Linux

Linux Kernel

13989 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 14:15:23
  • Zuletzt bearbeitet 03.11.2025 21:17:35

In the Linux kernel, the following vulnerability has been resolved: sh: intc: Fix use-after-free bug in register_intc_controller() In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 14:15:23
  • Zuletzt bearbeitet 03.11.2025 20:16:39

In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix bfqq uaf in bfq_limit_depth() Set new allocated bfqq to bic or remove freed bfqq from bic are both protected by bfqd->lock, however bfq_limit_depth() is deferencing...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 14:15:23
  • Zuletzt bearbeitet 08.10.2025 14:41:01

In the Linux kernel, the following vulnerability has been resolved: nfs/blocklayout: Don't attempt unregister for invalid block device Since commit d869da91cccb ("nfs/blocklayout: Fix premature PR key unregistration") an unmount of a pNFS SCSI layo...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 14:15:23
  • Zuletzt bearbeitet 10.02.2025 18:15:26

In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket BUG: KASAN: slab-use-after-free in tcp_write_timer_handler+0x156/0x3e0 Read of size 1 at addr ffff888111f322cd by task ...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 14:15:22
  • Zuletzt bearbeitet 03.11.2025 21:15:54

In the Linux kernel, the following vulnerability has been resolved: sh: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK When CONFIG_CPUMASK_OFFSTACK and CONFIG_DEBUG_PER_CPU_MAPS are selected, cpu_max_bits_warn() generates a runtime warning simi...

  • EPSS 0.01%
  • Veröffentlicht 24.12.2024 12:15:24
  • Zuletzt bearbeitet 03.11.2025 21:17:34

In the Linux kernel, the following vulnerability has been resolved: soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() This loop is supposed to break if the frequency returned from clk_round_rate() is the same as on the previous itera...

  • EPSS 0.01%
  • Veröffentlicht 24.12.2024 12:15:24
  • Zuletzt bearbeitet 01.10.2025 21:16:38

In the Linux kernel, the following vulnerability has been resolved: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu KCSAN reports a data race when access the krcp->monitor_work.timer.expires variable in the schedule_delayed_monitor_work(...

  • EPSS 0.01%
  • Veröffentlicht 24.12.2024 12:15:24
  • Zuletzt bearbeitet 03.11.2025 21:17:34

In the Linux kernel, the following vulnerability has been resolved: EDAC/bluefield: Fix potential integer overflow The 64-bit argument for the "get DIMM info" SMC call consists of mem_ctrl_idx left-shifted 16 bits and OR-ed with DIMM index. With m...

  • EPSS 0.02%
  • Veröffentlicht 24.12.2024 12:15:24
  • Zuletzt bearbeitet 01.10.2025 21:16:38

In the Linux kernel, the following vulnerability has been resolved: crypto: qat/qat_4xxx - fix off by one in uof_get_name() The fw_objs[] array has "num_objs" elements so the > needs to be >= to prevent an out of bounds read.

  • EPSS 0.02%
  • Veröffentlicht 24.12.2024 12:15:24
  • Zuletzt bearbeitet 01.10.2025 21:16:38

In the Linux kernel, the following vulnerability has been resolved: crypto: qat/qat_420xx - fix off by one in uof_get_name() This is called from uof_get_name_420xx() where "num_objs" is the ARRAY_SIZE() of fw_objs[]. The > needs to be >= to preven...