Linux

Linux Kernel

14022 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 14.01.2021 01:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:47

Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-...

  • EPSS 0.28%
  • Veröffentlicht 13.01.2021 04:15:12
  • Zuletzt bearbeitet 21.11.2024 05:22:41

In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c938...

  • EPSS 0.58%
  • Veröffentlicht 05.01.2021 05:15:10
  • Zuletzt bearbeitet 21.11.2024 05:28:50

mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.

Exploit
  • EPSS 0.03%
  • Veröffentlicht 15.12.2020 17:15:14
  • Zuletzt bearbeitet 21.11.2024 05:21:48

A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use...

  • EPSS 0.07%
  • Veröffentlicht 15.12.2020 17:15:14
  • Zuletzt bearbeitet 21.11.2024 05:24:13

An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to ru...

  • EPSS 0.14%
  • Veröffentlicht 11.12.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:53

A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This fl...

  • EPSS 9.89%
  • Veröffentlicht 11.12.2020 05:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:49

A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and be...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 09.12.2020 17:15:31
  • Zuletzt bearbeitet 21.11.2024 05:24:22

A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.

  • EPSS 0.26%
  • Veröffentlicht 09.12.2020 17:15:31
  • Zuletzt bearbeitet 21.11.2024 05:24:23

A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 03.12.2020 20:15:11
  • Zuletzt bearbeitet 21.11.2024 05:24:09

An issue was discovered in the Linux kernel before 5.9.3. io_uring takes a non-refcounted reference to the files_struct of the process that submitted a request, causing execve() to incorrectly optimize unshare_fd(), aka CID-0f2122045b94.