Linux

Linux Kernel

12957 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 15.10.2025 07:55:58
  • Zuletzt bearbeitet 16.10.2025 15:29:11

In the Linux kernel, the following vulnerability has been resolved: futex: Prevent use-after-free during requeue-PI syzbot managed to trigger the following race: T1 T2 futex_wait_requeue_pi() futex_do_wait() ...

  • EPSS 0.04%
  • Veröffentlicht 15.10.2025 07:55:58
  • Zuletzt bearbeitet 16.10.2025 15:29:11

In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node" and then dereferences it on the next line...

  • EPSS 0.03%
  • Veröffentlicht 15.10.2025 07:55:57
  • Zuletzt bearbeitet 16.10.2025 15:29:11

In the Linux kernel, the following vulnerability has been resolved: futex: Use correct exit on failure from futex_hash_allocate_default() copy_process() uses the wrong error exit path from futex_hash_allocate_default(). After exiting from futex_has...

  • EPSS 0.03%
  • Veröffentlicht 15.10.2025 07:55:56
  • Zuletzt bearbeitet 16.10.2025 15:29:11

In the Linux kernel, the following vulnerability has been resolved: tracing/osnoise: Fix slab-out-of-bounds in _parse_integer_limit() When config osnoise cpus by write() syscall, the following KASAN splat may be observed: BUG: KASAN: slab-out-of-b...

  • EPSS 0.03%
  • Veröffentlicht 15.10.2025 07:55:56
  • Zuletzt bearbeitet 16.10.2025 15:29:11

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix wrong index reference in smb2_compound_op() In smb2_compound_op(), the loop that processes each command's response uses wrong indices when accessing response buffe...

  • EPSS 0.05%
  • Veröffentlicht 15.10.2025 07:55:55
  • Zuletzt bearbeitet 16.10.2025 15:29:11

In the Linux kernel, the following vulnerability has been resolved: i40e: add validation for ring_len param The `ring_len` parameter provided by the virtual function (VF) is assigned directly to the hardware memory context (HMC) without any validat...

  • EPSS 0.05%
  • Veröffentlicht 15.10.2025 07:55:54
  • Zuletzt bearbeitet 16.10.2025 15:29:11

In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in config queues msg Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_vc_config_queues_msg().

  • EPSS 0.05%
  • Veröffentlicht 15.10.2025 07:55:54
  • Zuletzt bearbeitet 16.10.2025 15:29:11

In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in i40e_validate_queue_map Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_validate_queue_map().

  • EPSS 0.05%
  • Veröffentlicht 15.10.2025 07:55:53
  • Zuletzt bearbeitet 16.10.2025 15:29:11

In the Linux kernel, the following vulnerability has been resolved: i40e: fix input validation logic for action_meta Fix condition to check 'greater or equal' to prevent OOB dereference.

  • EPSS 0.05%
  • Veröffentlicht 15.10.2025 07:55:52
  • Zuletzt bearbeitet 16.10.2025 15:29:11

In the Linux kernel, the following vulnerability has been resolved: i40e: add max boundary check for VF filters There is no check for max filters that VF can request. Add it.