Linux » Linux Kernel : Security Vulnerabilities CVSS score between 2 and 2.99
A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.
Max Base Score | 2.6 |
Published | 2022-10-16 |
Updated | 2023-02-23 |
EPSS | 0.05% |
A flaw was found in the Linux kernel's implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.
Max Base Score | 2.3 |
Published | 2023-03-27 |
Updated | 2023-04-03 |
EPSS | 0.04% |
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
Max Base Score | 2.6 |
Published | 2021-05-11 |
Updated | 2023-04-01 |
EPSS | 0.10% |
In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.
Max Base Score | 2.4 |
Published | 2019-12-03 |
Updated | 2022-03-31 |
EPSS | 0.29% |
In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.
Max Base Score | 2.4 |
Published | 2019-12-03 |
Updated | 2020-01-18 |
EPSS | 0.14% |
** DISPUTED ** The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported.
Max Base Score | 2.5 |
Published | 2019-04-12 |
Updated | 2019-06-17 |
EPSS | 0.04% |
The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
Max Base Score | 2.3 |
Published | 2015-12-28 |
Updated | 2017-11-04 |
EPSS | 0.04% |
The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
Max Base Score | 2.3 |
Published | 2015-12-28 |
Updated | 2016-12-07 |
EPSS | 0.04% |
The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
Max Base Score | 2.3 |
Published | 2015-12-28 |
Updated | 2016-12-07 |
EPSS | 0.04% |
The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.
Max Base Score | 2.1 |
Published | 2015-11-16 |
Updated | 2023-02-13 |
EPSS | 0.05% |
The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.
Max Base Score | 2.1 |
Published | 2015-10-19 |
Updated | 2017-11-04 |
EPSS | 0.04% |
The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.
Max Base Score | 2.1 |
Published | 2015-08-31 |
Updated | 2017-09-21 |
EPSS | 0.04% |
arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register, issuing a syscall instruction, and triggering an NMI.
Max Base Score | 2.1 |
Published | 2015-08-31 |
Updated | 2016-12-22 |
EPSS | 0.04% |
The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing \0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and fs/udf/unicode.c.
Max Base Score | 2.1 |
Published | 2015-08-31 |
Updated | 2017-07-13 |
EPSS | 0.04% |
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-2013-7421.
Max Base Score | 2.1 |
Published | 2015-03-02 |
Updated | 2020-05-21 |
EPSS | 0.04% |
The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD.
Max Base Score | 2.1 |
Published | 2015-01-09 |
Updated | 2020-05-21 |
EPSS | 0.04% |
The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel memory via a crafted iso9660 image.
Max Base Score | 2.1 |
Published | 2015-01-09 |
Updated | 2023-02-13 |
EPSS | 0.04% |
The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel through 3.18.1 does not ensure that Thread Local Storage (TLS) descriptors are loaded before proceeding with other steps, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application that reads a TLS base address.
Max Base Score | 2.1 |
Published | 2014-12-26 |
Updated | 2018-01-05 |
EPSS | 0.04% |
arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.
Max Base Score | 2.1 |
Published | 2014-12-17 |
Updated | 2023-02-13 |
EPSS | 0.04% |
The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.
Max Base Score | 2.3 |
Published | 2014-06-23 |
Updated | 2020-08-21 |
EPSS | 0.04% |
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
Max Base Score | 2.1 |
Published | 2014-11-10 |
Updated | 2023-02-13 |
EPSS | 0.06% |
Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.
Max Base Score | 2.9 |
Published | 2014-03-24 |
Updated | 2019-05-10 |
EPSS | 0.09% |
The nfs_can_extend_write function in fs/nfs/write.c in the Linux kernel before 3.13.3 relies on a write delegation to extend a write operation without a certain up-to-date verification, which allows local users to obtain sensitive information from kernel memory in opportunistic circumstances by writing to a file in an NFS filesystem and then reading the same file.
Max Base Score | 2.1 |
Published | 2014-02-28 |
Updated | 2023-02-13 |
EPSS | 0.04% |
The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call.
Max Base Score | 2.1 |
Published | 2014-06-23 |
Updated | 2020-08-19 |
EPSS | 0.04% |
The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.
Max Base Score | 2.1 |
Published | 2014-05-11 |
Updated | 2020-08-21 |
EPSS | 0.04% |