Linux

Linux Kernel

14023 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 03.12.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:58:37

In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.

  • EPSS 0.04%
  • Veröffentlicht 26.11.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:29

The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assi...

  • EPSS 0.03%
  • Veröffentlicht 26.11.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:28

A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data ...

  • EPSS 0.11%
  • Veröffentlicht 21.11.2018 00:29:01
  • Zuletzt bearbeitet 21.11.2024 03:57:51

kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized.

  • EPSS 0.08%
  • Veröffentlicht 21.11.2018 00:29:01
  • Zuletzt bearbeitet 21.11.2024 03:57:51

The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.

Exploit
  • EPSS 12.22%
  • Veröffentlicht 16.11.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:56:56

In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected u...

  • EPSS 0.03%
  • Veröffentlicht 06.11.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:15:24

In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kerne...

Exploit
  • EPSS 0.42%
  • Veröffentlicht 30.10.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:38

Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain f...

  • EPSS 0.03%
  • Veröffentlicht 29.10.2018 12:29:05
  • Zuletzt bearbeitet 21.11.2024 03:56:25

An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds c...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 26.10.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:56:22

In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_...