Linux

Linux

6430 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 04.10.2025 15:16:36
  • Zuletzt bearbeitet 06.10.2025 14:56:47

In the Linux kernel, the following vulnerability has been resolved: ntb_netdev: Use dev_kfree_skb_any() in interrupt context TX/RX callback handlers (ntb_netdev_tx_handler(), ntb_netdev_rx_handler()) can be called in interrupt context via the DMA f...

  • EPSS 0.05%
  • Veröffentlicht 04.10.2025 15:16:35
  • Zuletzt bearbeitet 06.10.2025 14:56:47

In the Linux kernel, the following vulnerability has been resolved: macintosh: fix possible memory leak in macio_add_one_device() Afer commit 1fa5ae857bb1 ("driver core: get rid of struct device's bus_id string array"), the name of device is alloca...

  • EPSS 0.03%
  • Veröffentlicht 04.10.2025 15:16:34
  • Zuletzt bearbeitet 06.10.2025 14:56:47

In the Linux kernel, the following vulnerability has been resolved: IB/mad: Don't call to function that might sleep while in atomic context Tracepoints are not allowed to sleep, as such the following splat is generated due to call to ib_query_pkey(...

  • EPSS 0.04%
  • Veröffentlicht 04.10.2025 15:16:34
  • Zuletzt bearbeitet 06.10.2025 14:56:47

In the Linux kernel, the following vulnerability has been resolved: cpufreq: Init completion before kobject_init_and_add() In cpufreq_policy_alloc(), it will call uninitialed completion in cpufreq_sysfs_release() when kobject_init_and_add() fails. ...

  • EPSS 0.03%
  • Veröffentlicht 04.10.2025 15:16:33
  • Zuletzt bearbeitet 06.10.2025 14:56:47

In the Linux kernel, the following vulnerability has been resolved: xen/gntdev: Accommodate VMA splitting Prior to this commit, the gntdev driver code did not handle the following scenario correctly with paravirtualized (PV) Xen domains: * User pr...

  • EPSS 0.04%
  • Veröffentlicht 04.10.2025 15:16:32
  • Zuletzt bearbeitet 06.10.2025 14:56:47

In the Linux kernel, the following vulnerability has been resolved: xhci: Remove device endpoints from bandwidth list when freeing the device Endpoints are normally deleted from the bandwidth list when they are dropped, before the virt device is fr...

  • EPSS 0.05%
  • Veröffentlicht 04.10.2025 07:31:13
  • Zuletzt bearbeitet 06.10.2025 14:56:47

In the Linux kernel, the following vulnerability has been resolved: cgroup: split cgroup_destroy_wq into 3 workqueues A hung task can occur during [1] LTP cgroup testing when repeatedly mounting/unmounting perf_event and net_prio controllers with s...

  • EPSS 0.03%
  • Veröffentlicht 04.10.2025 07:31:12
  • Zuletzt bearbeitet 06.10.2025 14:56:47

In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: avoid buffer overflow in WID string configuration Fix the following copy overflow warning identified by Smatch checker. drivers/net/wireless/microchip/wilc1000/wl...

  • EPSS 0.05%
  • Veröffentlicht 04.10.2025 07:31:11
  • Zuletzt bearbeitet 06.10.2025 14:56:47

In the Linux kernel, the following vulnerability has been resolved: um: virtio_uml: Fix use-after-free after put_device in probe When register_virtio_device() fails in virtio_uml_probe(), the code sets vu_dev->registered = 1 even though the device ...

  • EPSS 0.05%
  • Veröffentlicht 04.10.2025 07:31:10
  • Zuletzt bearbeitet 06.10.2025 14:56:47

In the Linux kernel, the following vulnerability has been resolved: qed: Don't collect too many protection override GRC elements In the protection override dump path, the firmware can return far too many GRC elements, resulting in attempting to wri...