
CVE-2020-10766 – kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection.
https://notcve.org/view.php?id=CVE-2020-10766
07 Jul 2020 — A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality. Se encontró un fallo de bug lógico en el kern... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10766 • CWE-440: Expected Behavior Violation •

CVE-2020-10767 – kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available.
https://notcve.org/view.php?id=CVE-2020-10767
07 Jul 2020 — A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality. Se encontró un fallo en el kernel de Linux versiones anterior... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10767 • CWE-440: Expected Behavior Violation •

CVE-2020-14416 – openSUSE Security Advisory - openSUSE-SU-2021:0242-1
https://notcve.org/view.php?id=CVE-2020-14416
18 Jun 2020 — In the Linux kernel before 5.4.16, a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c. En el kernel de Linux versiones anteriores a 5.4.16, una condición de carrera en el manejo de tty-)disc_data en la disciplina de línea slip y slcan podría conllevar a un uso de la memoria previamente liberada, también se conoce como CID-0ace17d56824. Esto afecta a los archiv... • http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-416: Use After Free •

CVE-2020-10732 – kernel: uninitialized kernel data leak in userspace coredumps
https://notcve.org/view.php?id=CVE-2020-10732
12 Jun 2020 — A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data. Se encontró un fallo en la implementación de los volcados de núcleo del Userspace del kernel de Linux. Este fallo permite a un atacante con una cuenta local bloquear un programa trivial y exfiltrar datos privados del kernel A flaw was found in the Linux kernel’s implementation of Userspace core dumps. This flaw allows ... • http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html • CWE-908: Use of Uninitialized Resource •

CVE-2020-13974 – kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c
https://notcve.org/view.php?id=CVE-2020-13974
09 Jun 2020 — An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case. Se detectó un problema en el kernel de Linux versión 4.4 hasta la versión 5.7.1. En el archivo drivers/tty/vt/keyboard.c presenta un desbordamiento de enteros si se llama a la función k_ascii varias veces seguidas, tambié... • http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html • CWE-190: Integer Overflow or Wraparound •

CVE-2019-20811 – kernel: net-sysfs: *_queue_add_kobject refcount issue
https://notcve.org/view.php?id=CVE-2019-20811
03 Jun 2020 — An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c. Se detectó un problema en el kernel de Linux versiones anteriores a 5.0.6. En la funciones rx_queue_add_kobject() y netdev_queue_add_kobject() en el archivo net/core/net-sysfs.c, un reconteo de referencias es manejado inapropiadamente, también se conoce como CID-a3e23f719f5c. A flaw was found in the way the rx_queue... • https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.6 • CWE-460: Improper Cleanup on Thrown Exception •

CVE-2019-20812 – kernel: af_packet: TPACKET_V3: invalid timer timeout on error
https://notcve.org/view.php?id=CVE-2019-20812
03 Jun 2020 — An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067. Se detectó un problema en el kernel de Linux versiones anteriores a 5.4.7. La función prb_calc_retire_blk_tmo() en el archivo net/packet/af_packet.c puede resultar en una denegación de servicio (consumo de CPU y bloqueo suave) en un caso de fallo que ... • http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html • CWE-400: Uncontrolled Resource Consumption •

CVE-2019-20810 – Ubuntu Security Notice USN-4427-1
https://notcve.org/view.php?id=CVE-2019-20810
02 Jun 2020 — go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586. La función go7007_snd_init en el archivo driversdrivers/media/usb/go7007/snd-go7007.c en el kernel de Linux versiones anteriores a 5.6, no llama a snd_card_free para una ruta de fallo, lo que causa una pérdida de memoria, también se conoce como CID-9453264ef586. It was discovered that the network block device implementation ... • http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html • CWE-401: Missing Release of Memory after Effective Lifetime •

CVE-2019-20806 – Debian Security Advisory 4698-1
https://notcve.org/view.php?id=CVE-2019-20806
27 May 2020 — An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75. Se descubrió un problema en el kernel de Linux versiones anteriores a la versión 5.2. Tiene una desreferencia del puntero NULL en la función tw5864_handle_frame() en el archivo drivers/media/pci/tw5864/tw5864-video.c, que puede causar una denegación de servicio, también se conoce como CID-2e76... • http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html • CWE-476: NULL Pointer Dereference •

CVE-2020-12888 – Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario
https://notcve.org/view.php?id=CVE-2020-12888
15 May 2020 — The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space. El controlador VFIO PCI en el kernel de Linux versiones hasta 5.6.13, maneja inapropiadamente los intentos para acceder al espacio de memoria deshabilitado. A flaw was found in the Linux kernel, where it allows userspace processes, for example, a guest VM, to directly access h/w devices via its VFIO driver modules. The VFIO modules allow users to enable or disable access to the devices' MMIO memory ad... • http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html • CWE-248: Uncaught Exception CWE-755: Improper Handling of Exceptional Conditions •