Linux

Linux Kernel

12474 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 05.11.2024 18:15:15
  • Zuletzt bearbeitet 01.10.2025 21:15:50

In the Linux kernel, the following vulnerability has been resolved: bpf: Add the missing BPF_LINK_TYPE invocation for sockmap There is an out-of-bounds read in bpf_link_show_fdinfo() for the sockmap link fd. Fix it by adding the missing BPF_LINK_TY...

  • EPSS 0.05%
  • Veröffentlicht 05.11.2024 18:15:15
  • Zuletzt bearbeitet 03.11.2025 23:16:52

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Fix UAF on iso_sock_timeout conn->sk maybe have been unlinked/freed while waiting for iso_conn_lock so this checks if the conn->sk is still valid by checking if it ...

  • EPSS 0.05%
  • Veröffentlicht 05.11.2024 18:15:15
  • Zuletzt bearbeitet 03.11.2025 23:16:52

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix UAF on sco_sock_timeout conn->sk maybe have been unlinked/freed while waiting for sco_conn_lock so this checks if the conn->sk is still valid by checking if it ...

  • EPSS 0.05%
  • Veröffentlicht 05.11.2024 18:15:15
  • Zuletzt bearbeitet 03.11.2025 23:16:52

In the Linux kernel, the following vulnerability has been resolved: net: sched: use RCU read-side critical section in taprio_dump() Fix possible use-after-free in 'taprio_dump()' by adding RCU read-side critical section there. Never seen on x86 but...

  • EPSS 0.05%
  • Veröffentlicht 05.11.2024 18:15:15
  • Zuletzt bearbeitet 03.11.2025 23:16:53

In the Linux kernel, the following vulnerability has been resolved: net: sched: fix use-after-free in taprio_change() In 'taprio_change()', 'admin' pointer may become dangling due to sched switch / removal caused by 'advance_sched()', and critical ...

  • EPSS 0.05%
  • Veröffentlicht 05.11.2024 18:15:15
  • Zuletzt bearbeitet 03.11.2025 23:16:53

In the Linux kernel, the following vulnerability has been resolved: net: wwan: fix global oob in wwan_rtnl_policy The variable wwan_rtnl_link_ops assign a *bigger* maxtype which leads to a global out-of-bounds read when parsing the netlink attribut...

  • EPSS 0.05%
  • Veröffentlicht 05.11.2024 18:15:15
  • Zuletzt bearbeitet 01.10.2025 21:15:51

In the Linux kernel, the following vulnerability has been resolved: net: pse-pd: Fix out of bound for loop Adjust the loop limit to prevent out-of-bounds access when iterating over PI structures. The loop should not reach the index pcdev->nr_lines ...

  • EPSS 0.05%
  • Veröffentlicht 05.11.2024 18:15:15
  • Zuletzt bearbeitet 06.03.2025 17:15:18

In the Linux kernel, the following vulnerability has been resolved: netfilter: bpf: must hold reference on net namespace BUG: KASAN: slab-use-after-free in __nf_unregister_net_hook+0x640/0x6b0 Read of size 8 at addr ffff8880106fe400 by task repro/7...

  • EPSS 0.05%
  • Veröffentlicht 05.11.2024 18:15:15
  • Zuletzt bearbeitet 03.11.2025 23:16:53

In the Linux kernel, the following vulnerability has been resolved: tracing: Consider the NULL character when validating the event length strlen() returns a string length excluding the null byte. If the string length equals to the maximum buffer le...

  • EPSS 0.05%
  • Veröffentlicht 05.11.2024 18:15:15
  • Zuletzt bearbeitet 01.10.2025 21:15:51

In the Linux kernel, the following vulnerability has been resolved: tracing/probes: Fix MAX_TRACE_ARGS limit handling When creating a trace_probe we would set nr_args prior to truncating the arguments to MAX_TRACE_ARGS. However, we would only initi...