Oracle

Linux

225 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.05%
  • Veröffentlicht 30.05.2025 13:13:26
  • Zuletzt bearbeitet 27.08.2025 17:16:21

A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, suc...

  • EPSS 0.07%
  • Veröffentlicht 02.05.2025 21:52:09
  • Zuletzt bearbeitet 04.06.2025 13:15:24

In the Linux kernel, the following vulnerability has been resolved: scsi: target: Fix WRITE_SAME No Data Buffer crash In newer version of the SBC specs, we have a NDOB bit that indicates there is no data buffer that gets written out. If this bit is...

  • EPSS 0.05%
  • Veröffentlicht 24.12.2024 19:15:06
  • Zuletzt bearbeitet 18.06.2025 20:42:10

In the linux kernel, if IMA appraisal is used with the "ima_appraise=log" boot param, lockdown can be defeated with kexec on any machine when Secure Boot is disabled or unavailable. IMA prevents setting "ima_appraise=log" from the boot param when Sec...

  • EPSS 0.04%
  • Veröffentlicht 20.09.2023 21:15:11
  • Zuletzt bearbeitet 21.11.2024 07:44:07

In the Unbreakable Enterprise Kernel (UEK), the RDS module in UEK has two setsockopt(2) options, RDS_CONN_RESET and RDS6_CONN_RESET, that are not re-entrant. A malicious local user with CAP_NET_ADMIN can use this to crash the kernel. CVSS 3.1 Base S...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 29.08.2022 21:15:09
  • Zuletzt bearbeitet 21.11.2024 06:44:34

A flaw in net_rds_alloc_sgs() in Oracle Linux kernels allows unprivileged local users to crash the machine. CVSS 3.1 Base Score 6.2 (Availability impacts). CVSS Vector (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

  • EPSS 0.08%
  • Veröffentlicht 14.06.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:44:50

The code in UEK6 U3 was missing an appropiate file descriptor count to be missing. This resulted in a use count error that allowed a file descriptor to a socket to be closed and freed while it was still in use by another portion of the kernel. An att...

  • EPSS 0.14%
  • Veröffentlicht 09.06.2022 21:15:07
  • Zuletzt bearbeitet 21.11.2024 06:44:50

KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is...

  • EPSS 0.02%
  • Veröffentlicht 16.02.2022 17:15:11
  • Zuletzt bearbeitet 21.11.2024 06:21:49

A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privile...

  • EPSS 0.06%
  • Veröffentlicht 24.09.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:03:10

Vulnerability in Oracle Linux (component: OSwatcher). Supported versions that are affected are 7 and 8. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Linux executes to compromise Oracle ...

Exploit
  • EPSS 0.27%
  • Veröffentlicht 09.10.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:17

Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.