Linux

Linux Kernel

12164 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 10.07.2025 08:15:09
  • Zuletzt bearbeitet 10.07.2025 13:17:30

In the Linux kernel, the following vulnerability has been resolved: powerpc/bpf: fix JIT code size calculation of bpf trampoline arch_bpf_trampoline_size() provides JIT size of the BPF trampoline before the buffer for JIT'ing it is allocated. The t...

  • EPSS 0.04%
  • Veröffentlicht 10.07.2025 08:15:08
  • Zuletzt bearbeitet 10.07.2025 13:17:30

In the Linux kernel, the following vulnerability has been resolved: jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() Since handle->h_transaction may be a NULL pointer, so we should change it to call is_handle_aborted(handle) ...

  • EPSS 0.05%
  • Veröffentlicht 10.07.2025 08:15:07
  • Zuletzt bearbeitet 28.08.2025 15:15:48

In the Linux kernel, the following vulnerability has been resolved: Input: gpio-keys - fix a sleep while atomic with PREEMPT_RT When enabling PREEMPT_RT, the gpio_keys_irq_timer() callback runs in hard irq context, but the input_event() takes a spi...

  • EPSS 0.04%
  • Veröffentlicht 10.07.2025 08:15:07
  • Zuletzt bearbeitet 10.07.2025 13:17:30

In the Linux kernel, the following vulnerability has been resolved: ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330 The controller has a hardware bug that can hard hang the system when doing ATAPI DMAs without any trace of what happened...

  • EPSS 0.03%
  • Veröffentlicht 10.07.2025 08:15:06
  • Zuletzt bearbeitet 10.07.2025 13:17:30

In the Linux kernel, the following vulnerability has been resolved: x86/sgx: Prevent attempts to reclaim poisoned pages TL;DR: SGX page reclaim touches the page to copy its contents to secondary storage. SGX instructions do not gracefully handle ma...

  • EPSS 0.04%
  • Veröffentlicht 10.07.2025 08:15:05
  • Zuletzt bearbeitet 10.07.2025 13:17:30

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buf...

  • EPSS 0.03%
  • Veröffentlicht 10.07.2025 08:15:05
  • Zuletzt bearbeitet 10.07.2025 13:17:30

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to bail out in get_new_segment() ------------[ cut here ]------------ WARNING: CPU: 3 PID: 579 at fs/f2fs/segment.c:2832 new_curseg+0x5e8/0x6dc pc : new_curseg+0x5e8/0x6d...

  • EPSS 0.03%
  • Veröffentlicht 10.07.2025 08:15:04
  • Zuletzt bearbeitet 10.07.2025 13:17:30

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: cortina: Use TOE/TSO on all TCP It is desireable to push the hardware accelerator to also process non-segmented TCP frames: we pass the skb->len to the "TOE/TSO" off...

  • EPSS 0.03%
  • Veröffentlicht 10.07.2025 08:15:03
  • Zuletzt bearbeitet 10.07.2025 13:17:30

In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Fix OOB memory read access in KUnit test (ctl cache) KASAN reported out of bounds access - cs_dsp_ctl_cache_init_multiple_offsets(). The code uses mock_coeff_temp...

  • EPSS 0.04%
  • Veröffentlicht 10.07.2025 08:15:02
  • Zuletzt bearbeitet 10.07.2025 13:17:30

In the Linux kernel, the following vulnerability has been resolved: jffs2: check jffs2_prealloc_raw_node_refs() result in few other places Fuzzing hit another invalid pointer dereference due to the lack of checking whether jffs2_prealloc_raw_node_r...