Linux

Linux Kernel

12376 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 19.06.2024 15:15:53
  • Zuletzt bearbeitet 21.11.2024 06:36:37

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix deadlock in __mptcp_push_pending() __mptcp_push_pending() may call mptcp_flush_join_list() with subflow socket lock held. If such call hits mptcp_sockopt_sync_all() then...

  • EPSS 0.02%
  • Veröffentlicht 19.06.2024 15:15:53
  • Zuletzt bearbeitet 21.11.2024 06:36:37

In the Linux kernel, the following vulnerability has been resolved: mptcp: remove tcp ulp setsockopt support TCP_ULP setsockopt cannot be used for mptcp because its already used internally to plumb subflow (tcp) sockets to the mptcp layer. syzbot ...

  • EPSS 0.02%
  • Veröffentlicht 19.06.2024 15:15:53
  • Zuletzt bearbeitet 21.11.2024 06:36:37

In the Linux kernel, the following vulnerability has been resolved: net: stmmac: fix tc flower deletion for VLAN priority Rx steering To replicate the issue:- 1) Add 1 flower filter for VLAN Priority based frame steering:- $ IFDEVNAME=eth0 $ tc qd...

  • EPSS 0.02%
  • Veröffentlicht 19.06.2024 15:15:53
  • Zuletzt bearbeitet 21.11.2024 06:36:37

In the Linux kernel, the following vulnerability has been resolved: mptcp: clear 'kern' flag from fallback sockets The mptcp ULP extension relies on sk->sk_sock_kern being set correctly: It prevents setsockopt(fd, IPPROTO_TCP, TCP_ULP, "mptcp", 6);...

  • EPSS 0.01%
  • Veröffentlicht 19.06.2024 15:15:53
  • Zuletzt bearbeitet 21.11.2024 06:36:37

In the Linux kernel, the following vulnerability has been resolved: mptcp: never allow the PM to close a listener subflow Currently, when deleting an endpoint the netlink PM treverses all the local MPTCP sockets, regardless of their status. If an ...

  • EPSS 0.01%
  • Veröffentlicht 19.06.2024 15:15:52
  • Zuletzt bearbeitet 21.11.2024 06:36:35

In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() In resp_mode_select() sanity check the block descriptor len to avoid UAF. BUG: KASAN: use-after-free i...

  • EPSS 0.01%
  • Veröffentlicht 19.06.2024 15:15:52
  • Zuletzt bearbeitet 29.09.2025 17:17:13

In the Linux kernel, the following vulnerability has been resolved: io-wq: check for wq exit after adding new worker task_work We check IO_WQ_BIT_EXIT before attempting to create a new worker, and wq exit cancels pending work if we have any. But it...

  • EPSS 0.02%
  • Veröffentlicht 19.06.2024 15:15:52
  • Zuletzt bearbeitet 21.11.2024 06:36:35

In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Don't call kcalloc() if size arg is zero If the size arg to kcalloc() is zero, it returns ZERO_SIZE_PTR. Because of that, for a following NULL pointer check to w...

  • EPSS 0.01%
  • Veröffentlicht 19.06.2024 15:15:52
  • Zuletzt bearbeitet 29.09.2025 17:15:51

In the Linux kernel, the following vulnerability has been resolved: ovl: fix warning in ovl_create_real() Syzbot triggered the following warning in ovl_workdir_create() -> ovl_create_real(): if (!err && WARN_ON(!newdentry->d_inode)) { The reason...

  • EPSS 0.01%
  • Veröffentlicht 19.06.2024 15:15:52
  • Zuletzt bearbeitet 01.04.2025 18:27:26

In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Fix type in min_t to avoid stack OOB Change min_t() to use type "u32" instead of type "int" to avoid stack out of bounds. With min_t() type "int" the values get s...