- EPSS 0.07%
- Veröffentlicht 23.01.2026 15:24:12
- Zuletzt bearbeitet 26.01.2026 15:03:33
In the Linux kernel, the following vulnerability has been resolved: libceph: return the handler error from mon_handle_auth_done() Currently any error from ceph_auth_handle_reply_done() is propagated via finish_auth() but isn't returned from mon_han...
- EPSS 0.03%
- Veröffentlicht 23.01.2026 15:24:12
- Zuletzt bearbeitet 26.01.2026 15:03:33
In the Linux kernel, the following vulnerability has been resolved: libceph: make free_choose_arg_map() resilient to partial allocation free_choose_arg_map() may dereference a NULL pointer if its caller fails after a partial allocation. For exampl...
- EPSS 0.03%
- Veröffentlicht 23.01.2026 15:24:11
- Zuletzt bearbeitet 26.01.2026 15:03:33
In the Linux kernel, the following vulnerability has been resolved: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() If the osdmap is (maliciously) corrupted such that the incremental osdmap epoch is different from what is expected...
- EPSS 0.02%
- Veröffentlicht 23.01.2026 15:24:10
- Zuletzt bearbeitet 26.01.2026 15:03:33
In the Linux kernel, the following vulnerability has been resolved: nfsd: check that server is running in unlock_filesystem If we are trying to unlock the filesystem via an administrative interface and nfsd isn't running, it crashes the server. Thi...
- EPSS 0.03%
- Veröffentlicht 23.01.2026 15:24:09
- Zuletzt bearbeitet 26.01.2026 15:03:33
In the Linux kernel, the following vulnerability has been resolved: arp: do not assume dev_hard_header() does not change skb->head arp_create() is the only dev_hard_header() caller making assumption about skb->head being unchanged. A recent commit...
- EPSS 0.02%
- Veröffentlicht 23.01.2026 15:24:08
- Zuletzt bearbeitet 26.01.2026 15:03:33
In the Linux kernel, the following vulnerability has been resolved: net/sched: act_api: avoid dereferencing ERR_PTR in tcf_idrinfo_destroy syzbot reported a crash in tc_act_in_hw() during netns teardown where tcf_idrinfo_destroy() passed an ERR_PTR...
- EPSS 0.02%
- Veröffentlicht 23.01.2026 15:24:07
- Zuletzt bearbeitet 26.01.2026 15:03:33
In the Linux kernel, the following vulnerability has been resolved: gpiolib: fix race condition for gdev->srcu If two drivers were calling gpiochip_add_data_with_key(), one may be traversing the srcu-protected list in gpio_name_to_desc(), meanwhile...
- EPSS 0.02%
- Veröffentlicht 23.01.2026 15:24:07
- Zuletzt bearbeitet 26.01.2026 15:03:51
In the Linux kernel, the following vulnerability has been resolved: idpf: Fix RSS LUT NULL pointer crash on early ethtool operations The RSS LUT is not initialized until the interface comes up, causing the following NULL pointer crash when ethtool ...
- EPSS 0.03%
- Veröffentlicht 23.01.2026 15:24:06
- Zuletzt bearbeitet 26.01.2026 15:03:51
In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in handle_auth_done() Perform an explicit bounds check on payload_len to avoid a possible out-of-bounds access in the callout. [ idr...
- EPSS 0.02%
- Veröffentlicht 23.01.2026 15:24:05
- Zuletzt bearbeitet 26.01.2026 15:03:51
In the Linux kernel, the following vulnerability has been resolved: net: do not write to msg_get_inq in callee NULL pointer dereference fix. msg_get_inq is an input field from caller to callee. Don't set it in the callee, as the caller may not cle...