Linux

Linux

6776 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 18.06.2025 11:00:51
  • Zuletzt bearbeitet 14.11.2025 18:12:44

In the Linux kernel, the following vulnerability has been resolved: s390: fix double free of GS and RI CBs on fork() failure The pointers for guarded storage and runtime instrumentation control blocks are stored in the thread_struct of the associat...

  • EPSS 0.03%
  • Veröffentlicht 18.06.2025 11:00:51
  • Zuletzt bearbeitet 14.11.2025 18:12:31

In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: avoid corrupting page->mapping in hugetlb_mcopy_atomic_pte In MCOPY_ATOMIC_CONTINUE case with a non-shared VMA, pages in the page cache are installed in the ptes. But ...

  • EPSS 0.02%
  • Veröffentlicht 18.06.2025 11:00:50
  • Zuletzt bearbeitet 14.11.2025 18:12:59

In the Linux kernel, the following vulnerability has been resolved: xen/privcmd: fix error exit of privcmd_ioctl_dm_op() The error exit of privcmd_ioctl_dm_op() is calling unlock_pages() potentially with pages being NULL, leading to a NULL derefere...

  • EPSS 0.02%
  • Veröffentlicht 18.06.2025 11:00:49
  • Zuletzt bearbeitet 18.06.2025 15:15:20

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.02%
  • Veröffentlicht 18.06.2025 11:00:48
  • Zuletzt bearbeitet 14.11.2025 18:13:10

In the Linux kernel, the following vulnerability has been resolved: md: call __md_stop_writes in md_stop From the link [1], we can see raid1d was running even after the path raid_dtr -> md_stop -> __md_stop. Let's stop write first in destructor to...

  • EPSS 0.02%
  • Veröffentlicht 18.06.2025 11:00:47
  • Zuletzt bearbeitet 14.11.2025 18:14:04

In the Linux kernel, the following vulnerability has been resolved: bpf: Don't use tnum_range on array range checking for poke descriptors Hsin-Wei reported a KASAN splat triggered by their BPF runtime fuzzer which is based on a customized syzkalle...

  • EPSS 0.01%
  • Veröffentlicht 18.06.2025 11:00:47
  • Zuletzt bearbeitet 14.11.2025 18:13:45

In the Linux kernel, the following vulnerability has been resolved: scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq storvsc_error_wq workqueue should not be marked as WQ_MEM_RECLAIM as it doesn't need to make forward progress under memor...

  • EPSS 0.02%
  • Veröffentlicht 18.06.2025 11:00:46
  • Zuletzt bearbeitet 14.11.2025 18:14:15

In the Linux kernel, the following vulnerability has been resolved: HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report It is possible for a malicious device to forgo submitting a Feature Report. The HID Steam driver presently...

  • EPSS 0.02%
  • Veröffentlicht 18.06.2025 11:00:45
  • Zuletzt bearbeitet 14.11.2025 18:14:32

In the Linux kernel, the following vulnerability has been resolved: udmabuf: Set the DMA mask for the udmabuf device (v2) If the DMA mask is not set explicitly, the following warning occurs when the userspace tries to access the dma-buf via the CPU...

  • EPSS 0.01%
  • Veröffentlicht 18.06.2025 11:00:44
  • Zuletzt bearbeitet 14.11.2025 18:14:49

In the Linux kernel, the following vulnerability has been resolved: media: pvrusb2: fix memory leak in pvr_probe The error handling code in pvr2_hdw_create forgets to unregister the v4l2 device. When pvr2_hdw_create returns back to pvr2_context_cre...