Linux

Linux Kernel

12201 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 17.10.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:50

drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.

  • EPSS 0.05%
  • Veröffentlicht 17.10.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:57

In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bi...

  • EPSS 0.09%
  • Veröffentlicht 08.10.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:31

A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.

  • EPSS 0.12%
  • Veröffentlicht 08.10.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:19

The Linux kernel 4.14.67 mishandles certain interaction among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets, which allows local users to cause a denial of service (memory consumption and system hang) by leveraging root access to e...

  • EPSS 0.09%
  • Veröffentlicht 07.10.2018 06:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:23

arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of ...

  • EPSS 0.05%
  • Veröffentlicht 03.10.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:18

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwindi...

Exploit
  • EPSS 3.32%
  • Veröffentlicht 25.09.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:28

An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6...

  • EPSS 6.61%
  • Veröffentlicht 25.09.2018 00:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:28

A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer over...

  • EPSS 0.09%
  • Veröffentlicht 21.09.2018 16:29:01
  • Zuletzt bearbeitet 21.11.2024 03:53:01

An issue was discovered in the Linux kernel before 4.8. Incorrect access checking in overlayfs mounts could be used by local attackers to modify or truncate files in the underlying filesystem.

Exploit
  • EPSS 2.5%
  • Veröffentlicht 19.09.2018 09:29:00
  • Zuletzt bearbeitet 21.11.2024 03:54:02

An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, ma...