3.6
CVSSv2

CVE-2020-8648

Published: 06/02/2020 Updated: 28/07/2022
CVSS v2 Base Score: 3.6 | Impact Score: 4.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.1 | Impact Score: 5.2 | Exploitability Score: 1.8
VMScore: 320
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

There is a use-after-free vulnerability in the Linux kernel up to and including 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

debian debian linux 8.0

opensuse leap 15.1

netapp cloud backup -

netapp active iq unified manager -

netapp solidfire baseboard management controller -

broadcom brocade fabric operating system firmware -

netapp hci baseboard management controller h410c

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

canonical ubuntu linux 14.04

Vendor Advisories

Synopsis Moderate: kernel-rt security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS ...
Synopsis Moderate: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for kernel is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Syst ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2019-2182 Hanjun Guo and Lei Li reported a race condition in the arm64 virtual memory management code, which could lead to an information disclosure, denial of service (crash), or possibl ...
Several security issues were fixed in the Linux kernel ...
There is a use-after-free vulnerability in the Linux kernel through 552 in the n_tty_receive_buf_common function in drivers/tty/n_ttyc (CVE-2020-8648) A flaw was found in the way KVM hypervisor handled instruction emulation for the L2 guest when nested(=1) virtualization is enabled In the instruction emulation, the L2 guest could trick the L0 ...
There is a use-after-free vulnerability in the Linux kernel through 552 in the n_tty_receive_buf_common function in drivers/tty/n_ttyc(CVE-2020-8648) ...
A flaw was found in the way KVM hypervisor handled instruction emulation for the L2 guest when nested(=1) virtualization is enabled In the instruction emulation, the L2 guest could trick the L0 hypervisor into accessing sensitive bits of the L1 hypervisor An L2 guest could use this flaw to potentially access information of the L1 hypervisor (CVE ...
There is a use-after-free vulnerability in the Linux kernel through 552 in the n_tty_receive_buf_common function in drivers/tty/n_ttyc(CVE-2020-8648) ...
There is a use-after-free vulnerability in the Linux kernel through 552 in the n_tty_receive_buf_common function in drivers/tty/n_ttyc(CVE-2020-8648) ...