Linux

Linux Kernel

12162 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 25.06.2014 11:19:21
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value.

  • EPSS 0.04%
  • Veröffentlicht 23.06.2014 11:21:20
  • Zuletzt bearbeitet 12.04.2025 10:46:40

mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hol...

  • EPSS 0.04%
  • Veröffentlicht 23.06.2014 11:21:20
  • Zuletzt bearbeitet 12.04.2025 10:46:40

arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscal...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 23.06.2014 11:21:19
  • Zuletzt bearbeitet 12.04.2025 10:46:40

arch/mips/include/asm/thread_info.h in the Linux kernel before 3.14.8 on the MIPS platform does not configure _TIF_SECCOMP checks on the fast system-call path, which allows local users to bypass intended PR_SET_SECCOMP restrictions by executing a cra...

  • EPSS 0.09%
  • Veröffentlicht 23.06.2014 11:21:18
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveragin...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 23.06.2014 11:21:17
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The __do_follow_link function in fs/namei.c in the Linux kernel before 2.6.33 does not properly handle the last pathname component during use of certain filesystems, which allows local users to cause a denial of service (incorrect free operations and...

  • EPSS 0.15%
  • Veröffentlicht 23.06.2014 11:21:17
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/med...

  • EPSS 1.91%
  • Veröffentlicht 23.06.2014 11:21:17
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The capabilities implementation in the Linux kernel before 3.14.8 does not properly consider that namespaces are inapplicable to inodes, which allows local users to bypass intended chmod restrictions by first creating a user namespace, as demonstrate...

Warnung Exploit
  • EPSS 80.51%
  • Veröffentlicht 07.06.2014 14:55:27
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe wai...

  • EPSS 0.09%
  • Veröffentlicht 05.06.2014 17:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a lar...