Linux

Linux Kernel

12162 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 5.51%
  • Veröffentlicht 22.09.2010 19:00:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users...

  • EPSS 0.08%
  • Veröffentlicht 21.09.2010 20:00:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, which allows local users to o...

  • EPSS 0.05%
  • Veröffentlicht 21.09.2010 18:00:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Double free vulnerability in the snd_seq_oss_open function in sound/core/seq/oss/seq_oss_init.c in the Linux kernel before 2.6.36-rc4 might allow local users to cause a denial of service or possibly have unspecified other impact via an unsuccessful a...

  • EPSS 0.08%
  • Veröffentlicht 21.09.2010 18:00:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.

  • EPSS 0.05%
  • Veröffentlicht 21.09.2010 18:00:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel before 2.6.36-rc4 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an...

  • EPSS 0.06%
  • Veröffentlicht 21.09.2010 18:00:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive in...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 08.09.2010 20:00:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The keyctl_session_to_parent function in security/keys/keyctl.c in the Linux kernel 2.6.35.4 and earlier expects that a certain parent session keyring exists, which allows local users to cause a denial of service (NULL pointer dereference and system ...

  • EPSS 0.1%
  • Veröffentlicht 08.09.2010 20:00:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standa...

Exploit
  • EPSS 0.23%
  • Veröffentlicht 08.09.2010 20:00:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer overflow in net/can/bcm.c in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows attackers to execute arbitrary code o...

  • EPSS 0.06%
  • Veröffentlicht 08.09.2010 20:00:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Race condition in the tty_fasync function in drivers/char/tty_io.c in the Linux kernel before 2.6.32.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via unknown v...