Linux

Linux

6776 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 27.03.2025 16:43:03
  • Zuletzt bearbeitet 01.10.2025 18:15:32

In the Linux kernel, the following vulnerability has been resolved: phy: usb: sunplus: Fix potential null-ptr-deref in sp_usb_phy_probe() sp_usb_phy_probe() will call platform_get_resource_byname() that may fail and return NULL. devm_ioremap() will...

  • EPSS 0.03%
  • Veröffentlicht 27.03.2025 16:43:02
  • Zuletzt bearbeitet 01.10.2025 20:17:10

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix a buffer overflow in mgmt_mesh_add() Smatch Warning: net/bluetooth/mgmt_util.c:375 mgmt_mesh_add() error: __memcpy() 'mesh_tx->param' too small (48 vs 50) Analysis:...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:43:02
  • Zuletzt bearbeitet 01.04.2025 15:40:57

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Prevent race during ffs_ep0_queue_wait While performing fast composition switch, there is a possibility that the process of ffs_ep0_write/ffs_ep0_read get into a...

  • EPSS 0.04%
  • Veröffentlicht 27.03.2025 16:43:01
  • Zuletzt bearbeitet 01.04.2025 15:41:09

In the Linux kernel, the following vulnerability has been resolved: dmaengine: Fix double increment of client_count in dma_chan_get() The first time dma_chan_get() is called for a channel the channel client_count is incorrectly incremented twice fo...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:43:00
  • Zuletzt bearbeitet 01.10.2025 20:17:10

In the Linux kernel, the following vulnerability has been resolved: device property: fix of node refcount leak in fwnode_graph_get_next_endpoint() The 'parent' returned by fwnode_graph_get_port_parent() with refcount incremented when 'prev' is not ...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:42:59
  • Zuletzt bearbeitet 01.10.2025 18:15:32

In the Linux kernel, the following vulnerability has been resolved: cpufreq: CPPC: Add u64 casts to avoid overflowing The fields of the _CPC object are unsigned 32-bits values. To avoid overflows while using _CPC's values, add 'u64' casts.

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:42:59
  • Zuletzt bearbeitet 01.10.2025 20:17:09

In the Linux kernel, the following vulnerability has been resolved: w1: fix WARNING after calling w1_process() I got the following WARNING message while removing driver(ds2482): ------------[ cut here ]------------ do not call blocking ops when !T...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:42:58
  • Zuletzt bearbeitet 01.10.2025 18:15:32

In the Linux kernel, the following vulnerability has been resolved: i2c: designware: use casting of u64 in clock multiplication to avoid overflow In functions i2c_dw_scl_lcnt() and i2c_dw_scl_hcnt() may have overflow by depending on the values of t...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:42:57
  • Zuletzt bearbeitet 29.10.2025 17:18:00

In the Linux kernel, the following vulnerability has been resolved: erofs/zmap.c: Fix incorrect offset calculation Effective offset to add to length was being incorrectly calculated, which resulted in iomap->length being set to 0, triggering a WARN...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:42:57
  • Zuletzt bearbeitet 01.10.2025 18:15:32

In the Linux kernel, the following vulnerability has been resolved: perf/x86/amd: fix potential integer overflow on shift of a int The left shift of int 32 bit integer constant 1 is evaluated using 32 bit arithmetic and then passed as a 64 bit func...