Linux

Linux

6776 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS -
  • Veröffentlicht 27.03.2025 16:43:56
  • Zuletzt bearbeitet 28.03.2025 07:15:37

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:43:51
  • Zuletzt bearbeitet 01.10.2025 18:15:36

In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix ib block iterator counter overflow When registering a new DMA MR after selecting the best aligned page size for it, we iterate over the given sglist to split each en...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:43:50
  • Zuletzt bearbeitet 05.06.2025 15:15:24

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.03%
  • Veröffentlicht 27.03.2025 16:43:49
  • Zuletzt bearbeitet 01.04.2025 15:39:10

In the Linux kernel, the following vulnerability has been resolved: net: nfc: Fix use-after-free in local_cleanup() Fix a use-after-free that occurs in kfree_skb() called from local_cleanup(). This could happen when killing nfc daemon (e.g. neard) ...

  • EPSS 0.08%
  • Veröffentlicht 27.03.2025 16:43:49
  • Zuletzt bearbeitet 28.03.2025 18:11:40

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation To mitigate Spectre v4, 2039f26f3aca ("bpf: Fix leakage due to insufficient speculative store bypass m...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:48
  • Zuletzt bearbeitet 01.10.2025 18:15:36

In the Linux kernel, the following vulnerability has been resolved: net: enetc: avoid deadlock in enetc_tx_onestep_tstamp() This lockdep splat says it better than I could: ================================ WARNING: inconsistent lock state 6.2.0-rc2...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:43:47
  • Zuletzt bearbeitet 01.10.2025 18:15:36

In the Linux kernel, the following vulnerability has been resolved: l2tp: close all race conditions in l2tp_tunnel_register() The code in l2tp_tunnel_register() is racy in several ways: 1. It modifies the tunnel socket _after_ publishing it. 2. I...

  • EPSS 0.04%
  • Veröffentlicht 27.03.2025 16:43:47
  • Zuletzt bearbeitet 01.04.2025 15:40:10

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_taprio: fix possible use-after-free syzbot reported a nasty crash [1] in net_tx_action() which made little sense until we got a repro. This repro installs a taprio ...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:43:46
  • Zuletzt bearbeitet 30.10.2025 16:20:36

In the Linux kernel, the following vulnerability has been resolved: net: mdio: validate parameter addr in mdiobus_get_phy() The caller may pass any value as addr, what may result in an out-of-bounds access to array mdio_map. One existing case is st...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:43:45
  • Zuletzt bearbeitet 01.10.2025 18:15:35

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sync: fix memory leak in hci_update_adv_data() When hci_cmd_sync_queue() failed in hci_update_adv_data(), inst_ptr is not freed, which will cause memory leak, conver...