CVE-2020-12768
- EPSS 0.06%
- Veröffentlicht 09.05.2020 21:15:11
- Zuletzt bearbeitet 21.11.2024 05:00:14
An issue was discovered in the Linux kernel before 5.6. svm_cpu_uninit in arch/x86/kvm/svm.c has a memory leak, aka CID-d80b64ff297e. NOTE: third parties dispute this issue because it's a one-time leak at the boot, the size is negligible, and it can'...
CVE-2020-12770
- EPSS 0.04%
- Veröffentlicht 09.05.2020 21:15:11
- Zuletzt bearbeitet 21.11.2024 05:00:15
An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.
CVE-2020-12114
- EPSS 0.05%
- Veröffentlicht 04.05.2020 12:15:12
- Zuletzt bearbeitet 21.11.2024 04:59:16
A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a m...
CVE-2020-12464
- EPSS 0.08%
- Veröffentlicht 29.04.2020 18:15:13
- Zuletzt bearbeitet 21.11.2024 04:59:45
usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.
- EPSS 0.06%
- Veröffentlicht 29.04.2020 13:15:11
- Zuletzt bearbeitet 21.11.2024 04:58:49
In the Linux kernel 4.19 through 5.6.7 on the s390 platform, code execution may occur because of a race condition, as demonstrated by code in enable_sacf_uaccess in arch/s390/lib/uaccess.c that fails to protect against a concurrent page table upgrade...
CVE-2020-2732
- EPSS 0.44%
- Veröffentlicht 08.04.2020 22:15:12
- Zuletzt bearbeitet 21.11.2024 05:26:06
A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that shou...
- EPSS 0.08%
- Veröffentlicht 06.04.2020 01:15:12
- Zuletzt bearbeitet 21.11.2024 04:58:09
An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa. NOTE: Someone in the security...
CVE-2020-10942
- EPSS 0.07%
- Veröffentlicht 24.03.2020 22:15:12
- Zuletzt bearbeitet 21.11.2024 04:56:25
In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.
CVE-2019-3016
- EPSS 0.06%
- Veröffentlicht 31.01.2020 20:15:11
- Zuletzt bearbeitet 21.11.2024 04:41:59
In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.1...
CVE-2020-8428
- EPSS 0.09%
- Veröffentlicht 29.01.2020 00:15:10
- Zuletzt bearbeitet 21.11.2024 05:38:50
fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may...