Page 449 of 2885 results (0.019 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The acpi_ps_complete_final_op() function in drivers/acpi/acpica/psobject.c in the Linux kernel through 4.12.9 does not flush the node and node_ext caches and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table. La función acpi_ps_complete_final_op() en drivers/acpi/acpica/psobject.c en el kernel Linux en su versión 4.12.9 no vacía las cachés node y node_ext y provoca un volcado de pila de kernel, lo que permite que usuarios locales obtengan información sensible de la memoria del kernel y omitan el mecanismo de protección KASLR (en la versión 4.9 del kernel) mediante una tabla ACPI manipulada. • http://www.securityfocus.com/bid/100500 https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0 https://patchwork.kernel.org/patch/9806085 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The acpi_ds_create_operands() function in drivers/acpi/acpica/dsutils.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table. La función acpi_ds_create_operands() en drivers/acpi/acpica/dsutils.c en el kernel Linux en su versión 4.12.9 no vacía la caché operand y provoca un volcado de pila de kernel, lo que permite que usuarios locales obtengan información sensible de la memoria del kernel y omitan el mecanismo de protección KASLR (en la versión 4.9 del kernel) mediante una tabla ACPI manipulada. • http://www.securityfocus.com/bid/100502 https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732 https://patchwork.kernel.org/patch/9919053 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table. La función acpi_ns_evaluate() en drivers/acpi/acpica/nseval.c en el kernel Linux en su versión 4.12.9 no vacía la caché operativa y provoca un volcado de pila de kernel, lo que permite que usuarios locales obtengan información sensible de la memoria del kernel y omitan el mecanismo de protección KASLR (en la versión 4.9 del kernel) mediante una tabla ACPI manipulada. • http://www.securityfocus.com/bid/100497 https://github.com/acpica/acpica/pull/296/commits/37f2c716f2c6ab14c3ba557a539c3ee3224931b5 https://patchwork.kernel.org/patch/9850567 https://usn.ubuntu.com/3696-1 https://usn.ubuntu.com/3696-2 https://usn.ubuntu.com/3762-1 https://usn.ubuntu.com/3762-2 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.6EPSS: 0%CPEs: 13EXPL: 1

Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing. Una condición de carrera en fs/timerfd.c en el kernel Linux en versiones anteriores a la 4.10.15 permite que usuarios locales obtengan privilegios o provoquen una denegación de servicio (corrupción de lista o use-after-free) mediante operaciones simultáneas de descriptor de archivo que aprovechan la cola inadecuada might_cancel. A race condition was found in the Linux kernel before version 4.11-rc1 in 'fs/timerfd.c' file which allows a local user to cause a kernel list corruption or use-after-free via simultaneous operations with a file descriptor which leverage improper 'might_cancel' queuing. An unprivileged local user could use this flaw to cause a denial of service of the system. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely. • https://www.exploit-db.com/exploits/43345 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e38da300e1e395a15048b0af1e5305bd91402f6 http://www.debian.org/security/2017/dsa-3981 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.15 http://www.securityfocus.com/bid/100215 https://access.redhat.com/errata/RHSA-2018:3083 https://access.redhat.com/errata/RHSA-2018:3096 https://access.redhat.com/errata/RHSA-2019:4057 https://access.redhat.com/e • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

The sanity_check_raw_super function in fs/f2fs/super.c in the Linux kernel before 4.11.1 does not validate the segment count, which allows local users to gain privileges via unspecified vectors. La función sanity_check_raw_super en fs/f2fs/super.c en el kernel Linux en versiones anteriores a la 4.11.1 no valida el conteo de segmentos, lo que permite que usuarios locales obtengan privilegios mediante vectores sin especificar. • http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9dd46188edc2f0d1f37328637860bb65a771124 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.1 http://www.securityfocus.com/bid/100215 https://bugzilla.redhat.com/show_bug.cgi?id=1481146 https://github.com/torvalds/linux/commit/b9dd46188edc2f0d1f37328637860bb65a771124 https://source.android.com/security/bulletin/2017-08-01 •