Linux

Linux Kernel

12201 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Published 17.10.2018 20:29:00
  • Last modified 21.11.2024 03:55:50

drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.

  • EPSS 0.05%
  • Published 17.10.2018 19:29:00
  • Last modified 21.11.2024 03:55:57

In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bi...

  • EPSS 0.09%
  • Published 08.10.2018 22:29:00
  • Last modified 21.11.2024 03:49:31

A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.

  • EPSS 0.12%
  • Published 08.10.2018 17:29:00
  • Last modified 21.11.2024 03:55:19

The Linux kernel 4.14.67 mishandles certain interaction among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets, which allows local users to cause a denial of service (memory consumption and system hang) by leveraging root access to e...

  • EPSS 0.09%
  • Published 07.10.2018 06:29:00
  • Last modified 21.11.2024 03:55:23

arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of ...

  • EPSS 0.05%
  • Published 03.10.2018 22:29:00
  • Last modified 21.11.2024 03:55:18

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwindi...

Exploit
  • EPSS 3.32%
  • Published 25.09.2018 21:29:00
  • Last modified 21.11.2024 03:49:28

An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6...

  • EPSS 6.61%
  • Published 25.09.2018 00:29:00
  • Last modified 21.11.2024 03:49:28

A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer over...

  • EPSS 0.09%
  • Published 21.09.2018 16:29:01
  • Last modified 21.11.2024 03:53:01

An issue was discovered in the Linux kernel before 4.8. Incorrect access checking in overlayfs mounts could be used by local attackers to modify or truncate files in the underlying filesystem.

Exploit
  • EPSS 2.5%
  • Published 19.09.2018 09:29:00
  • Last modified 21.11.2024 03:54:02

An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, ma...