Linux

Linux Kernel

14023 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Veröffentlicht 26.07.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:12

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 26.07.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:12

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.

  • EPSS 0.16%
  • Veröffentlicht 26.07.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:15

A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious...

  • EPSS 0.77%
  • Veröffentlicht 26.07.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:32:09

A kernel data leak due to an out-of-bound read was found in the Linux kernel in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() functions present since version 4.7-rc1 through version 4.13. A data leak happens when these functions fill in ...

Exploit
  • EPSS 0.95%
  • Veröffentlicht 25.07.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:12

Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.

  • EPSS 0.24%
  • Veröffentlicht 18.07.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:12

Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.

Exploit
  • EPSS 0.1%
  • Veröffentlicht 16.07.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:07

Linux kernel is vulnerable to a heap-based buffer overflow in the fs/ext4/xattr.c:ext4_xattr_set_entry() function. An attacker could exploit this by operating on a mounted crafted ext4 image.

  • EPSS 0.02%
  • Veröffentlicht 11.07.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:01:29

It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass mod...

  • EPSS 0.15%
  • Veröffentlicht 06.07.2018 19:29:01
  • Zuletzt bearbeitet 21.11.2024 04:09:36

An issue was discovered in the __ns_get_path function in fs/nsfs.c in the Linux kernel before 4.11. Due to a race condition when accessing files, a Use After Free condition can occur. This also affects all Android releases from CAF using the Linux ke...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 06.07.2018 14:29:01
  • Zuletzt bearbeitet 21.11.2024 03:47:02

The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a memb...