Linux

Linux Kernel

12376 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 04.11.2025 18:16:29

In the Linux kernel, the following vulnerability has been resolved: media: stk1160: fix bounds checking in stk1160_copy_video() The subtract in this condition is reversed. The ->length is the length of the buffer. The ->bytesused is how many byte...

  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 17.09.2025 16:59:41

In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add callback function pointer check before its call In dpu_core_irq_callback_handler() callback function pointer is compared to NULL, but then callback function is unc...

  • EPSS 0.25%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 24.03.2025 18:10:02

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Use variable length array instead of fixed size Should fix smatch warning: ntfs_set_label() error: __builtin_memcpy() 'uni->name' too small (20 vs 256)

  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 03.10.2025 16:08:44

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow For example, in the expression: vbo = 2 * vbo + skip

  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 07.01.2025 16:09:49

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Check 'folio' pointer for NULL It can be NULL if bmap is called.

  • EPSS 0.05%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 03.10.2025 14:49:28

In the Linux kernel, the following vulnerability has been resolved: fuse: clear FR_SENT when re-adding requests into pending list The following warning was reported by lee bruce: ------------[ cut here ]------------ WARNING: CPU: 0 PID: 8264 a...

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 04.11.2025 18:16:29

In the Linux kernel, the following vulnerability has been resolved: stm class: Fix a double free in stm_register_device() The put_device(&stm->dev) call will trigger stm_device_release() which frees "stm" so the vfree(stm) on the next line is a dou...

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 24.03.2025 18:09:37

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind. Hang on to the control IDs instead of pointers since those are correctly handled with lock...

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 03.10.2025 14:53:37

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Avoid unnecessary destruction of file_ida file_ida is allocated during cdev open and is freed accordingly during cdev release. This sequence is guaranteed by drive...

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 21.11.2024 09:26:31

In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the cpu5wdt module is removing, the origin code uses del_timer() to de-activate the timer. If the timer h...