Linux

Linux

5625 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Published 01.05.2024 13:15:51
  • Last modified 18.09.2025 16:14:57

In the Linux kernel, the following vulnerability has been resolved: pstore: inode: Only d_invalidate() is needed Unloading a modular pstore backend with records in pstorefs would trigger the dput() double-drop warning: WARNING: CPU: 0 PID: 2569 ...

  • EPSS 0.01%
  • Published 01.05.2024 13:15:51
  • Last modified 18.09.2025 16:06:53

In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: remove one synchronize_net() barrier in ipv6_mc_down() As discussed in the past (commit 2d3916f31891 ("ipv6: fix skb drops in igmp6_event_query() and igmp6_event_repor...

  • EPSS 0.02%
  • Published 01.05.2024 13:15:51
  • Last modified 18.09.2025 16:06:27

In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: do not realloc workqueue everytime an interface is added Commit 09ed8bfc5215 ("wilc1000: Rename workqueue from "WILC_wq" to "NETDEV-wq"") moved workqueue creation i...

  • EPSS 0.01%
  • Published 01.05.2024 13:15:50
  • Last modified 08.04.2025 18:38:39

In the Linux kernel, the following vulnerability has been resolved: libbpf: Use OPTS_SET() macro in bpf_xdp_query() When the feature_flags and xdp_zc_max_segs fields were added to the libbpf bpf_xdp_query_opts, the code writing them did not use the...

  • EPSS 0.01%
  • Published 01.05.2024 13:15:50
  • Last modified 08.04.2025 19:43:24

In the Linux kernel, the following vulnerability has been resolved: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work The workqueue might still be running, when the driver is stopped. To avoid a use-after-free, call cancel_work_sync() in rtl8x...

  • EPSS 0.13%
  • Published 01.05.2024 13:15:50
  • Last modified 08.04.2025 19:43:15

In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: fix RCU usage in connect path With lockdep enabled, calls to the connect function from cfg802.11 layer lead to the following warning: =============================...

  • EPSS 0.01%
  • Published 01.05.2024 13:15:50
  • Last modified 02.05.2025 07:15:52

In the Linux kernel, the following vulnerability has been resolved: s390/dasd: fix double module refcount decrement Once the discipline is associated with the device, deleting the device takes care of decrementing the module's refcount. Doing it m...

  • EPSS 0.04%
  • Published 01.05.2024 13:15:50
  • Last modified 10.03.2025 08:15:10

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.01%
  • Published 01.05.2024 13:15:50
  • Last modified 18.09.2025 15:28:12

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: ensure offloading TID queue exists The resume code path assumes that the TX queue for the offloading TID has been configured. At resume time it then tries to sy...

  • EPSS 0.02%
  • Published 01.05.2024 13:15:50
  • Last modified 18.09.2025 15:17:53

In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend When the system is suspended while audio is active, the sof_ipc4_pcm_hw_free() is invoked to reset the pipeli...