Show filters
4,171 Total Results
Displaying 171-180 of 4,171
Sort by:
Attacker Value
Unknown

CVE-2021-3444

Disclosure Date: March 23, 2021 (last updated February 22, 2025)
The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.
Attacker Value
Unknown

CVE-2020-27171

Disclosure Date: March 20, 2021 (last updated February 22, 2025)
An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.
Attacker Value
Unknown

CVE-2020-27170

Disclosure Date: March 20, 2021 (last updated February 22, 2025)
An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.
Attacker Value
Unknown

CVE-2021-27364

Disclosure Date: March 07, 2021 (last updated February 22, 2025)
An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.
Attacker Value
Unknown

CVE-2021-25683

Disclosure Date: February 02, 2021 (last updated February 22, 2025)
It was discovered that the get_starttime() function in data/apport did not properly parse the /proc/pid/stat file from the kernel.
Attacker Value
Unknown

CVE-2021-25682

Disclosure Date: February 02, 2021 (last updated February 22, 2025)
It was discovered that the get_pid_info() function in data/apport did not properly parse the /proc/pid/status file from the kernel.
Attacker Value
Unknown

CVE-2021-25684

Disclosure Date: February 02, 2021 (last updated February 22, 2025)
It was discovered that apport in data/apport did not properly open a report file to prevent hanging reads on a FIFO.
Attacker Value
Unknown

CVE-2020-29385

Disclosure Date: December 26, 2020 (last updated February 22, 2025)
GNOME gdk-pixbuf (aka GdkPixbuf) before 2.42.2 allows a denial of service (infinite loop) in lzw.c in the function write_indexes. if c->self_code equals 10, self->code_table[10].extends will assign the value 11 to c. The next execution in the loop will assign self->code_table[11].extends to c, which will give the value of 10. This will make the loop run infinitely. This bug can, for example, be triggered by calling this function with a GIF image with LZW compression that is crafted in a special way.
Attacker Value
Unknown

CVE-2020-16128

Disclosure Date: December 08, 2020 (last updated February 22, 2025)
The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.
Attacker Value
Unknown

CVE-2020-27349

Disclosure Date: December 08, 2020 (last updated February 22, 2025)
Aptdaemon performed policykit checks after interacting with potentially untrusted files with elevated privileges. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.