Show filters
369 Total Results
Displaying 211-220 of 369
Sort by:
Attacker Value
Unknown

CVE-2020-29573

Disclosure Date: December 06, 2020 (last updated February 22, 2025)
sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\x00\x00\x00\x00\x00\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of "Fixed for glibc 2.33" in the 26649 reference.
Attacker Value
Unknown

CVE-2020-14305

Disclosure Date: December 02, 2020 (last updated February 22, 2025)
An out-of-bounds memory write flaw was found in how the Linux kernel’s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Attacker Value
Unknown

CVE-2020-29369

Disclosure Date: November 28, 2020 (last updated February 22, 2025)
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
Attacker Value
Unknown

CVE-2020-29370

Disclosure Date: November 28, 2020 (last updated February 22, 2025)
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
Attacker Value
Unknown

CVE-2020-29374

Disclosure Date: November 28, 2020 (last updated February 22, 2025)
An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.
Attacker Value
Unknown

CVE-2020-29368

Disclosure Date: November 28, 2020 (last updated February 22, 2025)
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
Attacker Value
Unknown

CVE-2020-15436

Disclosure Date: November 23, 2020 (last updated February 22, 2025)
Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.
Attacker Value
Unknown

CVE-2020-8739

Disclosure Date: November 12, 2020 (last updated November 28, 2024)
Use of potentially dangerous function in Intel BIOS platform sample code for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2020-8764

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Improper access control in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2020-8698

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.