Linux

Linux Kernel

12162 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warning Exploit
  • EPSS 1.7%
  • Published 06.12.2010 20:13:00
  • Last modified 11.04.2025 00:51:21

The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privile...

  • EPSS 0.07%
  • Published 06.12.2010 20:12:59
  • Last modified 11.04.2025 00:51:21

The io_submit_one function in fs/aio.c in the Linux kernel before 2.6.23 allows local users to cause a denial of service (NULL pointer dereference) via a crafted io_submit system call with an IOCB_FLAG_RESFD flag.

  • EPSS 0.09%
  • Published 30.11.2010 22:14:00
  • Last modified 11.04.2025 00:51:21

The snd_hdsp_hwdep_ioctl function in sound/pci/rme9652/hdsp.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HD...

  • EPSS 0.09%
  • Published 30.11.2010 22:14:00
  • Last modified 11.04.2025 00:51:21

The snd_hdspm_hwdep_ioctl function in sound/pci/rme9652/hdspm.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_...

  • EPSS 0.07%
  • Published 30.11.2010 22:14:00
  • Last modified 11.04.2025 00:51:21

The viafb_ioctl_get_viafb_info function in drivers/video/via/ioctl.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack...

  • EPSS 0.09%
  • Published 30.11.2010 22:14:00
  • Last modified 11.04.2025 00:51:21

The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3...

Exploit
  • EPSS 0.16%
  • Published 30.11.2010 21:38:23
  • Last modified 11.04.2025 00:51:21

The setup_arg_pages function in fs/exec.c in the Linux kernel before 2.6.36, when CONFIG_STACK_GROWSDOWN is used, does not properly restrict the stack memory consumption of the (1) arguments and (2) environment for a 32-bit application on a 64-bit pl...

  • EPSS 0.04%
  • Published 30.11.2010 21:38:23
  • Last modified 11.04.2025 00:51:21

Race condition in the __exit_signal function in kernel/exit.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors related to multithreaded exec, the use of a thread group leader in kernel/posix-cpu-timers...

Exploit
  • EPSS 0.1%
  • Published 29.11.2010 16:00:04
  • Last modified 11.04.2025 00:51:21

The wait_for_unix_gc function in net/unix/garbage.c in the Linux kernel before 2.6.37-rc3-next-20101125 does not properly select times for garbage collection of inflight sockets, which allows local users to cause a denial of service (system hang) via...

  • EPSS 0.09%
  • Published 29.11.2010 16:00:03
  • Last modified 11.04.2025 00:51:21

The uart_get_count function in drivers/serial/serial_core.c in the Linux kernel before 2.6.37-rc1 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory v...