Linux

Linux Kernel

12373 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 22.09.2023 14:15:45
  • Zuletzt bearbeitet 18.06.2025 15:15:22

The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of ...

  • EPSS 0.17%
  • Veröffentlicht 20.09.2023 06:15:10
  • Zuletzt bearbeitet 21.11.2024 07:58:03

Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape.

  • EPSS 0.01%
  • Veröffentlicht 18.09.2023 09:15:07
  • Zuletzt bearbeitet 21.11.2024 05:30:15

An issue was discovered in the Linux kernel before 5.8.6. drivers/media/cec/core/cec-api.c leaks one byte of kernel memory on specific hardware to unprivileged users, because of directly assigning log_addrs with a hole in the struct.

  • EPSS 0.01%
  • Veröffentlicht 13.09.2023 17:15:10
  • Zuletzt bearbeitet 21.11.2024 08:34:30

A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 12.09.2023 20:15:10
  • Zuletzt bearbeitet 13.02.2025 18:15:48

A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq...

  • EPSS 0.05%
  • Veröffentlicht 06.09.2023 14:15:12
  • Zuletzt bearbeitet 13.02.2025 18:15:46

A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. ...

  • EPSS 0.02%
  • Veröffentlicht 06.09.2023 14:15:12
  • Zuletzt bearbeitet 20.03.2025 16:59:51

A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a pare...

  • EPSS 0.02%
  • Veröffentlicht 06.09.2023 14:15:11
  • Zuletzt bearbeitet 13.02.2025 17:17:14

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. On an error when building a nftables rule, deactivating immediate expressions in nft_immediate_deactivate() c...

  • EPSS 0.08%
  • Veröffentlicht 06.09.2023 14:15:11
  • Zuletzt bearbeitet 13.02.2025 17:17:16

A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the n...

  • EPSS 0.03%
  • Veröffentlicht 06.09.2023 14:15:11
  • Zuletzt bearbeitet 13.02.2025 17:17:16

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new inst...