Linux

Linux Kernel

12474 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 19.01.2025 11:15:10
  • Zuletzt bearbeitet 10.02.2025 18:15:34

In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix use-after-free in ipvlan_get_iflink(). syzbot presented an use-after-free report [0] regarding ipvlan and linkwatch. ipvlan does not hold a refcnt of the lower device ...

  • EPSS 0.05%
  • Veröffentlicht 19.01.2025 11:15:10
  • Zuletzt bearbeitet 03.11.2025 21:19:02

In the Linux kernel, the following vulnerability has been resolved: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute syzbot found that TCA_FLOW_RSHIFT attribute was not validated. Right shitfing a 32bit integer is undefined for large shift v...

  • EPSS 0.04%
  • Veröffentlicht 19.01.2025 11:15:09
  • Zuletzt bearbeitet 01.10.2025 20:18:15

In the Linux kernel, the following vulnerability has been resolved: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for dif...

  • EPSS 0.05%
  • Veröffentlicht 19.01.2025 11:15:09
  • Zuletzt bearbeitet 03.11.2025 21:18:59

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for ...

  • EPSS 0.05%
  • Veröffentlicht 19.01.2025 11:15:09
  • Zuletzt bearbeitet 03.11.2025 21:18:59

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: udp_port: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reas...

  • EPSS 0.06%
  • Veröffentlicht 19.01.2025 11:15:09
  • Zuletzt bearbeitet 03.11.2025 21:18:59

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: auth_enable: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different r...

  • EPSS 0.05%
  • Veröffentlicht 19.01.2025 11:15:09
  • Zuletzt bearbeitet 03.11.2025 21:18:59

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: rto_min/max: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different r...

  • EPSS 0.06%
  • Veröffentlicht 19.01.2025 11:15:09
  • Zuletzt bearbeitet 03.11.2025 21:19:00

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for differe...

  • EPSS 0.04%
  • Veröffentlicht 19.01.2025 11:15:09
  • Zuletzt bearbeitet 01.10.2025 20:18:16

In the Linux kernel, the following vulnerability has been resolved: mptcp: sysctl: blackhole timeout: avoid using current->nsproxy As mentioned in the previous commit, using the 'net' structure via 'current' is not recommended for different reasons...

  • EPSS 0.03%
  • Veröffentlicht 19.01.2025 11:15:09
  • Zuletzt bearbeitet 01.10.2025 20:18:16

In the Linux kernel, the following vulnerability has been resolved: mptcp: sysctl: sched: avoid using current->nsproxy Using the 'net' structure via 'current' is not recommended for different reasons. First, if the goal is to use it to read or wri...