Linux

Linux Kernel

12164 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.56%
  • Veröffentlicht 17.07.2017 13:18:18
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, wher...

  • EPSS 27.29%
  • Veröffentlicht 11.07.2017 23:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possi...

  • EPSS 0.08%
  • Veröffentlicht 05.07.2017 01:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized paddin...

  • EPSS 0.83%
  • Veröffentlicht 04.07.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel through 4.11.8 allows attackers to cause a denial of service (memory consumption) by triggering object-initialization failures.

  • EPSS 31.79%
  • Veröffentlicht 02.07.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering...

  • EPSS 0.11%
  • Veröffentlicht 28.06.2017 06:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The snd_msnd_interrupt function in sound/isa/msnd/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message q...

  • EPSS 0.11%
  • Veröffentlicht 28.06.2017 06:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The snd_msndmidi_input_read function in sound/isa/msnd/msnd_midi.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message ...

  • EPSS 0.1%
  • Veröffentlicht 28.06.2017 06:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The intr function in sound/oss/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer b...

  • EPSS 2.11%
  • Veröffentlicht 19.06.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the...

  • EPSS 0.08%
  • Veröffentlicht 19.06.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass...