Linux

Linux Kernel

12374 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Published 03.04.2024 17:15:53
  • Last modified 19.06.2025 13:15:31

In the Linux kernel, the following vulnerability has been resolved: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt Determine if bb_fragments is 0 instead of determining bb_free to eliminate the risk of dividing...

  • EPSS 0.01%
  • Published 03.04.2024 17:15:53
  • Last modified 17.07.2025 17:15:35

In the Linux kernel, the following vulnerability has been resolved: aoe: avoid potential deadlock at set_capacity Move set_capacity() outside of the section procected by (&d->lock). To avoid possible interrupt unsafe locking scenario: CPU0...

  • EPSS 0.01%
  • Published 03.04.2024 17:15:53
  • Last modified 27.02.2025 14:34:43

In the Linux kernel, the following vulnerability has been resolved: spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected Return IRQ_NONE from the interrupt handler when no interrupt was detected. Because an empty interrupt will cause ...

  • EPSS 0.01%
  • Published 03.04.2024 17:15:53
  • Last modified 27.02.2025 14:34:43

In the Linux kernel, the following vulnerability has been resolved: fbdev: sis: Error out if pixclock equals zero The userspace program could pass any values to the driver through ioctl() interface. If the driver doesn't check the value of pixclock...

  • EPSS 0.01%
  • Published 03.04.2024 17:15:53
  • Last modified 27.02.2025 14:34:43

In the Linux kernel, the following vulnerability has been resolved: fbdev: savage: Error out if pixclock equals zero The userspace program could pass any values to the driver through ioctl() interface. If the driver doesn't check the value of pixcl...

  • EPSS 0.01%
  • Published 03.04.2024 17:15:53
  • Last modified 04.04.2025 14:15:05

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix race condition on enabling fast-xmit fast-xmit must only be enabled after the sta has been uploaded to the driver, otherwise it could end up passing the not-yet...

  • EPSS 0.01%
  • Published 03.04.2024 17:15:52
  • Last modified 07.01.2025 21:13:04

In the Linux kernel, the following vulnerability has been resolved: gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() The gtp_net_ops pernet operations structure for the subsystem must be registered before registering the generic ne...

  • EPSS 0.16%
  • Published 03.04.2024 17:15:52
  • Last modified 04.04.2025 14:30:49

In the Linux kernel, the following vulnerability has been resolved: md: Don't suspend the array for interrupted reshape md_start_sync() will suspend the array if there are spares that can be added or removed from conf, however, if reshape is still ...

  • EPSS 0.02%
  • Published 03.04.2024 17:15:52
  • Last modified 17.03.2025 16:56:57

In the Linux kernel, the following vulnerability has been resolved: md: Don't register sync_thread for reshape directly Currently, if reshape is interrupted, then reassemble the array will register sync_thread directly from pers->run(), in this cas...

  • EPSS 0.01%
  • Published 03.04.2024 17:15:52
  • Last modified 04.04.2025 14:30:42

In the Linux kernel, the following vulnerability has been resolved: md: Don't ignore read-only array in md_check_recovery() Usually if the array is not read-write, md_check_recovery() won't register new sync_thread in the first place. And if the ar...