
Cloud Vulnerability DB
A community-led vulnerabilities database
There is a use-after-free vulnerability in the Linux kernel through version 5.5.2 in the n_tty_receive_buf_common function located in drivers/tty/n_tty.c. The vulnerability was discovered in February 2020 (NVD, MITRE).
The vulnerability is a race condition in the virtual terminal driver implementation that could result in a use-after-free condition. The issue specifically affects the n_tty_receive_buf_common function in the drivers/tty/n_tty.c file (Ubuntu, Debian).
A local attacker with access to a virtual terminal could exploit this vulnerability to cause a denial of service (system crash or memory corruption) or potentially escalate privileges on the system (Ubuntu, Debian).
The vulnerability has been fixed in multiple Linux distributions through security updates. Ubuntu has released fixes in versions 5.3.0-51.44 for 19.10, 4.15.0-99.100 for 18.04 LTS, and 4.4.0-178.208 for 16.04 LTS. Debian has addressed it in version 4.9.210-1+deb9u1 for Stretch (Ubuntu, Debian).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."