Description
An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa. NOTE: Someone in the security community disagrees that this is a vulnerability because the issue “is a bug in parsing mount options which can only be specified by a privileged user, so triggering the bug does not grant any powers not already held.”
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2241-1 | linux security update |
Debian DLA |
DLA-2241-2 | linux security update |
Debian DLA |
DLA-2242-1 | linux-4.9 security update |
Debian DSA |
DSA-4667-1 | linux security update |
Debian DSA |
DSA-4698-1 | linux security update |
Ubuntu USN |
USN-4363-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4364-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4367-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4368-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4369-1 | Linux kernel vulnerabilities |
References
History
Mon, 23 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T11:35:13.515Z
Reserved: 2020-04-06T00:00:00.000Z
Link: CVE-2020-11565
Updated: 2024-08-04T11:35:13.515Z
Status : Modified
Published: 2020-04-06T01:15:12.447
Modified: 2024-11-21T04:58:09.613
Link: CVE-2020-11565
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Ubuntu USN