Linux

Linux Kernel

14022 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:53
  • Zuletzt bearbeitet 27.02.2025 14:34:43

In the Linux kernel, the following vulnerability has been resolved: spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected Return IRQ_NONE from the interrupt handler when no interrupt was detected. Because an empty interrupt will cause ...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:53
  • Zuletzt bearbeitet 27.02.2025 14:34:43

In the Linux kernel, the following vulnerability has been resolved: fbdev: sis: Error out if pixclock equals zero The userspace program could pass any values to the driver through ioctl() interface. If the driver doesn't check the value of pixclock...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:53
  • Zuletzt bearbeitet 27.02.2025 14:34:43

In the Linux kernel, the following vulnerability has been resolved: fbdev: savage: Error out if pixclock equals zero The userspace program could pass any values to the driver through ioctl() interface. If the driver doesn't check the value of pixcl...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:53
  • Zuletzt bearbeitet 04.04.2025 14:15:05

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix race condition on enabling fast-xmit fast-xmit must only be enabled after the sta has been uploaded to the driver, otherwise it could end up passing the not-yet...

  • EPSS 0.02%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 07.01.2025 21:13:04

In the Linux kernel, the following vulnerability has been resolved: gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() The gtp_net_ops pernet operations structure for the subsystem must be registered before registering the generic ne...

  • EPSS 0.16%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 04.04.2025 14:30:49

In the Linux kernel, the following vulnerability has been resolved: md: Don't suspend the array for interrupted reshape md_start_sync() will suspend the array if there are spares that can be added or removed from conf, however, if reshape is still ...

  • EPSS 0.02%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 17.03.2025 16:56:57

In the Linux kernel, the following vulnerability has been resolved: md: Don't register sync_thread for reshape directly Currently, if reshape is interrupted, then reassemble the array will register sync_thread directly from pers->run(), in this cas...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 04.04.2025 14:30:42

In the Linux kernel, the following vulnerability has been resolved: md: Don't ignore read-only array in md_check_recovery() Usually if the array is not read-write, md_check_recovery() won't register new sync_thread in the first place. And if the ar...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 04.04.2025 14:30:16

In the Linux kernel, the following vulnerability has been resolved: md: Don't ignore suspended array in md_check_recovery() mddev_suspend() never stop sync_thread, hence it doesn't make sense to ignore suspended array in md_check_recovery(), which ...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 16.04.2025 19:15:50

In the Linux kernel, the following vulnerability has been resolved: mm/swap: fix race when skipping swapcache When skipping swapcache for SWP_SYNCHRONOUS_IO, if two or more threads swapin the same entry at the same time, they get different pages (A...