Linux

Linux Kernel

14022 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 05.05.2023 17:15:09
  • Zuletzt bearbeitet 05.05.2025 16:15:40

An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the syste...

  • EPSS 0.02%
  • Veröffentlicht 01.05.2023 13:15:44
  • Zuletzt bearbeitet 21.11.2024 07:58:12

A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation. The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups()...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 01.05.2023 13:15:44
  • Zuletzt bearbeitet 13.02.2025 17:16:20

A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which lea...

  • EPSS 0.04%
  • Veröffentlicht 28.04.2023 02:15:09
  • Zuletzt bearbeitet 21.11.2024 08:01:51

qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.

  • EPSS 0.09%
  • Veröffentlicht 26.04.2023 19:15:08
  • Zuletzt bearbeitet 21.11.2024 07:37:13

A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend ...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 25.04.2023 23:15:09
  • Zuletzt bearbeitet 13.02.2025 17:15:52

The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set  function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctr...

  • EPSS 0.02%
  • Veröffentlicht 25.04.2023 21:15:10
  • Zuletzt bearbeitet 21.11.2024 07:58:16

A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component.

  • EPSS 0.03%
  • Veröffentlicht 24.04.2023 23:15:18
  • Zuletzt bearbeitet 21.11.2024 07:57:45

The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges a...

  • EPSS 0.03%
  • Veröffentlicht 24.04.2023 21:15:09
  • Zuletzt bearbeitet 23.04.2025 17:16:28

A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privil...

  • EPSS 0.02%
  • Veröffentlicht 24.04.2023 21:15:09
  • Zuletzt bearbeitet 18.03.2025 20:15:19

A flaw was found in the Linux kernel's netdevsim device driver, within the scheduling of events. This issue results from the improper management of a reference count. This may allow an attacker to create a denial of service condition on the system.