First published: Thu Jan 30 2020(Updated: )
A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user to crash the system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.31.1.rt56.1169.el7 | 0:3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel | <0:3.10.0-1160.31.1.el7 | 0:3.10.0-1160.31.1.el7 |
redhat/kernel | <0:3.10.0-957.80.1.el7 | 0:3.10.0-957.80.1.el7 |
redhat/kernel | <0:3.10.0-1062.56.1.el7 | 0:3.10.0-1062.56.1.el7 |
redhat/kernel-rt | <0:4.18.0-240.rt7.54.el8 | 0:4.18.0-240.rt7.54.el8 |
redhat/kernel | <0:4.18.0-240.el8 | 0:4.18.0-240.el8 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Android | ||
Linux Kernel | <=5.5.2 | |
Debian | =8.0 | |
openSUSE | =15.1 | |
NetApp Active IQ Unified Manager for VMware vSphere | ||
netapp cloud backup | ||
netapp hci baseboard management controller | =h410c | |
netapp solidfire baseboard management controller | ||
Brocade Fabric OS | ||
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-8648 is classified as a high-severity vulnerability due to its potential to crash the system.
To fix CVE-2020-8648, you should upgrade to the patched kernel versions provided by your distribution.
CVE-2020-8648 affects various Linux kernel versions up to 5.5.2 and specific distributions like Red Hat, Ubuntu, and Debian.
No, CVE-2020-8648 is considered a local privilege escalation vulnerability, meaning it requires local access to the system.
There are no specific workarounds recommended for CVE-2020-8648; updating the kernel is the primary solution.