Vigil@nce - Linux kernel: use after free via n_tty_receive_buf_common, analyzed on 06/02/2020

Vigil@nce - Linux kernel: use after free via n_tty_receive_buf_common, analyzed on 06/02/2020

Synthesis of the vulnerability 


An attacker can force the usage of a freed memory area via n_tty_receive_buf_common() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.Vulnerable software: Linux, openSUSE Leap, Slackware, SUSE Linux Enterprise Desktop, SLES.Severity of this announce: 2/4.Creation date: 06/02/2020.Références of this computer vulnerability: 206361, CERTFR-2020-AVI-119, CERTFR-2020-AVI-124, CERTFR-2020-AVI-130, CVE-2020-8648, openSUSE-SU-2020:0336-1, SSA:2020-086-01, SUSE-SU-2020:0511-1, SUSE-SU-2020:0558-1, SUSE-SU-2020:0559-1, SUSE-SU-2020:0560-1, SUSE-SU-2020:0580-1, SUSE-SU-2020:0649-1, SUSE-SU-2020:0667-1, SUSE-SU-2020:0688-1, SUSE-SU-2020:0836-1, VIGILANCE-VUL-31537.

Description of the vulnerability 


An attacker can force the usage of a freed memory area via n_tty_receive_buf_common() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer weakness note impacts software or systems such as Linux, openSUSE Leap, vigil linux kernel after receive common analyzed