Linux

Linux Kernel

15173 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 20.10.2008 17:59:26
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The i915 driver in (1) drivers/char/drm/i915_dma.c in the Linux kernel 2.6.24 on Debian GNU/Linux and (2) sys/dev/pci/drm/i915_drv.c in OpenBSD does not restrict the DRM_I915_HWS_ADDR ioctl to the Direct Rendering Manager (DRM) master, which allows l...

  • EPSS 1.88%
  • Veröffentlicht 20.10.2008 17:59:26
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vect...

  • EPSS 0.06%
  • Veröffentlicht 15.10.2008 20:07:42
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The do_splice_from function in fs/splice.c in the Linux kernel before 2.6.27 does not reject file descriptors that have the O_APPEND flag set, which allows local users to bypass append mode and make arbitrary changes to other locations in the file.

  • EPSS 4.82%
  • Veröffentlicht 15.10.2008 20:07:42
  • Zuletzt bearbeitet 23.04.2026 00:35:47

sctp in Linux kernel before 2.6.25.18 allows remote attackers to cause a denial of service (OOPS) via an INIT-ACK that states the peer does not support AUTH, which causes the sctp_process_init function to clean up active transports and triggers the O...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 06.10.2008 19:54:36
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The sctp_auth_ep_set_hmacs function in net/sctp/auth.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, does not verify that the identifier index is within...

  • EPSS 0.04%
  • Veröffentlicht 03.10.2008 17:41:40
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain s...

  • EPSS 0.06%
  • Veröffentlicht 03.10.2008 17:41:40
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The vmi_write_ldt_entry function in arch/x86/kernel/vmi_32.c in the Virtual Machine Interface (VMI) in the Linux kernel 2.6.26.5 invokes write_idt_entry where write_ldt_entry was intended, which allows local users to cause a denial of service (persis...

Exploit
  • EPSS 11.3%
  • Veröffentlicht 29.09.2008 17:17:29
  • Zuletzt bearbeitet 23.04.2026 00:35:47

fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspec...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 29.09.2008 17:17:29
  • Zuletzt bearbeitet 23.04.2026 00:35:47

fs/splice.c in the splice subsystem in the Linux kernel before 2.6.22.2 does not properly handle a failure of the add_to_page_cache_lru function, and subsequently attempts to unlock a page that was not locked, which allows local users to cause a deni...

Exploit
  • EPSS 0.35%
  • Veröffentlicht 27.09.2008 10:30:03
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The error-reporting functionality in (1) fs/ext2/dir.c, (2) fs/ext3/dir.c, and possibly (3) fs/ext4/dir.c in the Linux kernel 2.6.26.5 does not limit the number of printk console messages that report directory corruption, which allows physically prox...