Lucene search

K

9842 matches found

CVE
CVE
added 2004/02/17 5:0 a.m.41 views

CVE-2004-0058

Antivir / Linux 2.0.9-9, and possibly earlier versions, allows local users to overwrite arbitrary files via a symlink attack on the .pid_antivir_$$ temporary file.

2.1CVSS6.8AI score0.00107EPSS
CVE
CVE
added 2016/05/02 10:59 a.m.41 views

CVE-2008-7316

mm/filemap.c in the Linux kernel before 2.6.25 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers an iovec of zero length, followed by a page fault for an iovec of nonzero length.

5.5CVSS5.1AI score0.00109EPSS
CVE
CVE
added 2024/08/21 7:15 a.m.41 views

CVE-2022-48897

In the Linux kernel, the following vulnerability has been resolved: arm64/mm: fix incorrect file_map_count for invalid pmd The page table check trigger BUG_ON() unexpectedly when split hugepage: ------------[ cut here ]------------kernel BUG at mm/page_table_check.c:119!Internal error: Oops - BUG: ...

5.5CVSS6.6AI score0.00036EPSS
CVE
CVE
added 2024/10/21 8:15 p.m.41 views

CVE-2022-48996

In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: fix wrong empty schemes assumption under online tuning in damon_sysfs_set_schemes() Commit da87878010e5 ("mm/damon/sysfs: support online inputs update") made'damon_sysfs_set_schemes()' to be called for running DAMON...

5.5CVSS5.4AI score0.00082EPSS
CVE
CVE
added 2024/10/21 8:15 p.m.41 views

CVE-2022-49018

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix sleep in atomic at close time Matt reported a splat at msk close time: BUG: sleeping function called from invalid context at net/mptcp/protocol.c:2877 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 155, name: pac...

5.5CVSS5.3AI score0.00026EPSS
CVE
CVE
added 2024/10/21 8:15 p.m.41 views

CVE-2022-49030

In the Linux kernel, the following vulnerability has been resolved: libbpf: Handle size overflow for ringbuf mmap The maximum size of ringbuf is 2GB on x86-64 host, so 2 * max_entrieswill overflow u32 when mapping producer page and data pages. Onlycasting max_entries to size_t is not enough, becaus...

7.8CVSS7.4AI score0.00063EPSS
CVE
CVE
added 2025/03/27 5:15 p.m.41 views

CVE-2022-49747

In the Linux kernel, the following vulnerability has been resolved: erofs/zmap.c: Fix incorrect offset calculation Effective offset to add to length was being incorrectly calculated,which resulted in iomap->length being set to 0, triggering a WARN_ONin iomap_iter_done(). Fix that, and describe i...

6.5AI score0.00024EPSS
CVE
CVE
added 2025/03/27 5:15 p.m.41 views

CVE-2022-49758

In the Linux kernel, the following vulnerability has been resolved: reset: uniphier-glue: Fix possible null-ptr-deref It will cause null-ptr-deref when resource_size(res) invoked,if platform_get_resource() returns NULL.

5.5CVSS6.6AI score0.00017EPSS
CVE
CVE
added 2025/05/01 3:15 p.m.41 views

CVE-2022-49764

In the Linux kernel, the following vulnerability has been resolved: bpf: Prevent bpf program recursion for raw tracepoint probes We got report from sysbot [1] about warnings that were caused bybpf program attached to contention_begin raw tracepoint triggeringthe same tracepoint by using bpf_trace_p...

6.8AI score0.00029EPSS
CVE
CVE
added 2025/05/01 3:16 p.m.41 views

CVE-2022-49786

In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: properly pin the parent in blkcg_css_online blkcg_css_online is supposed to pin the blkcg of the parent, but397c9f46ee4d refactored things and along the way, changed it to pin thecss instead. This results in extra pins,...

6.5AI score0.00027EPSS
CVE
CVE
added 2025/05/01 3:16 p.m.41 views

CVE-2022-49820

In the Linux kernel, the following vulnerability has been resolved: mctp i2c: don't count unused / invalid keys for flow release We're currently hitting the WARN_ON in mctp_i2c_flow_release: if (midev->release_count > midev->i2c_lock_count) { WARN_ONCE(1, "release count overflow"); This ma...

6.5AI score0.00027EPSS
CVE
CVE
added 2025/05/01 3:16 p.m.41 views

CVE-2022-49831

In the Linux kernel, the following vulnerability has been resolved: btrfs: zoned: initialize device's zone info for seeding When performing seeding on a zoned filesystem it is necessary toinitialize each zoned device's btrfs_zoned_device_info structure,otherwise mounting the filesystem will cause a...

6.6AI score0.00025EPSS
CVE
CVE
added 2025/05/01 3:16 p.m.41 views

CVE-2022-49834

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix use-after-free bug of ns_writer on remount If a nilfs2 filesystem is downgraded to read-only due to metadatacorruption on disk and is remounted read/write, or if emergency read-onlyremount is performed, detaching a log ...

6.5AI score0.00095EPSS
CVE
CVE
added 2025/05/01 3:16 p.m.41 views

CVE-2022-49847

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw: Fix segmentation fault at module unload Move am65_cpsw_nuss_phylink_cleanup() call to afteram65_cpsw_nuss_cleanup_ndev() so phylink is still validto prevent the below Segmentation fault on module remov...

6.4AI score0.00027EPSS
CVE
CVE
added 2025/05/01 3:16 p.m.41 views

CVE-2022-49858

In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix SQE threshold checking Current way of checking available SQE count which is based onHW updated SQB count could result in driver submitting an SQEeven before CQE for the previously transmitted SQE at the sameindex ...

6.5AI score0.00027EPSS
CVE
CVE
added 2025/05/01 3:16 p.m.41 views

CVE-2022-49876

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix general-protection-fault in ieee80211_subif_start_xmit() When device is running and the interface status is changed, the gpf issueis triggered. The problem triggering process is as follows:Thread A: Thread Bieee...

5.5CVSS6.5AI score0.00019EPSS
CVE
CVE
added 2025/05/01 3:16 p.m.41 views

CVE-2022-49898

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix tree mod log mishandling of reallocated nodes We have been seeing the following panic in production kernel BUG at fs/btrfs/tree-mod-log.c:677!invalid opcode: 0000 [#1] SMPRIP: 0010:tree_mod_log_rewind+0x1b4/0x200RSP: 000...

6.6AI score0.00025EPSS
CVE
CVE
added 2025/05/01 3:16 p.m.41 views

CVE-2022-49905

In the Linux kernel, the following vulnerability has been resolved: net/smc: Fix possible leaked pernet namespace in smc_init() In smc_init(), register_pernet_subsys(&smc_net_stat_ops) is calledwithout any error handling.If it fails, registering of &smc_net_ops won't be reverted.And if smc_nl_init(...

6.5AI score0.00025EPSS
CVE
CVE
added 2024/05/17 3:15 p.m.41 views

CVE-2023-52684

In the Linux kernel, the following vulnerability has been resolved: firmware: qcom: qseecom: fix memory leaks in error paths Fix instances of returning error codes directly instead of jumping tothe relevant labels where memory allocated for the SCM calls would befreed.

5.5CVSS6.7AI score0.00041EPSS
CVE
CVE
added 2025/03/27 5:15 p.m.41 views

CVE-2023-52986

In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener A listening socket linked to a sockmap has its sk_prot overridden. Itpoints to one of the struct proto variants in tcp_bpf_prots. The variantdepends on the socket...

6.5AI score0.00089EPSS
CVE
CVE
added 2025/05/02 4:15 p.m.41 views

CVE-2023-53053

In the Linux kernel, the following vulnerability has been resolved: erspan: do not use skb_mac_header() in ndo_start_xmit() Drivers should not assume skb_mac_header(skb) == skb->data in theirndo_start_xmit(). Use skb_network_offset() and skb_transport_offset() whichbetter describe what is needed...

6.5AI score0.00099EPSS
CVE
CVE
added 2025/05/02 4:15 p.m.41 views

CVE-2023-53054

In the Linux kernel, the following vulnerability has been resolved: usb: dwc2: fix a devres leak in hw_enable upon suspend resume Each time the platform goes to low power, PM suspend / resume routinescall: __dwc2_lowlevel_hw_enable -> devm_add_action_or_reset().This adds a new devres each time.T...

6.3AI score0.00027EPSS
CVE
CVE
added 2025/05/02 4:15 p.m.41 views

CVE-2023-53092

In the Linux kernel, the following vulnerability has been resolved: interconnect: exynos: fix node leak in probe PM QoS error path Make sure to add the newly allocated interconnect node to the providerbefore adding the PM QoS request so that the node is freed on errors.

6.5AI score0.00026EPSS
CVE
CVE
added 2025/05/02 4:15 p.m.41 views

CVE-2023-53116

In the Linux kernel, the following vulnerability has been resolved: nvmet: avoid potential UAF in nvmet_req_complete() An nvme target ->queue_response() operation implementation may free therequest passed as argument. Such implementation potentially could resultin a use after free of the request...

6.4AI score0.00036EPSS
CVE
CVE
added 2025/05/02 4:15 p.m.41 views

CVE-2023-53127

In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Fix expander node leak in mpi3mr_remove() Add a missing resource clean up in .remove.

6.5AI score0.00025EPSS
CVE
CVE
added 2024/06/19 2:15 p.m.41 views

CVE-2024-38584

In the Linux kernel, the following vulnerability has been resolved: net: ti: icssg_prueth: Fix NULL pointer dereference in prueth_probe() In the prueth_probe() function, if one of the calls to emac_phy_connect()fails due to of_phy_connect() returning NULL, then the subsequent call tophy_attached_in...

5.5CVSS7.1AI score0.00048EPSS
CVE
CVE
added 2024/07/12 1:15 p.m.41 views

CVE-2024-40950

In the Linux kernel, the following vulnerability has been resolved: mm: huge_memory: fix misused mapping_large_folio_support() for anon folios When I did a large folios split test, a WARNING "[ 5059.122759][ T166]Cannot split file folio to non-0 order" was triggered. But the test casesare only for ...

6.4AI score0.00076EPSS
CVE
CVE
added 2024/08/17 9:15 a.m.41 views

CVE-2024-42275

In the Linux kernel, the following vulnerability has been resolved: drm/client: Fix error code in drm_client_buffer_vmap_local() This function accidentally returns zero/success on the failure path.It leads to locking issues and an uninitialized *map_copy in thecaller.

6.7AI score0.00076EPSS
CVE
CVE
added 2024/08/26 11:15 a.m.41 views

CVE-2024-44936

In the Linux kernel, the following vulnerability has been resolved: power: supply: rt5033: Bring back i2c_set_clientdata Commit 3a93da231c12 ("power: supply: rt5033: Use devm_power_supply_register() helper")reworked the driver to use devm. While at it, the i2c_set_clientdatawas dropped along with t...

5.5CVSS6.9AI score0.00047EPSS
CVE
CVE
added 2024/10/21 12:15 p.m.41 views

CVE-2024-47676

In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb.c: fix UAF of vma in hugetlb fault pathway Syzbot reports a UAF in hugetlb_fault(). This happens becausevmf_anon_prepare() could drop the per-VMA lock and allow the current VMAto be freed before hugetlb_vma_unlock_read()...

7.8CVSS8.1AI score0.00039EPSS
CVE
CVE
added 2024/10/21 12:15 p.m.41 views

CVE-2024-47694

In the Linux kernel, the following vulnerability has been resolved: IB/mlx5: Fix UMR pd cleanup on error flow of driver init The cited commit moves the pd allocation from functionmlx5r_umr_resource_cleanup() to a new function mlx5r_umr_cleanup().So the fix in commit [1] is broken. In error flow, wi...

5.5CVSS6.5AI score0.00034EPSS
CVE
CVE
added 2024/10/21 1:15 p.m.41 views

CVE-2024-47724

In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: use work queue to process beacon tx event Commit 3a415daa3e8b ("wifi: ath11k: add P2P IE in beacon template")from Feb 28, 2024 (linux-next), leads to the following Smatch staticchecker warning: drivers/net/wireless/at...

5.5CVSS5.3AI score0.00028EPSS
CVE
CVE
added 2024/10/21 6:15 p.m.41 views

CVE-2024-49956

In the Linux kernel, the following vulnerability has been resolved: gfs2: fix double destroy_workqueue error When gfs2_fill_super() fails, destroy_workqueue() is called withingfs2_gl_hash_clear(), and the subsequent code path callsdestroy_workqueue() on the same work queue again. This issue can be ...

5.5CVSS5.4AI score0.00034EPSS
CVE
CVE
added 2024/11/05 5:15 p.m.41 views

CVE-2024-50094

In the Linux kernel, the following vulnerability has been resolved: sfc: Don't invoke xdp_do_flush() from netpoll. Yury reported a crash in the sfc driver originated fromnetpoll_send_udp(). The netconsole sends a message and then netpollinvokes the driver's NAPI function with a budget of zero. It i...

5.5CVSS5.3AI score0.0003EPSS
CVE
CVE
added 2024/11/08 6:15 a.m.41 views

CVE-2024-50204

In the Linux kernel, the following vulnerability has been resolved: fs: don't try and remove empty rbtree node When copying a namespace we won't have added the new copy into thenamespace rbtree until after the copy succeeded. Calling free_mnt_ns()will try to remove the copy from the rbtree which is...

5.5CVSS5.3AI score0.0003EPSS
CVE
CVE
added 2024/12/27 2:15 p.m.41 views

CVE-2024-53199

In the Linux kernel, the following vulnerability has been resolved: ASoC: imx-audmix: Add NULL check in imx_audmix_probe devm_kasprintf() can return a NULL pointer on failure,but thisreturned value in imx_audmix_probe() is not checked.Add NULL check in imx_audmix_probe(), to handle kernel NULLpoint...

5.5CVSS6.8AI score0.00023EPSS
CVE
CVE
added 2025/02/27 3:15 a.m.41 views

CVE-2024-57852

In the Linux kernel, the following vulnerability has been resolved: firmware: qcom: scm: smc: Handle missing SCM device Commit ca61d6836e6f ("firmware: qcom: scm: fix a NULL-pointerdereference") makes it explicit that qcom_scm_get_tzmem_pool() canreturn NULL, therefore its users should handle this.

6.5AI score0.00028EPSS
CVE
CVE
added 2025/03/06 4:15 p.m.41 views

CVE-2024-58059

In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix deadlock during uvc_probe If uvc_probe() fails, it can end up calling uvc_status_unregister() beforeuvc_status_init() is called. Fix this by checking if dev->status is NULL or not inuvc_status_unregister().

5.5CVSS7.2AI score0.00021EPSS
CVE
CVE
added 2025/03/06 4:15 p.m.41 views

CVE-2024-58062

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: avoid NULL pointer dereference When iterating over the links of a vif, we need to make sure that thepointer is valid (in other words - that the link exists) beforedereferncing it.Use for_each_vif_active_link tha...

5.5CVSS7.1AI score0.00029EPSS
CVE
CVE
added 2025/02/27 3:15 a.m.41 views

CVE-2025-21769

In the Linux kernel, the following vulnerability has been resolved: ptp: vmclock: Add .owner to vmclock_miscdev_fops Without the .owner field, the module can be unloaded while /dev/vmclock0is open, leading to an oops.

5.5CVSS6.6AI score0.0002EPSS
CVE
CVE
added 2025/04/01 4:15 p.m.41 views

CVE-2025-21958

In the Linux kernel, the following vulnerability has been resolved: Revert "openvswitch: switch to per-action label counting in conntrack" Currently, ovs_ct_set_labels() is only called for confirmed conntrackentries (ct) within ovs_ct_commit(). However, if the conntrack entrydoes not have the label...

7.1AI score0.00025EPSS
CVE
CVE
added 2025/04/01 4:15 p.m.41 views

CVE-2025-21974

In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: return fail if interface is down in bnxt_queue_mem_alloc() The bnxt_queue_mem_alloc() is called to allocate new queue memory whena queue is restarted.It internally accesses rx buffer descriptor corresponding to the index...

7.1AI score0.00025EPSS
CVE
CVE
added 2025/05/09 7:16 a.m.41 views

CVE-2025-37846

In the Linux kernel, the following vulnerability has been resolved: arm64: mops: Do not dereference src reg for a set operation The source register is not used for SET* and reading it can result ina UBSAN out-of-bounds array access error, specifically when the MOPSexception is taken from a SET* seq...

6.6AI score0.00026EPSS
CVE
CVE
added 2025/05/20 4:15 p.m.41 views

CVE-2025-37926

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_session_rpc_open A UAF issue can occur due to a race condition betweenksmbd_session_rpc_open() and __session_rpc_close().Add rpc_lock to the session to protect it.

6.5AI score0.00024EPSS
CVE
CVE
added 2002/05/03 4:0 a.m.40 views

CVE-2001-1273

The "mxcsr P4" vulnerability in the Linux kernel before 2.2.17-14, when running on certain Intel CPUs, allows local users to cause a denial of service (system halt).

2.1CVSS6.5AI score0.00051EPSS
CVE
CVE
added 2007/09/26 10:17 a.m.40 views

CVE-2007-5087

The ATM module in the Linux kernel before 2.4.35.3, when CLIP support is enabled, allows local users to cause a denial of service (kernel panic) by reading /proc/net/atm/arp before the CLIP module has been loaded.

4.9CVSS6.1AI score0.00111EPSS
CVE
CVE
added 2009/11/20 2:30 a.m.40 views

CVE-2009-4004

Buffer overflow in the kvm_vcpu_ioctl_x86_setup_mce function in arch/x86/kvm/x86.c in the KVM subsystem in the Linux kernel before 2.6.32-rc7 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a KVM_X86_SETUP_MCE IOCTL request that specifies a large ...

7.8CVSS7.7AI score0.00052EPSS
CVE
CVE
added 2013/04/29 2:55 p.m.40 views

CVE-2013-3302

Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.

4.4CVSS7.1AI score0.00047EPSS
CVE
CVE
added 2025/05/01 3:16 p.m.40 views

CVE-2022-49773

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix optc2_configure warning on dcn314 [Why]dcn314 uses optc2_configure_crc() that wrapsoptc1_configure_crc() + set additional registersnot applicable to dcn314.It's not critical but when used leads to warning like:...

6.5AI score0.00027EPSS
CVE
CVE
added 2025/05/01 3:16 p.m.40 views

CVE-2022-49781

In the Linux kernel, the following vulnerability has been resolved: perf/x86/amd: Fix crash due to race between amd_pmu_enable_all, perf NMI and throttling amd_pmu_enable_all() does: if (!test_bit(idx, cpuc->active_mask)) continue; amd_pmu_enable_event(cpuc->events[idx]); A perf NMI of anothe...

6.2AI score0.00027EPSS
Total number of security vulnerabilities9842