Linux

Linux Kernel

12290 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Published 26.05.2022 17:15:08
  • Last modified 21.11.2024 06:41:40

A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially ...

  • EPSS 0.89%
  • Published 25.05.2022 15:15:07
  • Last modified 21.11.2024 06:41:14

An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.

Exploit
  • EPSS 0.02%
  • Published 18.05.2022 17:15:08
  • Last modified 21.11.2024 06:41:21

A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.

Exploit
  • EPSS 0.16%
  • Published 17.05.2022 17:15:08
  • Last modified 21.11.2024 06:40:04

Integer Overflow or Wraparound vulnerability in io_uring of Linux Kernel allows local attacker to cause memory corruption and escalate privileges to root. This issue affects: Linux Kernel versions prior to 5.4.189; version 5.4.24 and later versions.

Exploit
  • EPSS 0.25%
  • Published 17.05.2022 17:15:08
  • Last modified 21.11.2024 06:59:20

Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.

  • EPSS 0.08%
  • Published 16.05.2022 18:15:08
  • Last modified 21.11.2024 06:41:14

A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate the...

Exploit
  • EPSS 0.02%
  • Published 12.05.2022 05:15:06
  • Last modified 21.11.2024 07:02:59

The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.

  • EPSS 0.02%
  • Published 05.05.2022 15:15:07
  • Last modified 21.11.2024 06:40:52

A NULL pointer dereference flaw was found in the Linux kernel’s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allo...

  • EPSS 0.02%
  • Published 03.05.2022 21:15:09
  • Last modified 21.11.2024 06:42:09

In MM service, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330...

  • EPSS 0.02%
  • Published 03.05.2022 21:15:09
  • Last modified 21.11.2024 06:42:10

In MM service, there is a possible out of bounds write due to a heap-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV033304...