Linux

Linux Kernel

12474 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 22.08.2024 02:15:05
  • Zuletzt bearbeitet 12.09.2024 13:44:45

In the Linux kernel, the following vulnerability has been resolved: ibmvnic: free reset-work-item when flushing Fix a tiny memory leak when flushing the reset work queue.

  • EPSS 0.03%
  • Veröffentlicht 22.08.2024 02:15:05
  • Zuletzt bearbeitet 12.09.2024 13:41:56

In the Linux kernel, the following vulnerability has been resolved: mptcp: Correctly set DATA_FIN timeout when number of retransmits is large Syzkaller with UBSAN uncovered a scenario where a large number of DATA_FIN retransmits caused a shift-out-...

  • EPSS 0.03%
  • Veröffentlicht 22.08.2024 02:15:05
  • Zuletzt bearbeitet 12.09.2024 13:33:22

In the Linux kernel, the following vulnerability has been resolved: auxdisplay: lcd2s: Fix memory leak in ->remove() Once allocated the struct lcd2s_data is never freed. Fix the memory leak by switching to devm_kzalloc().

  • EPSS 0.04%
  • Veröffentlicht 22.08.2024 02:15:05
  • Zuletzt bearbeitet 01.10.2025 18:15:30

In the Linux kernel, the following vulnerability has been resolved: net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe() During driver initialization, the pointer of card info, i.e. the variable 'ci' is required. However, the definition...

  • EPSS 0.03%
  • Veröffentlicht 22.08.2024 02:15:05
  • Zuletzt bearbeitet 12.09.2024 13:36:11

In the Linux kernel, the following vulnerability has been resolved: net/smc: fix connection leak There's a potential leak issue under following execution sequence : smc_release smc_connect_work if (sk->sk_state == SMC_INIT) send_clc_conf...

  • EPSS 0.01%
  • Veröffentlicht 22.08.2024 02:15:05
  • Zuletzt bearbeitet 08.11.2024 16:15:17

In the Linux kernel, the following vulnerability has been resolved: net: ipv6: ensure we call ipv6_mc_down() at most once There are two reasons for addrconf_notify() to be called with NETDEV_DOWN: either the network device is actually going down, o...

  • EPSS 0.01%
  • Veröffentlicht 22.08.2024 02:15:05
  • Zuletzt bearbeitet 12.09.2024 13:24:58

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_queue: fix possible use-after-free Eric Dumazet says: The sock_hold() side seems suspect, because there is no guarantee that sk_refcnt is not already 0. On failu...

  • EPSS 0.02%
  • Veröffentlicht 22.08.2024 02:15:05
  • Zuletzt bearbeitet 27.08.2024 16:12:47

In the Linux kernel, the following vulnerability has been resolved: netfilter: fix use-after-free in __nf_register_net_hook() We must not dereference @new_hooks after nf_hook_mutex has been released, because other threads might have freed our alloc...

  • EPSS 0.03%
  • Veröffentlicht 22.08.2024 02:15:05
  • Zuletzt bearbeitet 27.08.2024 16:12:58

In the Linux kernel, the following vulnerability has been resolved: blktrace: fix use after free for struct blk_trace When tracing the whole disk, 'dropped' and 'msg' will be created under 'q->debugfs_dir' and 'bt->dir' is NULL, thus blk_trace_free...

  • EPSS 0.02%
  • Veröffentlicht 22.08.2024 02:15:05
  • Zuletzt bearbeitet 12.09.2024 13:27:34

In the Linux kernel, the following vulnerability has been resolved: xen/netfront: destroy queues before real_num_tx_queues is zeroed xennet_destroy_queues() relies on info->netdev->real_num_tx_queues to delete queues. Since d7dac083414eb5bb99a6d2ed...