Linux

Linux

6776 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 01.04.2025 16:15:27
  • Zuletzt bearbeitet 03.11.2025 20:17:32

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree() Since commit b36e4523d4d5 ("netfilter: nf_conncount: fix garbage collection confirm race"), `cp...

  • EPSS 0.03%
  • Veröffentlicht 01.04.2025 16:15:27
  • Zuletzt bearbeitet 03.11.2025 20:17:32

In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() The bnxt_rx_pkt() updates ip_summed value at the end if checksum offload is enabled. When the XDP-MB program is attached a...

  • EPSS 0.02%
  • Veröffentlicht 01.04.2025 16:15:27
  • Zuletzt bearbeitet 01.10.2025 18:15:40

In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: fix truesize for mb-xdp-pass case When mb-xdp is set and return is XDP_PASS, packet is converted from xdp_buff to sk_buff with xdp_update_skb_shared_info() in bnxt_xdp_b...

  • EPSS 0.03%
  • Veröffentlicht 01.04.2025 16:15:27
  • Zuletzt bearbeitet 03.11.2025 20:17:32

In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing closetimeo mount option User-provided mount parameter closetimeo of type u32 is intended to have an upper limit, but before it is valida...

  • EPSS 0.03%
  • Veröffentlicht 01.04.2025 16:15:27
  • Zuletzt bearbeitet 03.11.2025 20:17:33

In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing acdirmax mount option User-provided mount parameter acdirmax of type u32 is intended to have an upper limit, but before it is validated,...

  • EPSS 0.03%
  • Veröffentlicht 01.04.2025 16:15:27
  • Zuletzt bearbeitet 03.11.2025 20:17:33

In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing acregmax mount option User-provided mount parameter acregmax of type u32 is intended to have an upper limit, but before it is validated,...

  • EPSS 0.02%
  • Veröffentlicht 01.04.2025 16:15:27
  • Zuletzt bearbeitet 31.10.2025 19:35:16

In the Linux kernel, the following vulnerability has been resolved: sched_ext: Validate prev_cpu in scx_bpf_select_cpu_dfl() If a BPF scheduler provides an invalid CPU (outside the nr_cpu_ids range) as prev_cpu to scx_bpf_select_cpu_dfl() it can ca...

  • EPSS 0.03%
  • Veröffentlicht 01.04.2025 16:15:27
  • Zuletzt bearbeitet 01.10.2025 19:15:34

In the Linux kernel, the following vulnerability has been resolved: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature Fix memory corruption due to incorrect parameter being passed to bio_init

  • EPSS 0.02%
  • Veröffentlicht 01.04.2025 16:15:27
  • Zuletzt bearbeitet 16.04.2025 14:15:24

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_free_work_struct ->interim_entry of ksmbd_work could be deleted after oplock is freed. We don't need to manage it with linked list. The interim r...

  • EPSS 0.03%
  • Veröffentlicht 01.04.2025 16:15:26
  • Zuletzt bearbeitet 01.10.2025 18:15:39

In the Linux kernel, the following vulnerability has been resolved: LoongArch: Set hugetlb mmap base address aligned with pmd size With ltp test case "testcases/bin/hugefork02", there is a dmesg error report message such as: kernel BUG at mm/huge...