Linux

Linux Kernel

12290 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.05%
  • Veröffentlicht 14.10.2022 00:15:09
  • Zuletzt bearbeitet 21.11.2024 07:25:13

In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.

Exploit
  • EPSS 0.25%
  • Veröffentlicht 13.10.2022 23:15:11
  • Zuletzt bearbeitet 15.05.2025 21:15:48

A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.

Exploit
  • EPSS 0.97%
  • Veröffentlicht 09.10.2022 23:15:09
  • Zuletzt bearbeitet 21.11.2024 07:25:10

mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.

  • EPSS 0.06%
  • Veröffentlicht 08.10.2022 11:15:10
  • Zuletzt bearbeitet 21.11.2024 07:19:30

A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initi...

  • EPSS 0.06%
  • Veröffentlicht 30.09.2022 06:15:12
  • Zuletzt bearbeitet 21.11.2024 07:23:56

drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_di...

  • EPSS 0.03%
  • Veröffentlicht 30.09.2022 06:15:12
  • Zuletzt bearbeitet 21.11.2024 07:23:56

roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report->value is in progress.

  • EPSS 0.03%
  • Veröffentlicht 30.09.2022 06:15:11
  • Zuletzt bearbeitet 20.05.2025 20:15:27

drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgsl...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 27.09.2022 23:15:15
  • Zuletzt bearbeitet 21.05.2025 16:15:28

A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use t...

  • EPSS 0.07%
  • Veröffentlicht 26.09.2022 15:15:26
  • Zuletzt bearbeitet 21.05.2025 20:15:28

off-by-one in io_uring module.

  • EPSS 0.1%
  • Veröffentlicht 23.09.2022 11:15:09
  • Zuletzt bearbeitet 21.11.2024 07:01:41

There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbit...