Linux

Linux Kernel

12474 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Published 19.11.2024 02:16:28
  • Last modified 03.11.2025 23:17:08

In the Linux kernel, the following vulnerability has been resolved: USB: serial: io_edgeport: fix use after free in debug printk The "dev_dbg(&urb->dev->dev, ..." which happens after usb_free_urb(urb) is a use after free of the "urb" pointer. Stor...

  • EPSS 0.05%
  • Published 19.11.2024 02:16:28
  • Last modified 03.11.2025 23:17:08

In the Linux kernel, the following vulnerability has been resolved: usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() The "*cmd" variable can be controlled by the user via debugfs. That means "new_cam" can be as high as ...

  • EPSS 0.05%
  • Published 19.11.2024 02:16:28
  • Last modified 03.11.2025 23:17:08

In the Linux kernel, the following vulnerability has been resolved: usb: musb: sunxi: Fix accessing an released usb phy Commit 6ed05c68cbca ("usb: musb: sunxi: Explicitly release USB PHY on exit") will cause that usb phy @glue->xceiv is accessed af...

  • EPSS 0.03%
  • Published 19.11.2024 02:15:09
  • Last modified 19.06.2025 13:15:30

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix possible UAF in amdgpu_cs_pass1() Since the gang_size check is outside of chunk parsing loop, we need to reset i before we free the chunk data. Suggested by Ye Zha...

  • EPSS 0.13%
  • Published 18.11.2024 10:15:05
  • Last modified 06.08.2025 13:34:08

A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected install...

  • EPSS 0.3%
  • Published 18.11.2024 10:15:04
  • Last modified 06.08.2025 13:03:43

A flaw was found within the parsing of SMB2 requests that have a transform header in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. ...

  • EPSS 0.22%
  • Published 18.11.2024 10:15:04
  • Last modified 06.08.2025 13:21:06

A flaw was found within the handling of SMB2 read requests in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverag...

  • EPSS 0.25%
  • Published 14.11.2024 12:15:17
  • Last modified 19.08.2025 17:32:26

A flaw was found within the parsing of extended attributes in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverag...

  • EPSS 0.02%
  • Published 14.11.2024 11:15:03
  • Last modified 18.11.2024 22:08:54

A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the s...

  • EPSS 0.04%
  • Published 11.11.2024 14:15:15
  • Last modified 09.12.2024 22:15:22

In the Linux kernel, the following vulnerability has been resolved: fork: only invoke khugepaged, ksm hooks if no error There is no reason to invoke these hooks early against an mm that is in an incomplete state. The change in commit d24062914837 ...