Linux

Linux Kernel

13879 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 23.01.2026 15:24:12
  • Zuletzt bearbeitet 26.01.2026 15:03:33

In the Linux kernel, the following vulnerability has been resolved: libceph: return the handler error from mon_handle_auth_done() Currently any error from ceph_auth_handle_reply_done() is propagated via finish_auth() but isn't returned from mon_han...

  • EPSS 0.03%
  • Veröffentlicht 23.01.2026 15:24:12
  • Zuletzt bearbeitet 26.01.2026 15:03:33

In the Linux kernel, the following vulnerability has been resolved: libceph: make free_choose_arg_map() resilient to partial allocation free_choose_arg_map() may dereference a NULL pointer if its caller fails after a partial allocation. For exampl...

  • EPSS 0.03%
  • Veröffentlicht 23.01.2026 15:24:11
  • Zuletzt bearbeitet 26.01.2026 15:03:33

In the Linux kernel, the following vulnerability has been resolved: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() If the osdmap is (maliciously) corrupted such that the incremental osdmap epoch is different from what is expected...

  • EPSS 0.02%
  • Veröffentlicht 23.01.2026 15:24:10
  • Zuletzt bearbeitet 26.01.2026 15:03:33

In the Linux kernel, the following vulnerability has been resolved: nfsd: check that server is running in unlock_filesystem If we are trying to unlock the filesystem via an administrative interface and nfsd isn't running, it crashes the server. Thi...

  • EPSS 0.03%
  • Veröffentlicht 23.01.2026 15:24:09
  • Zuletzt bearbeitet 26.01.2026 15:03:33

In the Linux kernel, the following vulnerability has been resolved: arp: do not assume dev_hard_header() does not change skb->head arp_create() is the only dev_hard_header() caller making assumption about skb->head being unchanged. A recent commit...

  • EPSS 0.02%
  • Veröffentlicht 23.01.2026 15:24:08
  • Zuletzt bearbeitet 26.01.2026 15:03:33

In the Linux kernel, the following vulnerability has been resolved: net/sched: act_api: avoid dereferencing ERR_PTR in tcf_idrinfo_destroy syzbot reported a crash in tc_act_in_hw() during netns teardown where tcf_idrinfo_destroy() passed an ERR_PTR...

  • EPSS 0.02%
  • Veröffentlicht 23.01.2026 15:24:07
  • Zuletzt bearbeitet 26.01.2026 15:03:33

In the Linux kernel, the following vulnerability has been resolved: gpiolib: fix race condition for gdev->srcu If two drivers were calling gpiochip_add_data_with_key(), one may be traversing the srcu-protected list in gpio_name_to_desc(), meanwhile...

  • EPSS 0.02%
  • Veröffentlicht 23.01.2026 15:24:07
  • Zuletzt bearbeitet 26.01.2026 15:03:51

In the Linux kernel, the following vulnerability has been resolved: idpf: Fix RSS LUT NULL pointer crash on early ethtool operations The RSS LUT is not initialized until the interface comes up, causing the following NULL pointer crash when ethtool ...

  • EPSS 0.03%
  • Veröffentlicht 23.01.2026 15:24:06
  • Zuletzt bearbeitet 26.01.2026 15:03:51

In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in handle_auth_done() Perform an explicit bounds check on payload_len to avoid a possible out-of-bounds access in the callout. [ idr...

  • EPSS 0.02%
  • Veröffentlicht 23.01.2026 15:24:05
  • Zuletzt bearbeitet 26.01.2026 15:03:51

In the Linux kernel, the following vulnerability has been resolved: net: do not write to msg_get_inq in callee NULL pointer dereference fix. msg_get_inq is an input field from caller to callee. Don't set it in the callee, as the caller may not cle...