CVE-2020-16119

Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.
References
Link Resource
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=01872cb896c76cedeabe93a08456976ab55ad695 Patch Third Party Advisory
https://launchpad.net/bugs/1883840 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html Third Party Advisory
https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza%40canonical.com/T/
https://security.netapp.com/advisory/ntap-20210304-0006/ Third Party Advisory
https://ubuntu.com/USN-4576-1 Third Party Advisory
https://ubuntu.com/USN-4577-1 Third Party Advisory
https://ubuntu.com/USN-4578-1 Third Party Advisory
https://ubuntu.com/USN-4579-1 Third Party Advisory
https://ubuntu.com/USN-4580-1 Third Party Advisory
https://www.debian.org/security/2021/dsa-4978 Third Party Advisory
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=01872cb896c76cedeabe93a08456976ab55ad695 Patch Third Party Advisory
https://launchpad.net/bugs/1883840 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html Third Party Advisory
https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza%40canonical.com/T/
https://security.netapp.com/advisory/ntap-20210304-0006/ Third Party Advisory
https://ubuntu.com/USN-4576-1 Third Party Advisory
https://ubuntu.com/USN-4577-1 Third Party Advisory
https://ubuntu.com/USN-4578-1 Third Party Advisory
https://ubuntu.com/USN-4579-1 Third Party Advisory
https://ubuntu.com/USN-4580-1 Third Party Advisory
https://www.debian.org/security/2021/dsa-4978 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:06

Type Values Removed Values Added
References () https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=01872cb896c76cedeabe93a08456976ab55ad695 - Patch, Third Party Advisory () https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=01872cb896c76cedeabe93a08456976ab55ad695 - Patch, Third Party Advisory
References () https://launchpad.net/bugs/1883840 - Issue Tracking, Patch, Third Party Advisory () https://launchpad.net/bugs/1883840 - Issue Tracking, Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html - Third Party Advisory
References () https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza%40canonical.com/T/ - () https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza%40canonical.com/T/ -
References () https://security.netapp.com/advisory/ntap-20210304-0006/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20210304-0006/ - Third Party Advisory
References () https://ubuntu.com/USN-4576-1 - Third Party Advisory () https://ubuntu.com/USN-4576-1 - Third Party Advisory
References () https://ubuntu.com/USN-4577-1 - Third Party Advisory () https://ubuntu.com/USN-4577-1 - Third Party Advisory
References () https://ubuntu.com/USN-4578-1 - Third Party Advisory () https://ubuntu.com/USN-4578-1 - Third Party Advisory
References () https://ubuntu.com/USN-4579-1 - Third Party Advisory () https://ubuntu.com/USN-4579-1 - Third Party Advisory
References () https://ubuntu.com/USN-4580-1 - Third Party Advisory () https://ubuntu.com/USN-4580-1 - Third Party Advisory
References () https://www.debian.org/security/2021/dsa-4978 - Third Party Advisory () https://www.debian.org/security/2021/dsa-4978 - Third Party Advisory
CVSS v2 : 4.6
v3 : 7.8
v2 : 4.6
v3 : 6.3

07 Nov 2023, 03:18

Type Values Removed Values Added
References
  • {'url': 'https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza@canonical.com/T/', 'name': 'https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza@canonical.com/T/', 'tags': ['Patch', 'Vendor Advisory'], 'refsource': 'CONFIRM'}
  • () https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza%40canonical.com/T/ -

Information

Published : 2021-01-14 01:15

Updated : 2024-11-21 05:06


NVD link : CVE-2020-16119

Mitre link : CVE-2020-16119

CVE.ORG link : CVE-2020-16119


JSON object : View

Products Affected

canonical

  • ubuntu_linux

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-416

Use After Free