Vulnerabilities > Linux > Linux Kernel > 5.4.130
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-02-06 | CVE-2020-8649 | Use After Free vulnerability in multiple products There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c. | 5.9 |
2020-02-06 | CVE-2020-8648 | Use After Free vulnerability in multiple products There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c. | 7.1 |
2020-02-06 | CVE-2020-8647 | Use After Free vulnerability in multiple products There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c. | 6.1 |
2020-01-31 | CVE-2019-3016 | Race Condition vulnerability in Linux Kernel In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. | 4.7 |
2020-01-29 | CVE-2020-8428 | Use After Free vulnerability in Linux Kernel fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. | 7.1 |
2019-08-19 | CVE-2018-20976 | Use After Free vulnerability in Linux Kernel An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. | 7.8 |
2019-08-19 | CVE-2016-10905 | Use After Free vulnerability in Linux Kernel An issue was discovered in fs/gfs2/rgrp.c in the Linux kernel before 4.8. | 7.8 |
2019-07-26 | CVE-2018-20854 | Out-of-bounds Read vulnerability in Linux Kernel An issue was discovered in the Linux kernel before 4.20. | 7.8 |
2019-04-22 | CVE-2019-3901 | A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. | 4.7 |
2019-04-12 | CVE-2019-11190 | Race Condition vulnerability in Linux Kernel The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. | 4.7 |