Linux

Linux

6776 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 05.09.2025 17:20:58
  • Zuletzt bearbeitet 03.11.2025 18:16:41

In the Linux kernel, the following vulnerability has been resolved: smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy() We can't call destroy_workqueue(smb_direct_wq); before stop_sessions()! Otherwise already existing conne...

  • EPSS 0.05%
  • Veröffentlicht 05.09.2025 17:20:57
  • Zuletzt bearbeitet 03.11.2025 18:16:41

In the Linux kernel, the following vulnerability has been resolved: fs/buffer: fix use-after-free when call bh_read() helper There's issue as follows: BUG: KASAN: stack-out-of-bounds in end_buffer_read_sync+0xe3/0x110 Read of size 8 at addr ffffc90...

  • EPSS 0.02%
  • Veröffentlicht 05.09.2025 17:20:56
  • Zuletzt bearbeitet 25.11.2025 21:29:08

In the Linux kernel, the following vulnerability has been resolved: iio: accel: sca3300: fix uninitialized iio scan data Fix potential leak of uninitialized stack data to userspace by ensuring that the `channels` array is zeroed before use.

  • EPSS 0.05%
  • Veröffentlicht 05.09.2025 17:20:55
  • Zuletzt bearbeitet 03.11.2025 18:16:39

In the Linux kernel, the following vulnerability has been resolved: ftrace: Also allocate and copy hash for reading of filter files Currently the reader of set_ftrace_filter and set_ftrace_notrace just adds the pointer to the global tracer hash to ...

  • EPSS 0.05%
  • Veröffentlicht 05.09.2025 17:20:54
  • Zuletzt bearbeitet 03.11.2025 18:16:39

In the Linux kernel, the following vulnerability has been resolved: iio: light: as73211: Ensure buffer holes are zeroed Given that the buffer is copied to a kfifo that ultimately user space can read, ensure we zero it.

  • EPSS 0.04%
  • Veröffentlicht 05.09.2025 17:20:53
  • Zuletzt bearbeitet 03.11.2025 18:16:39

In the Linux kernel, the following vulnerability has been resolved: comedi: Make insn_rw_emulate_bits() do insn->n samples The `insn_rw_emulate_bits()` function is used as a default handler for `INSN_READ` instructions for subdevices that have a ha...

  • EPSS 0.04%
  • Veröffentlicht 05.09.2025 17:20:51
  • Zuletzt bearbeitet 03.11.2025 18:16:39

In the Linux kernel, the following vulnerability has been resolved: comedi: pcl726: Prevent invalid irq number The reproducer passed in an irq number(0x80008000) that was too large, which triggered the oob. Added an interrupt number check to preve...

  • EPSS 0.04%
  • Veröffentlicht 05.09.2025 17:20:50
  • Zuletzt bearbeitet 03.11.2025 18:16:39

In the Linux kernel, the following vulnerability has been resolved: comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl() syzbot reports a KMSAN kernel-infoleak in `do_insn_ioctl()`. A kernel buffer is allocated to hol...

  • EPSS 0.05%
  • Veröffentlicht 05.09.2025 17:20:49
  • Zuletzt bearbeitet 03.11.2025 18:16:39

In the Linux kernel, the following vulnerability has been resolved: tracing: Limit access to parser->buffer when trace_get_user failed When the length of the string written to set_ftrace_filter exceeds FTRACE_BUFF_MAX, the following KASAN alarm wil...

  • EPSS 0.04%
  • Veröffentlicht 05.09.2025 17:20:48
  • Zuletzt bearbeitet 03.11.2025 18:16:38

In the Linux kernel, the following vulnerability has been resolved: tls: fix handling of zero-length records on the rx_list Each recvmsg() call must process either - only contiguous DATA records (any number of them) - one non-DATA record If the ...