Linux

Linux

7024 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 26.02.2025 07:01:33
  • Zuletzt bearbeitet 01.10.2025 20:16:50

In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix data-races around sysctl_fib_multipath_hash_fields. While reading sysctl_fib_multipath_hash_fields, it can be changed concurrently. Thus, we need to add READ_ONCE() to i...

  • EPSS 0.03%
  • Veröffentlicht 26.02.2025 07:01:33
  • Zuletzt bearbeitet 01.10.2025 20:16:50

In the Linux kernel, the following vulnerability has been resolved: udp: Fix a data-race around sysctl_udp_l3mdev_accept. While reading sysctl_udp_l3mdev_accept, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

  • EPSS 0.03%
  • Veröffentlicht 26.02.2025 07:01:33
  • Zuletzt bearbeitet 01.10.2025 20:16:50

In the Linux kernel, the following vulnerability has been resolved: ip: Fix data-races around sysctl_ip_prot_sock. sysctl_ip_prot_sock is accessed concurrently, and there is always a chance of data-race. So, all readers and writers need some basic...

  • EPSS 0.02%
  • Veröffentlicht 26.02.2025 07:01:33
  • Zuletzt bearbeitet 01.10.2025 20:16:50

In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix data-races around sysctl_fib_multipath_hash_policy. While reading sysctl_fib_multipath_hash_policy, it can be changed concurrently. Thus, we need to add READ_ONCE() to i...

  • EPSS 0.03%
  • Veröffentlicht 26.02.2025 07:01:33
  • Zuletzt bearbeitet 01.10.2025 20:16:51

In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix a data-race around sysctl_fib_multipath_use_neigh. While reading sysctl_fib_multipath_use_neigh, it can be changed concurrently. Thus, we need to add READ_ONCE() to its ...

  • EPSS 0.03%
  • Veröffentlicht 26.02.2025 07:01:33
  • Zuletzt bearbeitet 22.10.2025 19:10:40

In the Linux kernel, the following vulnerability has been resolved: be2net: Fix buffer overflow in be_get_module_eeprom be_cmd_read_port_transceiver_data assumes that it is given a buffer that is at least PAGE_DATA_LEN long, or twice that if the mo...

  • EPSS 0.04%
  • Veröffentlicht 26.02.2025 07:01:33
  • Zuletzt bearbeitet 01.10.2025 20:16:51

In the Linux kernel, the following vulnerability has been resolved: net: dsa: fix NULL pointer dereference in dsa_port_reset_vlan_filtering The "ds" iterator variable used in dsa_port_reset_vlan_filtering() -> dsa_switch_for_each_port() overwrites ...

  • EPSS 0.03%
  • Veröffentlicht 26.02.2025 07:01:33
  • Zuletzt bearbeitet 01.10.2025 20:16:51

In the Linux kernel, the following vulnerability has been resolved: iavf: Fix handling of dummy receive descriptors Fix memory leak caused by not handling dummy receive descriptor properly. iavf_get_rx_buffer now sets the rx_buffer return value for...

  • EPSS 0.03%
  • Veröffentlicht 26.02.2025 07:01:33
  • Zuletzt bearbeitet 22.10.2025 19:10:55

In the Linux kernel, the following vulnerability has been resolved: ixgbe: Add locking to prevent panic when setting sriov_numvfs to zero It is possible to disable VFs while the PF driver is processing requests from the VF driver. This can result ...

  • EPSS 0.02%
  • Veröffentlicht 26.02.2025 07:01:32
  • Zuletzt bearbeitet 01.10.2025 20:16:46

In the Linux kernel, the following vulnerability has been resolved: crypto: qat - add param check for RSA Reject requests with a source buffer that is bigger than the size of the key. This is to prevent a possible integer underflow that might happe...