Linux

Linux

5625 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Published 01.05.2024 13:15:50
  • Last modified 08.04.2025 19:42:55

In the Linux kernel, the following vulnerability has been resolved: tmpfs: fix race on handling dquot rbtree A syzkaller reproducer found a race while attempting to remove dquot information from the rb tree. Fetching the rb_tree root node must als...

  • EPSS 0.01%
  • Published 01.05.2024 13:15:50
  • Last modified 08.04.2025 19:42:41

In the Linux kernel, the following vulnerability has been resolved: nouveau: lock the client object tree. It appears the client object tree has no locking unless I've missed something else. Fix races around adding/removing client objects, mostly vr...

  • EPSS 0.02%
  • Published 01.05.2024 13:15:50
  • Last modified 18.09.2025 15:48:53

In the Linux kernel, the following vulnerability has been resolved: leds: trigger: netdev: Fix kernel panic on interface rename trig notify Commit d5e01266e7f5 ("leds: trigger: netdev: add additional specific link speed mode") in the various change...

  • EPSS 0.03%
  • Published 01.05.2024 13:15:50
  • Last modified 21.11.2024 09:03:47

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not compare internal table flags on updates Restore skipping transaction if table update does not modify flags.

  • EPSS 0.02%
  • Published 01.05.2024 13:15:50
  • Last modified 18.09.2025 16:56:30

In the Linux kernel, the following vulnerability has been resolved: virtio: packed: fix unmap leak for indirect desc table When use_dma_api and premapped are true, then the do_unmap is false. Because the do_unmap is false, vring_unmap_extra_packed...

  • EPSS 0.02%
  • Published 01.05.2024 13:15:50
  • Last modified 18.09.2025 16:55:15

In the Linux kernel, the following vulnerability has been resolved: xen/evtchn: avoid WARN() when unbinding an event channel When unbinding a user event channel, the related handler might be called a last time in case the kernel was built with CONF...

  • EPSS 0.03%
  • Published 01.05.2024 13:15:50
  • Last modified 18.09.2025 16:52:04

In the Linux kernel, the following vulnerability has been resolved: ovl: relax WARN_ON in ovl_verify_area() syzbot hit an assertion in copy up data loop which looks like it is the result of a lower file whose size is being changed underneath overla...

  • EPSS 0.18%
  • Published 01.05.2024 13:15:49
  • Last modified 08.04.2025 18:42:15

In the Linux kernel, the following vulnerability has been resolved: spi: spi-mt65xx: Fix NULL pointer access in interrupt handler The TX buffer in spi_transfer can be a NULL pointer, so the interrupt handler may end up writing to the invalid memory...

  • EPSS 0.03%
  • Published 01.05.2024 13:15:49
  • Last modified 08.04.2025 18:41:55

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid potential panic during recovery During recovery, if FAULT_BLOCK is on, it is possible that f2fs_reserve_new_block() will return -ENOSPC during recovery, then it ...

  • EPSS 0.01%
  • Published 01.05.2024 13:15:49
  • Last modified 18.09.2025 14:44:23

In the Linux kernel, the following vulnerability has been resolved: f2fs: compress: fix to cover normal cluster write with cp_rwsem When we overwrite compressed cluster w/ normal cluster, we should not unlock cp_rwsem during f2fs_write_raw_pages(),...