Linux

Linux Kernel

13879 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 16.08.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.

Exploit
  • EPSS 1.84%
  • Veröffentlicht 12.08.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

vlan_dev.c in the VLAN code for Linux kernel 2.6.8 allows remote attackers to cause a denial of service (kernel oops from null dereference) via certain UDP packets that lead to a function call with the wrong argument, as demonstrated using snmpwalk o...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 12.08.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The find_target function in ptrace32.c in the Linux kernel 2.4.x before 2.4.29 does not properly handle a NULL return value from another function, which allows local users to cause a denial of service (kernel crash/oops) by running a 32-bit ltrace pr...

  • EPSS 2.58%
  • Veröffentlicht 08.08.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in the xdr_xcode_array2 function in xdr.c in Linux kernel 2.6.12, as used in SuSE Linux Enterprise Server 9, might allow remote attackers to cause a denial of service and possibly execute arbitrary code via crafted XDR data for the nf...

  • EPSS 0.12%
  • Veröffentlicht 04.08.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p->dir value that is larger than XFRM_POLICY_OU...

  • EPSS 0.06%
  • Veröffentlicht 02.08.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform allows local users to cause a denial of service (kernel crash) via a "non-canonical" address.

  • EPSS 0.11%
  • Veröffentlicht 11.07.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread...

  • EPSS 0.06%
  • Veröffentlicht 16.06.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The mmap function in the Linux Kernel 2.6.10 can be used to create memory maps with a start address beyond the end address, which allows local users to cause a denial of service (kernel crash).

  • EPSS 0.06%
  • Veröffentlicht 08.06.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

ptrace in Linux kernel 2.6.8.1 does not properly verify addresses on the amd64 platform, which allows local users to cause a denial of service (kernel crash).

  • EPSS 0.06%
  • Veröffentlicht 31.05.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform, when running in 32-bit compatibility mode, allows local users to cause a denial of service (kernel hang) via crafted arguments.