Linux

Linux Kernel

12975 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 19.08.2025 17:15:32
  • Zuletzt bearbeitet 28.11.2025 14:44:02

In the Linux kernel, the following vulnerability has been resolved: perf/core: Handle buffer mapping fail correctly in perf_mmap() After successful allocation of a buffer or a successful attachment to an existing buffer perf_mmap() tries to map the...

  • EPSS 0.02%
  • Veröffentlicht 19.08.2025 17:15:31
  • Zuletzt bearbeitet 18.11.2025 17:59:40

In the Linux kernel, the following vulnerability has been resolved: mm: fix a UAF when vma->mm is freed after vma->vm_refcnt got dropped By inducing delays in the right places, Jann Horn created a reproducer for a hard to hit UAF issue that became ...

  • EPSS 0.06%
  • Veröffentlicht 19.08.2025 17:15:31
  • Zuletzt bearbeitet 03.11.2025 18:16:29

In the Linux kernel, the following vulnerability has been resolved: usb: gadget : fix use-after-free in composite_dev_cleanup() 1. In func configfs_composite_bind() -> composite_os_desc_req_prepare(): if kmalloc fails, the pointer cdev->os_desc_req...

  • EPSS 0.02%
  • Veröffentlicht 19.08.2025 17:15:31
  • Zuletzt bearbeitet 06.12.2025 22:15:51

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit...

  • EPSS 0.02%
  • Veröffentlicht 19.08.2025 17:15:31
  • Zuletzt bearbeitet 28.11.2025 14:41:59

In the Linux kernel, the following vulnerability has been resolved: HID: apple: validate feature-report field count to prevent NULL pointer dereference A malicious HID device with quirk APPLE_MAGIC_BACKLIGHT can trigger a NULL pointer dereference w...

  • EPSS 0.06%
  • Veröffentlicht 19.08.2025 06:15:33
  • Zuletzt bearbeitet 03.11.2025 18:16:28

In the Linux kernel, the following vulnerability has been resolved: net/sched: Restrict conditions for adding duplicating netems to qdisc tree netem_enqueue's duplication prevention logic breaks when a netem resides in a qdisc tree with other netem...

  • EPSS 0.2%
  • Veröffentlicht 16.08.2025 13:29:51
  • Zuletzt bearbeitet 18.11.2025 17:58:23

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix out of bounds read in smb2_sess_setup ksmbd does not consider the case of that smb2 session setup is in compound request. If this is the second payload of the compound, ...

  • EPSS 0.01%
  • Veröffentlicht 16.08.2025 13:27:58
  • Zuletzt bearbeitet 18.11.2025 17:58:43

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix wrong next length validation of ea buffer in smb2_set_ea() There are multiple smb2_ea_info buffers in FILE_FULL_EA_INFORMATION request from client. ksmbd find next smb2_...

  • EPSS 0.03%
  • Veröffentlicht 16.08.2025 13:27:57
  • Zuletzt bearbeitet 18.11.2025 17:58:12

In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate session id and tree id in the compound request This patch validate session id and tree id in compound request. If first operation in the compound is SMB2 ECHO reque...

  • EPSS 0.04%
  • Veröffentlicht 16.08.2025 13:27:56
  • Zuletzt bearbeitet 18.11.2025 17:57:24

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix out-of-bound read in smb2_write ksmbd_smb2_check_message doesn't validate hdr->NextCommand. If ->NextCommand is bigger than Offset + Length of smb2 write, It will allow ...