{"id":"CVE-2020-10732","details":"A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.","aliases":["A-170658976","ASB-A-170658976"],"modified":"2026-04-16T04:34:11.687932217Z","published":"2020-06-12T14:15:11.277Z","related":["ALSA-2020:4431","SUSE-SU-2020:14442-1","SUSE-SU-2020:1587-1","SUSE-SU-2020:1599-1","SUSE-SU-2020:1602-1","SUSE-SU-2020:1603-1","SUSE-SU-2020:1604-1","SUSE-SU-2020:1605-1","SUSE-SU-2020:1663-1","SUSE-SU-2020:2027-1","SUSE-SU-2020:2105-1","SUSE-SU-2020:2134-1","SUSE-SU-2020:2152-1","SUSE-SU-2020:2156-1","SUSE-SU-2020:2478-1","SUSE-SU-2020:2487-1","openSUSE-SU-2020:0801-1","openSUSE-SU-2020:0935-1","openSUSE-SU-2021:0242-1"],"references":[{"type":"ADVISORY","url":"https://lore.kernel.org/lkml/CAG_fn=VZZ7yUxtOGzuTLkr7wmfXWtKK9BHHYawj=rt9XWnCYvg%40mail.gmail.com/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210129-0005/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4411-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4440-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4485-1/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html"},{"type":"ADVISORY","url":"https://twitter.com/grsecurity/status/1252558055629299712"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4427-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4439-1/"},{"type":"REPORT","url":"https://github.com/google/kmsan/issues/76"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=aca969cacf07f41070d788ce2b8ca71f09d5207d"},{"type":"FIX","url":"https://github.com/ruscur/linux/commit/a95cdec9fa0c08e6eeb410d461c03af8fd1fef0a"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10732"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ruscur/linux","events":[{"introduced":"0"},{"fixed":"a95cdec9fa0c08e6eeb410d461c03af8fd1fef0a"}]},{"type":"GIT","repo":"https://github.com/ruscur/linux","events":[{"introduced":"0"},{"fixed":"a95cdec9fa0c08e6eeb410d461c03af8fd1fef0a"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-10732.json","vanir_signatures":[{"source":"https://github.com/ruscur/linux/commit/a95cdec9fa0c08e6eeb410d461c03af8fd1fef0a","signature_type":"Line","deprecated":false,"signature_version":"v1","id":"CVE-2020-10732-511d5fc3","target":{"file":"fs/binfmt_elf.c"},"digest":{"threshold":0.9,"line_hashes":["110497612160530527403063993914174505403","200521148035237612312138835802718584258","251565754673033647669578957977982994687","141562414025503136830371800170307866478"]}}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"3.16.85"}]},{"events":[{"introduced":"4.4"},{"fixed":"4.4.226"}]},{"events":[{"introduced":"4.9"},{"fixed":"4.9.226"}]},{"events":[{"introduced":"4.14"},{"fixed":"4.14.183"}]},{"events":[{"introduced":"4.19"},{"fixed":"4.19.126"}]},{"events":[{"introduced":"5.4"},{"fixed":"5.4.44"}]},{"events":[{"introduced":"5.6"},{"fixed":"5.6.16"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]},{"events":[{"introduced":"9.5"}]}],"vanir_signatures_modified":"2026-04-11T12:39:58Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"}]}