Linux

Linux Kernel

12164 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.98%
  • Published 19.06.2017 16:29:00
  • Last modified 20.04.2025 01:37:25

The offset2lib patch as used in the Linux Kernel contains a vulnerability that allows a PIE binary to be execve()'ed with 1GB of arguments or environmental strings then the stack occupies the address 0x80000000 and the PIE binary is mapped above 0x40...

  • EPSS 2.1%
  • Published 19.06.2017 16:29:00
  • Last modified 20.04.2025 01:37:25

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as t...

  • EPSS 0.08%
  • Published 19.06.2017 16:29:00
  • Last modified 20.04.2025 01:37:25

An issue was discovered in the size of the default stack guard page on PAX Linux (originally from GRSecurity but shipped by other Linux vendors), specifically the default stack guard page is not sufficiently large and can be "jumped" over (the stack ...

  • EPSS 0.4%
  • Published 19.06.2017 16:29:00
  • Last modified 20.04.2025 01:37:25

The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack. Linux Kernel version 4.11.5 is affected.

  • EPSS 0.33%
  • Published 17.06.2017 18:29:00
  • Last modified 20.04.2025 01:37:25

sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed...

  • EPSS 0.2%
  • Published 14.06.2017 13:29:00
  • Last modified 20.04.2025 01:37:25

An elevation of privilege vulnerability in the kernel FIQ debugger could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High due to the possibility of a local permanent device c...

  • EPSS 0.23%
  • Published 14.06.2017 13:29:00
  • Last modified 20.04.2025 01:37:25

An information disclosure vulnerability in the Synaptics touchscreen driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Low because it first requires compromising a privileged pro...

  • EPSS 0.22%
  • Published 14.06.2017 13:29:00
  • Last modified 20.04.2025 01:37:25

An information disclosure vulnerability in the kernel ION subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Low because it first requires compromising a privileged process. Pr...

  • EPSS 0.11%
  • Published 13.06.2017 19:29:00
  • Last modified 20.04.2025 01:37:25

The vmw_gb_surface_define_ioctl function (accessible via DRM_IOCTL_VMW_GB_SURFACE_CREATE) in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.11.4 defines a backup_handle variable but does not give it an initial value. If one att...

  • EPSS 0.05%
  • Published 27.05.2017 01:29:02
  • Last modified 20.04.2025 01:37:25

The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via craft...