Linux

Linux Kernel

15173 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 24.04.2026 14:30:25
  • Zuletzt bearbeitet 28.04.2026 18:59:51

In the Linux kernel, the following vulnerability has been resolved: smb: server: make use of smbdirect_socket.recv_io.credits.available The logic off managing recv credits by counting posted recv_io and granted credits is racy. That's because the ...

  • EPSS 0.05%
  • Veröffentlicht 24.04.2026 14:30:24
  • Zuletzt bearbeitet 28.04.2026 19:10:25

In the Linux kernel, the following vulnerability has been resolved: smb: server: let send_done handle a completion without IB_SEND_SIGNALED With smbdirect_send_batch processing we likely have requests without IB_SEND_SIGNALED, which will be destroy...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:30:24
  • Zuletzt bearbeitet 28.04.2026 19:09:04

In the Linux kernel, the following vulnerability has been resolved: smb: server: make use of smbdirect_socket.send_io.bcredits It turns out that our code will corrupt the stream of reassabled data transfer messages when we trigger an immendiate (em...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:30:23
  • Zuletzt bearbeitet 28.04.2026 19:14:33

In the Linux kernel, the following vulnerability has been resolved: smb: client: make use of smbdirect_socket.recv_io.credits.available The logic off managing recv credits by counting posted recv_io and granted credits is racy. That's because the ...

  • EPSS -
  • Veröffentlicht 24.04.2026 14:30:22
  • Zuletzt bearbeitet 25.04.2026 06:16:13

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.04%
  • Veröffentlicht 23.04.2026 15:11:06
  • Zuletzt bearbeitet 29.04.2026 14:51:25

In the Linux kernel, the following vulnerability has been resolved: net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption The -EBUSY handling in tls_do_encryption(), introduced by commit 859054147318 ("net: tls: handle backlogging o...

  • EPSS 0.01%
  • Veröffentlicht 23.04.2026 11:12:44
  • Zuletzt bearbeitet 28.04.2026 17:38:49

In the Linux kernel, the following vulnerability has been resolved: ipv4: nexthop: allocate skb dynamically in rtm_get_nexthop() When querying a nexthop object via RTM_GETNEXTHOP, the kernel currently allocates a fixed-size skb using NLMSG_GOODSIZE...

  • EPSS 0.01%
  • Veröffentlicht 23.04.2026 11:12:44
  • Zuletzt bearbeitet 29.04.2026 15:26:27

In the Linux kernel, the following vulnerability has been resolved: can: raw: fix ro->uniq use-after-free in raw_rcv() raw_release() unregisters raw CAN receive filters via can_rx_unregister(), but receiver deletion is deferred with call_rcu(). Thi...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:53
  • Zuletzt bearbeitet 28.04.2026 18:00:28

In the Linux kernel, the following vulnerability has been resolved: perf: Make sure to use pmu_ctx->pmu for groups Oliver reported that x86_pmu_del() ended up doing an out-of-bound memory access when group_sched_in() fails and needs to roll back. ...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:53
  • Zuletzt bearbeitet 28.04.2026 17:57:24

In the Linux kernel, the following vulnerability has been resolved: cxl/region: Fix leakage in __construct_region() Failing the first sysfs_update_group() needs to explicitly kfree the resource as it is too early for cxl_region_iomem_release() to d...