Linux

Linux Kernel

15173 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.59%
  • Veröffentlicht 25.03.2009 01:30:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash o...

  • EPSS 0.3%
  • Veröffentlicht 23.03.2009 16:30:01
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The console selection feature in the Linux kernel 2.6.28 before 2.6.28.4, 2.6.25, and possibly earlier versions, when the UTF-8 console is used, allows physically proximate attackers to cause a denial of service (memory corruption) by selecting a sma...

  • EPSS 0.07%
  • Veröffentlicht 18.03.2009 02:00:08
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The inotify_read function in the Linux kernel 2.6.27 to 2.6.27.13, 2.6.28 to 2.6.28.2, and 2.6.29-rc3 allows local users to cause a denial of service (OOPS) via a read with an invalid address to an inotify instance, which causes the device's event li...

Exploit
  • EPSS 1.48%
  • Veröffentlicht 12.03.2009 15:20:49
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The icmp_send function in net/ipv4/icmp.c in the Linux kernel before 2.6.25, when configured as a router with a REJECT route, does not properly manage the Protocol Independent Destination Cache (aka DST) in some situations involving transmission of a...

  • EPSS 0.11%
  • Veröffentlicht 09.03.2009 21:30:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The shm_get_stat function in ipc/shm.c in the shm subsystem in the Linux kernel before 2.6.28.5, when CONFIG_SHMEM is disabled, misinterprets the data type of an inode, which allows local users to cause a denial of service (system hang) via an SHM_IN...

  • EPSS 0.05%
  • Veröffentlicht 06.03.2009 11:30:02
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 06.03.2009 11:30:02
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2)...

  • EPSS 0.25%
  • Veröffentlicht 27.02.2009 17:30:09
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting thi...

  • EPSS 0.1%
  • Veröffentlicht 27.02.2009 17:30:09
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The ext4_group_add function in fs/ext4/resize.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not properly initialize the group descriptor during a resize (aka resize2fs) operation, which might allow local users to cause...

  • EPSS 0.27%
  • Veröffentlicht 27.02.2009 17:30:09
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The make_indexed_dir function in fs/ext4/namei.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate a certain rec_len field, which allows local users to cause a denial of service (OOPS) by attempting to mount a c...