Linux

Linux Kernel

12374 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Published 19.05.2024 11:15:47
  • Last modified 04.04.2025 14:24:16

In the Linux kernel, the following vulnerability has been resolved: sysv: don't call sb_bread() with pointers_lock held syzbot is reporting sleep in atomic context in SysV filesystem [1], for sb_bread() is called with rw_spinlock held. A "write_lo...

  • EPSS 0.13%
  • Published 19.05.2024 09:15:12
  • Last modified 04.04.2025 14:24:30

In the Linux kernel, the following vulnerability has been resolved: dma-buf: Fix NULL pointer dereference in sanitycheck() If due to a memory allocation failure mock_chain() returns NULL, it is passed to dma_fence_enable_sw_signaling() resulting in...

  • EPSS 0.03%
  • Published 19.05.2024 09:15:12
  • Last modified 23.09.2025 15:26:14

In the Linux kernel, the following vulnerability has been resolved: s390/bpf: Fix bpf_plt pointer arithmetic Kui-Feng Lee reported a crash on s390x triggered by the dummy_st_ops/dummy_init_ptr_arg test [1]: [<0000000000000002>] 0x2 [<000000000...

  • EPSS 0.02%
  • Published 19.05.2024 09:15:11
  • Last modified 30.12.2024 19:47:46

In the Linux kernel, the following vulnerability has been resolved: net/rds: fix possible cp null dereference cp might be null, calling cp->cp_conn would produce null dereference [Simon Horman adds:] Analysis: * cp is a parameter of __rds_rdma_m...

  • EPSS 0.03%
  • Published 19.05.2024 09:15:11
  • Last modified 24.09.2025 21:06:54

In the Linux kernel, the following vulnerability has been resolved: x86/bpf: Fix IP after emitting call depth accounting Adjust the IP passed to `emit_patch` so it calculates the correct offset for the CALL instruction if `x86_call_depth_emit_accou...

  • EPSS 0.02%
  • Published 19.05.2024 09:15:11
  • Last modified 03.02.2025 16:03:31

In the Linux kernel, the following vulnerability has been resolved: selinux: avoid dereference of garbage after mount failure In case kern_mount() fails and returns an error pointer return in the error branch instead of continuing and dereferencing...

  • EPSS 0.02%
  • Published 19.05.2024 09:15:11
  • Last modified 30.12.2024 19:47:30

In the Linux kernel, the following vulnerability has been resolved: bpf: Protect against int overflow for stack access size This patch re-introduces protection against the size of access to stack memory being negative; the access size can appear ne...

  • EPSS 0.03%
  • Published 19.05.2024 09:15:11
  • Last modified 30.12.2024 19:35:53

In the Linux kernel, the following vulnerability has been resolved: mlxbf_gige: call request_irq() after NAPI initialized The mlxbf_gige driver encounters a NULL pointer exception in mlxbf_gige_open() when kdump is enabled. The sequence to reprodu...

  • EPSS 0.03%
  • Published 19.05.2024 09:15:11
  • Last modified 24.09.2025 18:52:20

In the Linux kernel, the following vulnerability has been resolved: tls: get psock ref after taking rxlock to avoid leak At the start of tls_sw_recvmsg, we take a reference on the psock, and then call tls_rx_reader_lock. If that fails, we return di...

  • EPSS 0.03%
  • Published 19.05.2024 09:15:11
  • Last modified 24.09.2025 18:51:02

In the Linux kernel, the following vulnerability has been resolved: net: wwan: t7xx: Split 64bit accesses to fix alignment issues Some of the registers are aligned on a 32bit boundary, causing alignment faults on 64bit platforms. Unable to handle...