Linux

Linux Kernel

12152 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Published 15.02.2007 18:28:00
  • Last modified 09.04.2025 00:30:58

Linux kernel 2.6.x before 2.6.20 allows local users to read unreadable binaries by using the interpreter (PT_INTERP) functionality and triggering a core dump, a variant of CVE-2004-1073.

Exploit
  • EPSS 0.06%
  • Published 07.02.2007 20:28:00
  • Last modified 09.04.2025 00:30:58

umount, when running with the Linux 2.6.15 kernel on Slackware Linux 10.2, allows local users to trigger a NULL dereference and application crash by invoking the program with a pathname for a USB pen drive that was mounted and then physically removed...

  • EPSS 0.09%
  • Published 06.02.2007 19:28:00
  • Last modified 09.04.2025 00:30:58

The key serial number collision avoidance code in the key_alloc_serial function in Linux kernel 2.6.9 up to 2.6.20 allows local users to cause a denial of service (crash) via vectors that trigger a null dereference, as originally reported as "spinloc...

  • EPSS 0.08%
  • Published 30.01.2007 19:28:00
  • Last modified 09.04.2025 00:30:58

Unspecified vulnerability in the listxattr system call in Linux kernel, when a "bad inode" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors.

  • EPSS 0.05%
  • Published 30.01.2007 19:28:00
  • Last modified 09.04.2025 00:30:58

The aio_setup_ring function in Linux kernel does not properly initialize a variable, which allows local users to cause a denial of service (crash) via an unspecified error path that causes an incorrect free operation.

  • EPSS 1.15%
  • Published 30.01.2007 19:28:00
  • Last modified 09.04.2025 00:30:58

The dev_queue_xmit function in Linux kernel 2.6 can fail before calling the local_bh_disable function, which could lead to data corruption and "node lockups." NOTE: it is not clear whether this issue is exploitable.

Exploit
  • EPSS 0.06%
  • Published 12.01.2007 23:28:00
  • Last modified 09.04.2025 00:30:58

Unspecified versions of the Linux kernel allow local users to cause a denial of service (unrecoverable zombie process) via a program with certain instructions that prevent init from properly reaping a child whose parent has died.

  • EPSS 0.08%
  • Published 31.12.2006 05:00:00
  • Last modified 09.04.2025 00:30:58

The isdn_ppp_ccp_reset_alloc_state function in drivers/isdn/isdn_ppp.c in the Linux 2.4 kernel before 2.4.34-rc4 does not call the init_timer function for the ISDN PPP CCP reset state timer, which has unknown attack vectors and results in a system cr...

  • EPSS 0.05%
  • Published 31.12.2006 05:00:00
  • Last modified 09.04.2025 00:30:58

Linux kernel before 2.6.18, when running on x86_64 systems, does not properly save or restore EFLAGS during a context switch, which allows local users to cause a denial of service (crash) by causing SYSENTER to set an NT flag, which can trigger a cra...

  • EPSS 0.09%
  • Published 20.12.2006 02:28:00
  • Last modified 09.04.2025 00:30:58

The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.