Linux

Linux Kernel

13879 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 30.12.2025 12:08:27
  • Zuletzt bearbeitet 31.12.2025 20:43:05

In the Linux kernel, the following vulnerability has been resolved: xhci: dbc: Fix memory leak in xhci_alloc_dbc() If DbC is already in use, then the allocated memory for the xhci_dbc struct doesn't get freed before returning NULL, which leads to a...

  • EPSS 0.05%
  • Veröffentlicht 30.12.2025 12:08:27
  • Zuletzt bearbeitet 31.12.2025 20:43:05

In the Linux kernel, the following vulnerability has been resolved: rapidio: devices: fix missing put_device in mport_cdev_open When kfifo_alloc fails, the refcount of chdev->dev is left incremental. We should use put_device(&chdev->dev) to decrea...

  • EPSS 0.03%
  • Veröffentlicht 30.12.2025 12:03:23
  • Zuletzt bearbeitet 31.12.2025 20:43:05

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix possible memory leak in smb2_lock() argv needs to be free when setup_async_work fails or when the current process is woken up.

  • EPSS 0.02%
  • Veröffentlicht 30.12.2025 12:03:22
  • Zuletzt bearbeitet 31.12.2025 20:43:05

In the Linux kernel, the following vulnerability has been resolved: fsi: occ: Prevent use after free Use get_device and put_device in the open and close functions to make sure the device doesn't get freed while a file descriptor is open. Also, lock...

  • EPSS 0.03%
  • Veröffentlicht 30.12.2025 12:03:22
  • Zuletzt bearbeitet 31.12.2025 20:43:05

In the Linux kernel, the following vulnerability has been resolved: media: s5p-mfc: Clear workbit to handle error condition During error on CLOSE_INSTANCE command, ctx_work_bits was not getting cleared. During consequent mfc execution NULL pointer ...

  • EPSS 0.02%
  • Veröffentlicht 30.12.2025 12:03:21
  • Zuletzt bearbeitet 31.12.2025 20:43:05

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mei: fix potential NULL-ptr deref after clone If cloning the SKB fails, don't try to use it, but rather return as if we should pass it. Coverity CID: 1503456

  • EPSS 0.04%
  • Veröffentlicht 24.12.2025 15:51:03
  • Zuletzt bearbeitet 29.12.2025 15:58:13

In the Linux kernel, the following vulnerability has been resolved: usb: potential integer overflow in usbg_make_tpg() The variable tpgt in usbg_make_tpg() is defined as unsigned long and is assigned to tpgt->tport_tpgt, which is defined as u16. Th...

  • EPSS 0.02%
  • Veröffentlicht 24.12.2025 13:07:09
  • Zuletzt bearbeitet 29.12.2025 16:15:40

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.04%
  • Veröffentlicht 24.12.2025 13:07:08
  • Zuletzt bearbeitet 29.12.2025 15:58:13

In the Linux kernel, the following vulnerability has been resolved: usb: mtu3: fix kernel panic at qmu transfer done irq handler When handle qmu transfer irq, it will unlock @mtu->lock before give back request, if another thread handle disconnect e...

  • EPSS 0.04%
  • Veröffentlicht 24.12.2025 13:07:08
  • Zuletzt bearbeitet 29.12.2025 15:58:13

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_sdei: Fix sleep from invalid context BUG Running a preempt-rt (v6.2-rc3-rt1) based kernel on an Ampere Altra triggers: BUG: sleeping function called from invalid c...