Linux

Linux Kernel

12164 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Published 16.10.2017 18:29:00
  • Last modified 20.04.2025 01:37:25

Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clie...

  • EPSS 0.06%
  • Published 14.10.2017 23:29:00
  • Last modified 20.04.2025 01:37:25

The KEYS subsystem in the Linux kernel through 4.13.7 mishandles use of add_key for a key that already exists but is uninstantiated, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have un...

  • EPSS 0.09%
  • Published 12.10.2017 00:29:00
  • Last modified 20.04.2025 01:37:25

The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial...

  • EPSS 0.08%
  • Published 12.10.2017 00:29:00
  • Last modified 20.04.2025 01:37:25

security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ...

  • EPSS 0.06%
  • Published 11.10.2017 15:29:00
  • Last modified 20.04.2025 01:37:25

arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS ...

  • EPSS 0.09%
  • Published 05.10.2017 01:29:04
  • Last modified 20.04.2025 01:37:25

Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_...

  • EPSS 83.64%
  • Published 05.10.2017 01:29:04
  • Last modified 20.04.2025 01:37:25

Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from...

Warning
  • EPSS 55.57%
  • Published 05.10.2017 01:29:04
  • Last modified 20.04.2025 01:37:25

Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4f...

  • EPSS 0.06%
  • Published 04.10.2017 01:29:03
  • Last modified 20.04.2025 01:37:25

The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel before 4.13.4 allows local users to obtain sensitive information from uninitialized kernel heap-memory locations via an SG_GET_REQUEST_TABLE ioctl call for /dev/sg0.

  • EPSS 0.97%
  • Published 02.10.2017 01:29:00
  • Last modified 20.04.2025 01:37:25

The waitid implementation in kernel/exit.c in the Linux kernel through 4.13.4 accesses rusage data structures in unintended cases, which allows local users to obtain sensitive information, and bypass the KASLR protection mechanism, via a crafted syst...