Linux

Linux

5635 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Published 21.05.2024 16:15:12
  • Last modified 19.09.2025 14:36:55

In the Linux kernel, the following vulnerability has been resolved: tipc: fix kernel warning when sending SYN message When sending a SYN message, this kernel stack trace is observed: ... [ 13.396352] RIP: 0010:_copy_from_iter+0xb4/0x550 ... [ ...

  • EPSS 0.09%
  • Published 21.05.2024 16:15:12
  • Last modified 25.09.2025 16:48:56

In the Linux kernel, the following vulnerability has been resolved: net: use a bounce buffer for copying skb->mark syzbot found arm64 builds would crash in sock_recv_mark() when CONFIG_HARDENED_USERCOPY=y x86 and powerpc are not detecting the issu...

  • EPSS 0.01%
  • Published 21.05.2024 16:15:12
  • Last modified 23.09.2025 18:54:00

In the Linux kernel, the following vulnerability has been resolved: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path syzbot reported that act_len in kalmia_send_init_packet() is uninitialized when passing it to the first usb_bulk_msg ...

  • EPSS 0.08%
  • Published 21.05.2024 16:15:12
  • Last modified 25.09.2025 16:48:01

In the Linux kernel, the following vulnerability has been resolved: freezer,umh: Fix call_usermode_helper_exec() vs SIGKILL Tetsuo-San noted that commit f5d39b020809 ("freezer,sched: Rewrite core freezer logic") broke call_usermodehelper_exec() for...

  • EPSS 0.03%
  • Published 21.05.2024 15:15:28
  • Last modified 25.09.2025 16:07:53

In the Linux kernel, the following vulnerability has been resolved: powerpc/64s: fix program check interrupt emergency stack path Emergency stack path was jumping into a 3: label inside the __GEN_COMMON_BODY macro for the normal path after it had f...

  • EPSS 0.03%
  • Published 21.05.2024 15:15:28
  • Last modified 25.09.2025 16:07:20

In the Linux kernel, the following vulnerability has been resolved: powerpc/64s: Fix unrecoverable MCE calling async handler from NMI The machine check handler is not considered NMI on 64s. The early handler is the true NMI handler, and then it sch...

  • EPSS 0.03%
  • Published 21.05.2024 15:15:28
  • Last modified 25.09.2025 16:06:44

In the Linux kernel, the following vulnerability has been resolved: x86/entry: Clear X86_FEATURE_SMAP when CONFIG_X86_SMAP=n Commit 3c73b81a9164 ("x86/entry, selftests: Further improve user entry sanity checks") added a warning if AC is set whe...

  • EPSS 0.03%
  • Published 21.05.2024 15:15:28
  • Last modified 23.09.2025 20:25:23

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix gart.bo pin_count leak gmc_v{9,10}_0_gart_disable() isn't called matched with correspoding gart_enbale function in SRIOV case. This will lead to gart.bo pin_count l...

  • EPSS 0.03%
  • Published 21.05.2024 15:15:27
  • Last modified 25.09.2025 16:09:43

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_taprio: properly cancel timer from taprio_destroy() There is a comment in qdisc_create() about us not calling ops->reset() in some cases. err_out4: /* * Any brok...

  • EPSS 0.04%
  • Published 21.05.2024 15:15:27
  • Last modified 25.09.2025 16:09:09

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: handle the case of pci_channel_io_frozen only in amdgpu_pci_resume In current code, when a PCI error state pci_channel_io_normal is detectd, it will report PCI_ERS_RESU...