7.8

CVSS3.1

CVE-2024-53139 - sctp: fix possible UAF in sctp_v6_available()

In the Linux kernel, the following vulnerability has been resolved: sctp: fix possible UAF in sctp_v6_available() A lockdep report [1] with CONFIG_PROVE_RCU_LIST=y hints that sctp_v6_available() is calling dev_get_by_index_rcu() and ipv6_chk_addr() without holding rcu. [1] =====================…

πŸ“… Published: Dec. 4, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 9:54 a.m.

4.7

CVSS3.1

CVE-2024-53136 - mm: revert "mm: shmem: fix data-race in shmem_getattr()"

In the Linux kernel, the following vulnerability has been resolved: mm: revert "mm: shmem: fix data-race in shmem_getattr()" Revert d949d1d14fa2 ("mm: shmem: fix data-race in shmem_getattr()") as suggested by Chuck [1]. It is causing deadlocks when accessing tmpfs over NFS. As Hugh commented, "…

πŸ“… Published: Dec. 4, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 11:17 p.m.

7.8

CVSS3.1

CVE-2024-53126 - vdpa: solidrun: Fix UB bug with devres

In the Linux kernel, the following vulnerability has been resolved: vdpa: solidrun: Fix UB bug with devres In psnet_open_pf_bar() and snet_open_vf_bar() a string later passed to pcim_iomap_regions() is placed on the stack. Neither pcim_iomap_regions() nor the functions it calls copy that string. …

πŸ“… Published: Dec. 4, 2024, midnight πŸ”„ Last Modified: Oct. 1, 2025, 9:16 p.m.

5.3

CVSS3.1

CVE-2024-51210 -

Firepad through 1.5.11 allows remote attackers, who have knowledge of a pad ID, to retrieve both the current text of a document and all content that has previously been pasted into the document. NOTE: in several similar products, this is the intentional behavior for anyone who knows the full docume…

πŸ“… Published: Dec. 4, 2024, midnight πŸ”„ Last Modified: Dec. 5, 2024, 6:15 p.m.

0.0

CVE-2024-54664 -

DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-52945. Reason: This candidate is a reservation duplicate of CVE-2024-52945. Notes: All CVE users should reference CVE-2024-52945 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta…

πŸ“… Published: Dec. 4, 2024, midnight πŸ”„ Last Modified: Jan. 9, 2025, 10:15 p.m.

5.5

CVSS3.1

CVE-2024-53137 - ARM: fix cacheflush with PAN

In the Linux kernel, the following vulnerability has been resolved: ARM: fix cacheflush with PAN It seems that the cacheflush syscall got broken when PAN for LPAE was implemented. User access was not enabled around the cache maintenance instructions, causing them to fault.

πŸ“… Published: Dec. 4, 2024, midnight πŸ”„ Last Modified: Oct. 1, 2025, 9:16 p.m.

5.5

CVSS3.1

CVE-2024-53132 - drm/xe/oa: Fix "Missing outer runtime PM protection" warning

In the Linux kernel, the following vulnerability has been resolved: drm/xe/oa: Fix "Missing outer runtime PM protection" warning Fix the following drm_WARN: [953.586396] xe 0000:00:02.0: [drm] Missing outer runtime PM protection ... <4> [953.587090] ? xe_pm_runtime_get_noresume+0x8d/0xa0 [xe] <…

πŸ“… Published: Dec. 4, 2024, midnight πŸ”„ Last Modified: Oct. 1, 2025, 9:16 p.m.

5.5

CVSS3.1

CVE-2024-53134 - pmdomain: imx93-blk-ctrl: correct remove path

In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx93-blk-ctrl: correct remove path The check condition should be 'i < bc->onecell_data.num_domains', not 'bc->onecell_data.num_domains' which will make the look never finish and cause kernel panic. Also disable runtim…

πŸ“… Published: Dec. 4, 2024, midnight πŸ”„ Last Modified: Oct. 1, 2025, 9:16 p.m.

5.5

CVSS3.1

CVE-2024-53138 - net/mlx5e: kTLS, Fix incorrect page refcounting

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: kTLS, Fix incorrect page refcounting The kTLS tx handling code is using a mix of get_page() and page_ref_inc() APIs to increment the page reference. But on the release path (mlx5e_ktls_tx_handle_resync_dump_comp()), on…

πŸ“… Published: Dec. 4, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 11:17 p.m.

5.5

CVSS3.1

CVE-2024-53130 - nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint When using the "block:block_dirty_buffer" tracepoint, mark_buffer_dirty() may cause a NULL pointer dereference, or a general protection fault when KASAN is enabled. Thi…

πŸ“… Published: Dec. 4, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 11:17 p.m.
Total resulsts: 342387
Page 6955 of 34,239
Β« previous page Β» next page
Filters