Linux

Linux Kernel

13303 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 17.04.2025 18:01:31
  • Zuletzt bearbeitet 21.04.2025 18:40:48

In the Linux kernel, the following vulnerability has been resolved: can: etas_es58x: es58x_rx_err_msg(): fix memory leak in error path In es58x_rx_err_msg(), if can->do_set_mode() fails, the function directly returns without calling netif_rx(skb). ...

  • EPSS 0.02%
  • Veröffentlicht 17.04.2025 18:01:30
  • Zuletzt bearbeitet 21.04.2025 18:41:16

In the Linux kernel, the following vulnerability has been resolved: can: peak_usb: fix use after free bugs After calling peak_usb_netif_rx_ni(skb), dereferencing skb is unsafe. Especially, the can_frame cf which aliases skb memory is accessed after...

  • EPSS 0.02%
  • Veröffentlicht 17.04.2025 18:01:29
  • Zuletzt bearbeitet 21.04.2025 18:41:27

In the Linux kernel, the following vulnerability has been resolved: can: dev: can_restart: fix use after free bug After calling netif_rx_ni(skb), dereferencing skb is unsafe. Especially, the can_frame cf which aliases skb memory is accessed after t...

  • EPSS 0.02%
  • Veröffentlicht 17.04.2025 18:01:29
  • Zuletzt bearbeitet 21.04.2025 18:41:22

In the Linux kernel, the following vulnerability has been resolved: can: vxcan: vxcan_xmit: fix use after free bug After calling netif_rx_ni(skb), dereferencing skb is unsafe. Especially, the canfd_frame cfd which aliases skb memory is accessed aft...

  • EPSS 0.02%
  • Veröffentlicht 17.04.2025 18:01:28
  • Zuletzt bearbeitet 01.10.2025 17:15:31

In the Linux kernel, the following vulnerability has been resolved: can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context If a driver calls can_get_echo_skb() during a hardware IRQ (which is often, but not always, the case),...

  • EPSS 0.02%
  • Veröffentlicht 16.04.2025 14:13:17
  • Zuletzt bearbeitet 27.06.2025 11:15:24

In the Linux kernel, the following vulnerability has been resolved: cpufreq/amd-pstate: Add missing NULL ptr check in amd_pstate_update Check if policy is NULL before dereferencing it in amd_pstate_update.

  • EPSS 0.03%
  • Veröffentlicht 16.04.2025 14:13:17
  • Zuletzt bearbeitet 04.11.2025 17:00:09

In the Linux kernel, the following vulnerability has been resolved: watch_queue: fix pipe accounting mismatch Currently, watch_queue_set_size() modifies the pipe buffers charged to user->pipe_bufs without updating the pipe->nr_accounted on the pipe...

  • EPSS 0.03%
  • Veröffentlicht 16.04.2025 14:13:16
  • Zuletzt bearbeitet 03.11.2025 20:17:44

In the Linux kernel, the following vulnerability has been resolved: thermal: int340x: Add NULL check for adev Not all devices have an ACPI companion fwnode, so adev might be NULL. This is similar to the commit cd2fd6eab480 ("platform/x86: int3472: ...

  • EPSS 0.01%
  • Veröffentlicht 16.04.2025 14:13:15
  • Zuletzt bearbeitet 01.10.2025 17:15:44

In the Linux kernel, the following vulnerability has been resolved: ALSA: timer: Don't take register_mutex with copy_from/to_user() The infamous mmap_lock taken in copy_from/to_user() can be often problematic when it's called inside another mutex, ...

  • EPSS 0.02%
  • Veröffentlicht 16.04.2025 14:13:15
  • Zuletzt bearbeitet 04.11.2025 17:00:53

In the Linux kernel, the following vulnerability has been resolved: RISC-V: KVM: Teardown riscv specific bits after kvm_exit During a module removal, kvm_exit invokes arch specific disable call which disables AIA. However, we invoke aia_exit before...