Linux

Linux Kernel

12198 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 11.06%
  • Published 16.11.2018 20:29:00
  • Last modified 21.11.2024 03:56:56

In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected u...

  • EPSS 0.03%
  • Published 06.11.2018 17:29:00
  • Last modified 21.11.2024 04:15:24

In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kerne...

Exploit
  • EPSS 0.4%
  • Published 30.10.2018 18:29:00
  • Last modified 21.11.2024 03:55:38

Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain f...

  • EPSS 0.04%
  • Published 29.10.2018 12:29:05
  • Last modified 21.11.2024 03:56:25

An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds c...

Exploit
  • EPSS 0.05%
  • Published 26.10.2018 18:29:00
  • Last modified 21.11.2024 03:56:22

In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_...

Exploit
  • EPSS 0.08%
  • Published 26.10.2018 17:29:00
  • Last modified 21.11.2024 04:10:54

The Linux kernel, as used in Ubuntu 18.04 LTS and Ubuntu 18.10, allows local users to obtain names of files in which they would not normally be able to access via an overlayfs mount inside of a user namespace.

Exploit
  • EPSS 1.14%
  • Published 22.10.2018 16:29:00
  • Last modified 21.11.2024 03:56:09

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a ra...

  • EPSS 0.04%
  • Published 17.10.2018 20:29:00
  • Last modified 21.11.2024 03:55:50

drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.

  • EPSS 0.05%
  • Published 17.10.2018 19:29:00
  • Last modified 21.11.2024 03:55:57

In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bi...

  • EPSS 0.09%
  • Published 08.10.2018 22:29:00
  • Last modified 21.11.2024 03:49:31

A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.