Linux

Linux Kernel

14022 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:13
  • Zuletzt bearbeitet 30.12.2024 19:05:15

In the Linux kernel, the following vulnerability has been resolved: net: usb: fix possible use-after-free in smsc75xx_bind The commit 46a8b29c6306 ("net: usb: fix memory leak in smsc75xx_bind") fails to clean up the work scheduled in smsc75xx_reset...

  • EPSS 0.04%
  • Veröffentlicht 21.05.2024 15:15:13
  • Zuletzt bearbeitet 30.12.2024 19:04:58

In the Linux kernel, the following vulnerability has been resolved: net: qrtr: fix OOB Read in qrtr_endpoint_post Syzbot reported slab-out-of-bounds Read in qrtr_endpoint_post. The problem was in wrong _size_ type: if (len != ALIGN(size, 4) + hdr...

  • EPSS 0.05%
  • Veröffentlicht 21.05.2024 15:15:13
  • Zuletzt bearbeitet 04.04.2025 14:30:41

In the Linux kernel, the following vulnerability has been resolved: ethtool: strset: fix message length calculation Outer nest for ETHTOOL_A_STRSET_STRINGSETS is not accounted for. This may result in ETHTOOL_MSG_STRSET_GET producing a warning like:...

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 15:15:13
  • Zuletzt bearbeitet 04.04.2025 14:30:32

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix soft lookup in subflow_error_report() Maxim reported a soft lookup in subflow_error_report(): watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [swapper/0:0] RIP: 001...

  • EPSS 0.12%
  • Veröffentlicht 21.05.2024 15:15:13
  • Zuletzt bearbeitet 30.12.2024 19:04:26

In the Linux kernel, the following vulnerability has been resolved: sch_cake: Fix out of bounds when parsing TCP options and header The TCP option parser in cake qdisc (cake_get_tcpopt and cake_tcph_may_drop) could read one byte out of bounds. When...

  • EPSS 0.07%
  • Veröffentlicht 21.05.2024 15:15:13
  • Zuletzt bearbeitet 04.04.2025 14:30:24

In the Linux kernel, the following vulnerability has been resolved: mptcp: Fix out of bounds when parsing TCP options The TCP option parser in mptcp (mptcp_get_options) could read one byte out of bounds. When the length is 1, the execution flow get...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:13
  • Zuletzt bearbeitet 30.12.2024 19:03:58

In the Linux kernel, the following vulnerability has been resolved: netfilter: synproxy: Fix out of bounds when parsing TCP options The TCP option parser in synproxy (synproxy_parse_options) could read one byte out of bounds. When the length is 1, ...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:13
  • Zuletzt bearbeitet 29.04.2025 19:45:28

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix page reclaim for dead peer hairpin When adding a hairpin flow, a firmware-side send queue is created for the peer net device, which claims some host memory pages for...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:13
  • Zuletzt bearbeitet 14.11.2025 17:16:18

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix use-after-free of encap entry in neigh update handler Function mlx5e_rep_neigh_update() wasn't updated to accommodate rtnl lock removal from TC filter update path an...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:13
  • Zuletzt bearbeitet 30.04.2025 15:21:04

In the Linux kernel, the following vulnerability has been resolved: udp: fix race between close() and udp_abort() Kaustubh reported and diagnosed a panic in udp_lib_lookup(). The root cause is udp_abort() racing with close(). Both racing functions ...