CVE-2020-12770
- EPSS 0.05%
- Published 09.05.2020 21:15:11
- Last modified 21.11.2024 05:00:15
An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.
CVE-2020-12769
- EPSS 0.06%
- Published 09.05.2020 21:15:11
- Last modified 21.11.2024 05:00:15
An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.
CVE-2020-10690
- EPSS 0.02%
- Published 08.05.2020 15:15:11
- Last modified 21.11.2024 04:55:51
There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes ...
CVE-2020-12653
- EPSS 0.21%
- Published 05.05.2020 06:15:11
- Last modified 21.11.2024 04:59:59
An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer ov...
- EPSS 0.04%
- Published 29.04.2020 13:15:11
- Last modified 21.11.2024 04:58:49
In the Linux kernel 4.19 through 5.6.7 on the s390 platform, code execution may occur because of a race condition, as demonstrated by code in enable_sacf_uaccess in arch/s390/lib/uaccess.c that fails to protect against a concurrent page table upgrade...
CVE-2020-8832
- EPSS 0.59%
- Published 10.04.2020 00:15:11
- Last modified 21.11.2024 05:39:31
The fix for the Linux kernel in Ubuntu 18.04 LTS for CVE-2019-14615 ("The Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors.") was discovered to be incomplete, meaning that in versions of th...
CVE-2020-8835
- EPSS 24.72%
- Published 02.04.2020 18:15:18
- Last modified 21.11.2024 05:39:32
In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) did not properly restrict the register bounds for 32-bit operations, leading to out-of-bounds reads and writes in kernel memory. The vulnerability also affects the Linux 5....