Linux

Linux Kernel

13879 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 09.03.2009 21:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The shm_get_stat function in ipc/shm.c in the shm subsystem in the Linux kernel before 2.6.28.5, when CONFIG_SHMEM is disabled, misinterprets the data type of an inode, which allows local users to cause a denial of service (system hang) via an SHM_IN...

  • EPSS 0.05%
  • Veröffentlicht 06.03.2009 11:30:02
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 06.03.2009 11:30:02
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2)...

  • EPSS 0.24%
  • Veröffentlicht 27.02.2009 17:30:09
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting thi...

  • EPSS 0.1%
  • Veröffentlicht 27.02.2009 17:30:09
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The ext4_group_add function in fs/ext4/resize.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not properly initialize the group descriptor during a resize (aka resize2fs) operation, which might allow local users to cause...

  • EPSS 0.25%
  • Veröffentlicht 27.02.2009 17:30:09
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The make_indexed_dir function in fs/ext4/namei.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate a certain rec_len field, which allows local users to cause a denial of service (OOPS) by attempting to mount a c...

  • EPSS 0.1%
  • Veröffentlicht 27.02.2009 17:30:09
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The ext4_isize function in fs/ext4/ext4.h in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 uses the i_size_high structure member during operations on arbitrary types of files, which allows local users to cause a denial of servic...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 27.02.2009 17:30:09
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and...

  • EPSS 0.17%
  • Veröffentlicht 22.02.2009 22:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The skfp_ioctl function in drivers/net/skfp/skfddi.c in the Linux kernel before 2.6.28.6 permits SKFP_CLR_STATS requests only when the CAP_NET_ADMIN capability is absent, instead of when this capability is present, which allows local users to reset t...

  • EPSS 0.18%
  • Veröffentlicht 22.02.2009 22:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt...