Linux

Linux Kernel

12348 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Published 16.04.2023 04:15:08
  • Last modified 05.05.2025 16:15:39

The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.

  • EPSS 1.04%
  • Published 14.04.2023 21:15:08
  • Last modified 05.05.2025 16:15:35

A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. A...

  • EPSS 0.02%
  • Published 12.04.2023 20:15:07
  • Last modified 19.03.2025 16:15:17

A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.

  • EPSS 0.03%
  • Published 12.04.2023 16:15:17
  • Last modified 13.02.2025 17:16:00

A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a ra...

  • EPSS 0.22%
  • Published 12.04.2023 12:15:07
  • Last modified 13.02.2025 17:16:00

A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while...

  • EPSS 0.02%
  • Published 11.04.2023 21:15:15
  • Last modified 21.11.2024 07:40:17

A use-after-free flaw was found in btsdio_remove in drivers\bluetooth\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.

  • EPSS 0.01%
  • Published 10.04.2023 02:15:06
  • Last modified 19.03.2025 16:15:22

An issue was discovered in arch/x86/kvm/vmx/nested.c in the Linux kernel before 6.2.8. nVMX on x86_64 lacks consistency checks for CR0 and CR4.

  • EPSS 0.02%
  • Published 06.04.2023 18:15:09
  • Last modified 05.03.2025 20:15:43

In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588569; Issue ID:...

  • EPSS 0.02%
  • Published 06.04.2023 18:15:09
  • Last modified 13.02.2025 21:15:12

In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588569; Issue ID:...

  • EPSS 0.02%
  • Published 06.04.2023 18:15:09
  • Last modified 12.02.2025 16:15:35

In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588569; Issue ID:...