Linux

Linux Kernel

12162 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 9.72%
  • Published 31.08.2015 10:59:13
  • Last modified 12.04.2025 10:46:40

The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect chec...

  • EPSS 21.23%
  • Published 31.08.2015 10:59:12
  • Last modified 12.04.2025 10:46:40

The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet f...

  • EPSS 0.22%
  • Published 31.08.2015 10:59:11
  • Last modified 12.04.2025 10:46:40

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.

  • EPSS 0.08%
  • Published 31.08.2015 10:59:10
  • Last modified 12.04.2025 10:46:40

The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late co...

  • EPSS 0.06%
  • Published 31.08.2015 10:59:09
  • Last modified 12.04.2025 10:46:40

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register, ...

  • EPSS 0.29%
  • Published 31.08.2015 10:59:08
  • Last modified 12.04.2025 10:46:40

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform improperly relies on espfix64 during nested NMI processing, which allows local users to gain privileges by triggering an NMI within a certain instruction window.

  • EPSS 1.47%
  • Published 31.08.2015 10:59:07
  • Last modified 12.04.2025 10:46:40

The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an inva...

  • EPSS 0.08%
  • Published 31.08.2015 10:59:06
  • Last modified 12.04.2025 10:46:40

Race condition in net/sctp/socket.c in the Linux kernel before 4.1.2 allows local users to cause a denial of service (list corruption and panic) via a rapid series of system calls related to sockets, as demonstrated by setsockopt calls.

  • EPSS 0.04%
  • Published 31.08.2015 10:59:05
  • Last modified 12.04.2025 10:46:40

Memory leak in the __key_link_end function in security/keys/keyring.c in the Linux kernel before 4.1.4 allows local users to cause a denial of service (memory consumption) via many add_key system calls that refer to existing keys.

  • EPSS 0.06%
  • Published 31.08.2015 10:59:04
  • Last modified 12.04.2025 10:46:40

The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing \0 character, which allows local users to obtain sensitive information via a crafted...