Linux

Linux Kernel

12198 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.18%
  • Veröffentlicht 27.06.2018 11:29:00
  • Zuletzt bearbeitet 21.11.2024 03:46:04

In arch/x86/kvm/vmx.c in the Linux kernel before 4.17.2, when nested virtualization is used, local attackers could cause L1 KVM guests to VMEXIT, potentially allowing privilege escalations and denial of service attacks due to lack of checking of CPL.

  • EPSS 0.19%
  • Veröffentlicht 26.06.2018 14:29:02
  • Zuletzt bearbeitet 21.11.2024 03:39:55

Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in ...

Exploit
  • EPSS 1.2%
  • Veröffentlicht 24.06.2018 23:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:43

An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index ...

  • EPSS 0.03%
  • Veröffentlicht 22.06.2018 00:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:34

An issue was discovered in the Linux kernel through 4.17.2. vbg_misc_device_ioctl() in drivers/virt/vboxguest/vboxguest_linux.c reads the same user data twice with copy_from_user. The header part of the user data is double-fetched, and a malicious us...

  • EPSS 0.11%
  • Veröffentlicht 21.06.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 02:44:35

An issue was discovered in the Linux kernel through 4.17.2. Since the page allocator does not yield CPU resources to the owner of the oom_lock mutex, a local unprivileged user can trivially lock up the system forever by wasting CPU resources from the...

Exploit
  • EPSS 0.99%
  • Veröffentlicht 20.06.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:13

A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w...

  • EPSS 0.06%
  • Veröffentlicht 12.06.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:26

In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the "_sctp_make_chunk()" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.

  • EPSS 0.03%
  • Veröffentlicht 12.06.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:27

In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by s...

  • EPSS 3.3%
  • Veröffentlicht 12.06.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:49

In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment t...

  • EPSS 0.08%
  • Veröffentlicht 12.06.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:49

In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered b...