Unrated severityNVD Advisory· Published Nov 19, 2020· Updated Aug 4, 2024
CVE-2020-28941
CVE-2020-28941
Description
An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once.
Affected products
36- Linux/Linux kerneldescription
- osv-coords35 versionspkg:rpm/opensuse/kernel-debug&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-default-base&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-docs&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-obs-build&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-obs-qa&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-preempt&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-rt_debug&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-rt&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-source&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-source-rt&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-syms&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-syms-rt&distro=openSUSE%20Leap%2015.2pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP2pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP2pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/kernel-livepatch-SLE15-SP2_Update_8&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP2pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP2pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP2pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP2pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP2
< 5.3.18-lp152.54.1+ 34 more
- (no CPE)range: < 5.3.18-lp152.54.1
- (no CPE)range: < 5.3.18-lp152.54.1.lp152.8.12.1
- (no CPE)range: < 5.3.18-lp152.54.1
- (no CPE)range: < 5.3.18-lp152.54.2
- (no CPE)range: < 5.3.18-lp152.54.1
- (no CPE)range: < 5.3.18-lp152.54.1
- (no CPE)range: < 5.3.18-lp152.54.1
- (no CPE)range: < 5.3.18-lp152.54.1
- (no CPE)range: < 5.3.18-lp152.3.5.1
- (no CPE)range: < 5.3.18-lp152.3.5.1
- (no CPE)range: < 5.3.18-lp152.54.1
- (no CPE)range: < 5.3.18-lp152.3.5.1
- (no CPE)range: < 5.3.18-lp152.54.1
- (no CPE)range: < 5.3.18-lp152.3.5.1
- (no CPE)range: < 5.3.18-18.29.1
- (no CPE)range: < 5.3.18-24.43.2.9.17.3
- (no CPE)range: < 5.3.18-24.43.2
- (no CPE)range: < 5.3.18-24.43.2
- (no CPE)range: < 5.3.18-24.43.2
- (no CPE)range: < 5.3.18-24.43.2
- (no CPE)range: < 5.3.18-24.43.2
- (no CPE)range: < 5.3.18-24.43.2
- (no CPE)range: < 1-5.3.3
- (no CPE)range: < 5.3.18-24.43.2
- (no CPE)range: < 5.3.18-24.43.2
- (no CPE)range: < 5.3.18-24.43.2
- (no CPE)range: < 5.3.18-19.1
- (no CPE)range: < 5.3.18-19.1
- (no CPE)range: < 5.3.18-18.29.1
- (no CPE)range: < 5.3.18-24.43.2
- (no CPE)range: < 5.3.18-24.43.2
- (no CPE)range: < 5.3.18-19.1
- (no CPE)range: < 5.3.18-18.29.1
- (no CPE)range: < 5.3.18-24.43.2
- (no CPE)range: < 5.3.18-19.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TITJQPYDWZ4NB2ONJWUXW75KSQIPF35T/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZF4OGZPKTAJJXWHPIFP3LHEWWEMR5LPT/mitrevendor-advisoryx_refsource_FEDORA
- www.openwall.com/lists/oss-security/2020/11/19/5mitremailing-listx_refsource_MLIST
- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/mitrex_refsource_MISC
- git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/mitrex_refsource_MISC
- github.com/torvalds/linux/commit/d4122754442799187d5d537a9c039a49a67e57f1mitrex_refsource_MISC
- lists.debian.org/debian-lts-announce/2020/12/msg00015.htmlmitremailing-listx_refsource_MLIST
- www.openwall.com/lists/oss-security/2020/11/19/3mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.