SB2020111914 - Release of invalid pointer or reference in Linux kernel
Published: November 19, 2020
Security Bulletin ID
SB2020111914
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Local access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Release of invalid pointer or reference (CVE-ID: CVE-2020-28941)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to release of invalid pointer or reference error within the makefile. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- http://www.openwall.com/lists/oss-security/2020/11/19/5
- https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-linus&id=d4122754442799187d5d537a9c039a49a67e57f1
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d4122754442799187d5d537a9c039a49a67e57f1
- https://www.openwall.com/lists/oss-security/2020/11/19/3
- https://github.com/torvalds/linux/commit/d4122754442799187d5d537a9c039a49a67e57f1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZF4OGZPKTAJJXWHPIFP3LHEWWEMR5LPT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TITJQPYDWZ4NB2ONJWUXW75KSQIPF35T/
- https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html