Show filters
43 Total Results
Displaying 21-30 of 43
Sort by:
Attacker Value
Unknown

CVE-2020-15436

Disclosure Date: November 23, 2020 (last updated February 22, 2025)
Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.
Attacker Value
Unknown

CVE-2020-13143

Disclosure Date: May 18, 2020 (last updated February 21, 2025)
gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal '\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.
Attacker Value
Unknown

CVE-2020-12888

Disclosure Date: May 15, 2020 (last updated February 21, 2025)
The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.
Attacker Value
Unknown

CVE-2020-12659

Disclosure Date: May 05, 2020 (last updated February 21, 2025)
An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.
Attacker Value
Unknown

CVE-2020-12465

Disclosure Date: April 29, 2020 (last updated February 21, 2025)
An array overflow was discovered in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c in the Linux kernel before 5.5.10, aka CID-b102f0c522cf. An oversized packet with too many rx fragments can corrupt memory of adjacent pages.
Attacker Value
Unknown

CVE-2020-12464

Disclosure Date: April 29, 2020 (last updated February 21, 2025)
usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.
Attacker Value
Unknown

CVE-2020-11884

Disclosure Date: April 29, 2020 (last updated February 21, 2025)
In the Linux kernel 4.19 through 5.6.7 on the s390 platform, code execution may occur because of a race condition, as demonstrated by code in enable_sacf_uaccess in arch/s390/lib/uaccess.c that fails to protect against a concurrent page table upgrade, aka CID-3f777e19d171. A crash could also occur.
Attacker Value
Unknown

CVE-2020-8832

Disclosure Date: March 05, 2020 (last updated February 21, 2025)
The fix for the Linux kernel in Ubuntu 18.04 LTS for CVE-2019-14615 ("The Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors.") was discovered to be incomplete, meaning that in versions of the kernel before 4.15.0-91.92, an attacker could use this vulnerability to expose sensitive information.
Attacker Value
Unknown

CVE-2020-9383

Disclosure Date: February 25, 2020 (last updated February 21, 2025)
An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.
Attacker Value
Unknown

CVE-2020-8648

Disclosure Date: February 06, 2020 (last updated February 21, 2025)
There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.