{"id":"CVE-2020-11565","details":"An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa. NOTE: Someone in the security community disagrees that this is a vulnerability because the issue “is a bug in parsing mount options which can only be specified by a privileged user, so triggering the bug does not grant any powers not already held.”","modified":"2026-03-12T23:42:20.692111Z","published":"2020-04-06T01:15:12.447Z","related":["ALSA-2020:4431","MGASA-2020-0183","MGASA-2020-0184"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"},{"type":"WEB","url":"https://usn.ubuntu.com/4369-1/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"},{"type":"WEB","url":"https://usn.ubuntu.com/4363-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4367-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4368-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4698"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4364-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4667"},{"type":"FIX","url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"5.6.2"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-11565.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"}]}