Linux

Linux Kernel

14320 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 10.04.2024 19:15:48
  • Zuletzt bearbeitet 14.01.2025 14:35:39

In the Linux kernel, the following vulnerability has been resolved: net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove Access to netdev after free_netdev() will cause use-after-free bug. Move debug log before free_netdev() call to avoid it.

  • EPSS 0.02%
  • Veröffentlicht 10.04.2024 19:15:48
  • Zuletzt bearbeitet 03.03.2025 17:47:59

In the Linux kernel, the following vulnerability has been resolved: clk: sunxi-ng: Unregister clocks/resets when unbinding Currently, unbinding a CCU driver unmaps the device's MMIO region, while leaving its clocks/resets and their providers regist...

  • EPSS 0.01%
  • Veröffentlicht 10.04.2024 19:15:48
  • Zuletzt bearbeitet 07.01.2025 17:12:26

In the Linux kernel, the following vulnerability has been resolved: usb: host: ohci-tmio: check return value after calling platform_get_resource() It will cause null-ptr-deref if platform_get_resource() returns NULL, we need check the return value.

  • EPSS 0.01%
  • Veröffentlicht 10.04.2024 19:15:48
  • Zuletzt bearbeitet 13.01.2025 20:42:37

In the Linux kernel, the following vulnerability has been resolved: ALSA: gus: fix null pointer dereference on pointer block The pointer block return from snd_gf1_dma_next_block could be null, so there is a potential null pointer dereference issue....

  • EPSS 0.02%
  • Veröffentlicht 10.04.2024 19:15:48
  • Zuletzt bearbeitet 27.03.2025 21:16:39

In the Linux kernel, the following vulnerability has been resolved: sched/fair: Prevent dead task groups from regaining cfs_rq's Kevin is reporting crashes which point to a use-after-free of a cfs_rq in update_blocked_averages(). Initial debugging ...

  • EPSS 0.02%
  • Veröffentlicht 10.04.2024 19:15:48
  • Zuletzt bearbeitet 27.03.2025 21:17:41

In the Linux kernel, the following vulnerability has been resolved: usb: typec: tipd: Remove WARN_ON in tps6598x_block_read Calling tps6598x_block_read with a higher than allowed len can be handled by just returning an error. There's no need to cra...

  • EPSS 0.01%
  • Veröffentlicht 10.04.2024 19:15:48
  • Zuletzt bearbeitet 14.01.2025 14:43:27

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: fix null pointer dereference on pointer cs_desc The pointer cs_desc return from snd_usb_find_clock_source could be null, so there is a potential null pointer deref...

  • EPSS 0.01%
  • Veröffentlicht 10.04.2024 19:15:48
  • Zuletzt bearbeitet 27.03.2025 21:02:03

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Update error handler for UCTX and UMEM In the fast unload flow, the device state is set to internal error, which indicates that the driver started the destroy process. In...

  • EPSS 0.02%
  • Veröffentlicht 10.04.2024 19:15:48
  • Zuletzt bearbeitet 27.03.2025 21:05:27

In the Linux kernel, the following vulnerability has been resolved: hugetlb, userfaultfd: fix reservation restore on userfaultfd error Currently in the is_continue case in hugetlb_mcopy_atomic_pte(), if we bail out using "goto out_release_unlock;" ...

  • EPSS 0.02%
  • Veröffentlicht 10.04.2024 19:15:48
  • Zuletzt bearbeitet 27.03.2025 21:05:34

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: kTLS, Fix crash in RX resync flow For the TLS RX resync flow, we maintain a list of TLS contexts that require some attention, to communicate their resync information to ...