Suse

Linux Enterprise Real Time

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warning Media report Exploit
  • EPSS 23.61%
  • Published 30.06.2025 00:00:00
  • Last modified 30.09.2025 13:30:30

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

  • EPSS 0.12%
  • Published 27.04.2022 14:15:09
  • Last modified 21.11.2024 06:55:28

In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.

  • EPSS 0.07%
  • Published 11.01.2011 03:00:02
  • Last modified 11.04.2025 00:51:21

Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in the Linux kernel allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted iovec struct in a Reliable Datagram Sockets (RDS) request,...

Exploit
  • EPSS 0.23%
  • Published 08.09.2010 20:00:03
  • Last modified 11.04.2025 00:51:21

Integer overflow in net/can/bcm.c in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows attackers to execute arbitrary code o...

Exploit
  • EPSS 0.08%
  • Published 08.09.2010 20:00:02
  • Last modified 11.04.2025 00:51:21

The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows local users to obtain p...

Exploit
  • EPSS 18.38%
  • Published 14.08.2009 15:16:27
  • Last modified 09.04.2025 00:30:58

The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using ...