Linux

Linux Kernel

12152 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.26%
  • Published 23.03.2009 16:30:01
  • Last modified 09.04.2025 00:30:58

The console selection feature in the Linux kernel 2.6.28 before 2.6.28.4, 2.6.25, and possibly earlier versions, when the UTF-8 console is used, allows physically proximate attackers to cause a denial of service (memory corruption) by selecting a sma...

  • EPSS 0.07%
  • Published 18.03.2009 02:00:08
  • Last modified 09.04.2025 00:30:58

The inotify_read function in the Linux kernel 2.6.27 to 2.6.27.13, 2.6.28 to 2.6.28.2, and 2.6.29-rc3 allows local users to cause a denial of service (OOPS) via a read with an invalid address to an inotify instance, which causes the device's event li...

Exploit
  • EPSS 1.65%
  • Published 12.03.2009 15:20:49
  • Last modified 09.04.2025 00:30:58

The icmp_send function in net/ipv4/icmp.c in the Linux kernel before 2.6.25, when configured as a router with a REJECT route, does not properly manage the Protocol Independent Destination Cache (aka DST) in some situations involving transmission of a...

  • EPSS 0.06%
  • Published 09.03.2009 21:30:00
  • Last modified 09.04.2025 00:30:58

The shm_get_stat function in ipc/shm.c in the shm subsystem in the Linux kernel before 2.6.28.5, when CONFIG_SHMEM is disabled, misinterprets the data type of an inode, which allows local users to cause a denial of service (system hang) via an SHM_IN...

  • EPSS 0.06%
  • Published 06.03.2009 11:30:02
  • Last modified 09.04.2025 00:30:58

The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass...

Exploit
  • EPSS 0.19%
  • Published 06.03.2009 11:30:02
  • Last modified 09.04.2025 00:30:58

The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2)...

  • EPSS 0.22%
  • Published 27.02.2009 17:30:09
  • Last modified 09.04.2025 00:30:58

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting thi...

  • EPSS 0.06%
  • Published 27.02.2009 17:30:09
  • Last modified 09.04.2025 00:30:58

The ext4_group_add function in fs/ext4/resize.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not properly initialize the group descriptor during a resize (aka resize2fs) operation, which might allow local users to cause...

  • EPSS 0.17%
  • Published 27.02.2009 17:30:09
  • Last modified 09.04.2025 00:30:58

The make_indexed_dir function in fs/ext4/namei.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate a certain rec_len field, which allows local users to cause a denial of service (OOPS) by attempting to mount a c...

  • EPSS 0.06%
  • Published 27.02.2009 17:30:09
  • Last modified 09.04.2025 00:30:58

The ext4_isize function in fs/ext4/ext4.h in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 uses the i_size_high structure member during operations on arbitrary types of files, which allows local users to cause a denial of servic...