Linux

Linux Kernel

12474 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 19.11.2024 02:16:28
  • Zuletzt bearbeitet 03.11.2025 23:17:08

In the Linux kernel, the following vulnerability has been resolved: USB: serial: io_edgeport: fix use after free in debug printk The "dev_dbg(&urb->dev->dev, ..." which happens after usb_free_urb(urb) is a use after free of the "urb" pointer. Stor...

  • EPSS 0.05%
  • Veröffentlicht 19.11.2024 02:16:28
  • Zuletzt bearbeitet 03.11.2025 23:17:08

In the Linux kernel, the following vulnerability has been resolved: usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() The "*cmd" variable can be controlled by the user via debugfs. That means "new_cam" can be as high as ...

  • EPSS 0.05%
  • Veröffentlicht 19.11.2024 02:16:28
  • Zuletzt bearbeitet 03.11.2025 23:17:08

In the Linux kernel, the following vulnerability has been resolved: usb: musb: sunxi: Fix accessing an released usb phy Commit 6ed05c68cbca ("usb: musb: sunxi: Explicitly release USB PHY on exit") will cause that usb phy @glue->xceiv is accessed af...

  • EPSS 0.03%
  • Veröffentlicht 19.11.2024 02:15:09
  • Zuletzt bearbeitet 19.06.2025 13:15:30

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix possible UAF in amdgpu_cs_pass1() Since the gang_size check is outside of chunk parsing loop, we need to reset i before we free the chunk data. Suggested by Ye Zha...

  • EPSS 0.13%
  • Veröffentlicht 18.11.2024 10:15:05
  • Zuletzt bearbeitet 06.08.2025 13:34:08

A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected install...

  • EPSS 0.3%
  • Veröffentlicht 18.11.2024 10:15:04
  • Zuletzt bearbeitet 06.08.2025 13:03:43

A flaw was found within the parsing of SMB2 requests that have a transform header in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. ...

  • EPSS 0.22%
  • Veröffentlicht 18.11.2024 10:15:04
  • Zuletzt bearbeitet 06.08.2025 13:21:06

A flaw was found within the handling of SMB2 read requests in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverag...

  • EPSS 0.25%
  • Veröffentlicht 14.11.2024 12:15:17
  • Zuletzt bearbeitet 19.08.2025 17:32:26

A flaw was found within the parsing of extended attributes in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverag...

  • EPSS 0.02%
  • Veröffentlicht 14.11.2024 11:15:03
  • Zuletzt bearbeitet 18.11.2024 22:08:54

A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the s...

  • EPSS 0.04%
  • Veröffentlicht 11.11.2024 14:15:15
  • Zuletzt bearbeitet 09.12.2024 22:15:22

In the Linux kernel, the following vulnerability has been resolved: fork: only invoke khugepaged, ksm hooks if no error There is no reason to invoke these hooks early against an mm that is in an incomplete state. The change in commit d24062914837 ...