Show filters
4,171 Total Results
Displaying 171-180 of 4,171
Sort by:
Attacker Value
Unknown
CVE-2021-3444
Disclosure Date: March 23, 2021 (last updated February 22, 2025)
The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.
0
Attacker Value
Unknown
CVE-2020-27171
Disclosure Date: March 20, 2021 (last updated February 22, 2025)
An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.
0
Attacker Value
Unknown
CVE-2020-27170
Disclosure Date: March 20, 2021 (last updated February 22, 2025)
An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.
0
Attacker Value
Unknown
CVE-2021-27364
Disclosure Date: March 07, 2021 (last updated February 22, 2025)
An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.
0
Attacker Value
Unknown
CVE-2021-25683
Disclosure Date: February 02, 2021 (last updated February 22, 2025)
It was discovered that the get_starttime() function in data/apport did not properly parse the /proc/pid/stat file from the kernel.
0
Attacker Value
Unknown
CVE-2021-25682
Disclosure Date: February 02, 2021 (last updated February 22, 2025)
It was discovered that the get_pid_info() function in data/apport did not properly parse the /proc/pid/status file from the kernel.
0
Attacker Value
Unknown
CVE-2021-25684
Disclosure Date: February 02, 2021 (last updated February 22, 2025)
It was discovered that apport in data/apport did not properly open a report file to prevent hanging reads on a FIFO.
0
Attacker Value
Unknown
CVE-2020-29385
Disclosure Date: December 26, 2020 (last updated February 22, 2025)
GNOME gdk-pixbuf (aka GdkPixbuf) before 2.42.2 allows a denial of service (infinite loop) in lzw.c in the function write_indexes. if c->self_code equals 10, self->code_table[10].extends will assign the value 11 to c. The next execution in the loop will assign self->code_table[11].extends to c, which will give the value of 10. This will make the loop run infinitely. This bug can, for example, be triggered by calling this function with a GIF image with LZW compression that is crafted in a special way.
0
Attacker Value
Unknown
CVE-2020-16128
Disclosure Date: December 08, 2020 (last updated February 22, 2025)
The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.
0
Attacker Value
Unknown
CVE-2020-27349
Disclosure Date: December 08, 2020 (last updated February 22, 2025)
Aptdaemon performed policykit checks after interacting with potentially untrusted files with elevated privileges. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.
0