Vulnerabilities > Linux > Linux Kernel > 2.0.23
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-04-07 | CVE-2020-11608 | NULL Pointer Dereference vulnerability in multiple products An issue was discovered in the Linux kernel before 5.6.1. | 4.9 |
2020-04-06 | CVE-2020-11565 | Out-of-bounds Write vulnerability in multiple products An issue was discovered in the Linux kernel through 5.6.2. | 6.0 |
2020-03-24 | CVE-2020-10942 | Out-of-bounds Write vulnerability in multiple products In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls. | 5.4 |
2020-02-20 | CVE-2011-4915 | Information Exposure vulnerability in Linux Kernel fs/proc/base.c in the Linux kernel through 3.1 allows local users to obtain sensitive keystroke information via access to /proc/interrupts. | 2.1 |
2020-02-19 | CVE-2012-0055 | Missing Authorization vulnerability in Linux Kernel OverlayFS in the Linux kernel before 3.0.0-16.28, as used in Ubuntu 10.0.4 LTS and 11.10, is missing inode security checks which could allow attackers to bypass security restrictions and perform unauthorized actions. | 7.2 |
2020-02-14 | CVE-2020-8992 | Excessive Iteration vulnerability in multiple products ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size. | 4.9 |
2020-02-12 | CVE-2012-0810 | Resource Exhaustion vulnerability in Linux Kernel The int3 handler in the Linux kernel before 3.3 relies on a per-CPU debug stack, which allows local users to cause a denial of service (stack corruption and panic) via a crafted application that triggers certain lock contention. | 4.9 |
2020-02-11 | CVE-2009-4067 | Classic Buffer Overflow vulnerability in Linux Kernel Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel before 2.6.27 allows physically proximate attackers to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system. | 7.2 |
2020-02-06 | CVE-2020-8649 | Use After Free vulnerability in multiple products There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c. | 3.6 |
2020-02-06 | CVE-2020-8648 | Use After Free vulnerability in multiple products There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c. | 3.6 |