Vulnerabilities > Linux > Linux Kernel > 5.2.17
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-11-28 | CVE-2020-29373 | Path Traversal vulnerability in Linux Kernel An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. | 2.1 |
2020-11-28 | CVE-2020-29372 | Race Condition vulnerability in multiple products An issue was discovered in do_madvise in mm/madvise.c in the Linux kernel before 5.6.8. | 4.7 |
2020-11-28 | CVE-2020-29371 | Use of Uninitialized Resource vulnerability in Linux Kernel An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. | 2.1 |
2020-11-28 | CVE-2020-29370 | Race Condition vulnerability in multiple products An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. | 7.0 |
2020-11-28 | CVE-2020-29369 | Race Condition vulnerability in multiple products An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. | 7.0 |
2020-11-28 | CVE-2020-29368 | Race Condition vulnerability in multiple products An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. | 7.0 |
2020-11-28 | CVE-2019-20934 | Use After Free vulnerability in Linux Kernel An issue was discovered in the Linux kernel before 5.2.6. | 5.4 |
2020-11-23 | CVE-2020-15437 | NULL Pointer Dereference vulnerability in Linux Kernel The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized. | 4.9 |
2020-11-23 | CVE-2020-15436 | Use After Free vulnerability in multiple products Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field. | 6.7 |
2020-11-23 | CVE-2020-12351 | Improper Input Validation vulnerability in Linux Kernel Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. | 8.8 |