Linux

Linux Kernel

12290 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.12%
  • Published 17.02.2021 02:15:12
  • Last modified 21.11.2024 05:57:04

An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of g...

  • EPSS 0.11%
  • Published 17.02.2021 01:15:13
  • Last modified 21.11.2024 05:57:04

An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error enco...

  • EPSS 0.08%
  • Published 10.02.2021 20:15:15
  • Last modified 21.11.2024 05:06:48

Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable ...

  • EPSS 1.07%
  • Published 05.02.2021 14:15:18
  • Last modified 21.11.2024 05:56:42

A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the com...

  • EPSS 0.1%
  • Published 01.02.2021 04:15:14
  • Last modified 21.11.2024 06:21:21

nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID...

Exploit
  • EPSS 0.21%
  • Published 29.01.2021 17:15:12
  • Last modified 21.11.2024 06:21:21

An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.

  • EPSS 0.05%
  • Published 26.01.2021 18:15:54
  • Last modified 21.11.2024 05:27:28

A flaw incorrect umask during file or directory modification in the Linux kernel NFS (network file system) functionality was found in the way user create and delete object using NFSv4.2 or newer if both simultaneously accessing the NFS by the other p...

  • EPSS 0.39%
  • Published 19.01.2021 07:15:13
  • Last modified 21.11.2024 06:21:04

fs/nfsd/nfs3xdr.c in the Linux kernel through 5.10.8, when there is an NFS export of a subdirectory of a filesystem, allows remote attackers to traverse to other parts of the filesystem via READDIRPLUS. NOTE: some parties argue that such a subdirecto...

  • EPSS 0.05%
  • Published 14.01.2021 01:15:13
  • Last modified 21.11.2024 05:06:47

Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-...

  • EPSS 0.2%
  • Published 13.01.2021 04:15:12
  • Last modified 21.11.2024 05:22:41

In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c938...