (DEBIAN) https://www.debian.org/security/2020/dsa-4698 - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html - Mailing List, Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4342-1/ - (UBUNTU) https://usn.ubuntu.com/4342-1/ - Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4345-1/ - (UBUNTU) https://usn.ubuntu.com/4345-1/ - Third Party Advisory
First Time Netapp hci Baseboard Management Controller
Netapp cloud Backup
Opensuse leap
Debian
Opensuse
Broadcom brocade Fabric Operating System Firmware
Debian debian Linux
Netapp
Canonical
Canonical ubuntu Linux
Broadcom
Netapp active Iq Unified Manager
Netapp solidfire Baseboard Management Controller
CPE cpe:2.3:a:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*

Information

Published : 2020-02-06 01:15

Updated : 2023-12-10 13:13


NVD link : CVE-2020-8648

Mitre link : CVE-2020-8648

CVE.ORG link : CVE-2020-8648


JSON object : View

Products Affected

debian

  • debian_linux

netapp

  • hci_baseboard_management_controller
  • active_iq_unified_manager
  • cloud_backup
  • solidfire_baseboard_management_controller

broadcom

  • brocade_fabric_operating_system_firmware

opensuse

  • leap

linux

  • linux_kernel

canonical

  • ubuntu_linux
CWE
CWE-416

Use After Free