5.5

CVSS3.1

CVE-2024-49937 - wifi: cfg80211: Set correct chandef when starting CAC

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Set correct chandef when starting CAC When starting CAC in a mode other than AP mode, it return a "WARNING: CPU: 0 PID: 63 at cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211]" caused by the chandef.chan being null…

πŸ“… Published: Oct. 21, 2024, midnight πŸ”„ Last Modified: Jan. 5, 2026, 10:54 a.m.

7.1

CVSS3.1

CVE-2024-49900 - jfs: Fix uninit-value access of new_ea in ea_buffer

In the Linux kernel, the following vulnerability has been resolved: jfs: Fix uninit-value access of new_ea in ea_buffer syzbot reports that lzo1x_1_do_compress is using uninit-value: ===================================================== BUG: KMSAN: uninit-value in lzo1x_1_do_compress+0x19f9/0x25…

πŸ“… Published: Oct. 21, 2024, midnight πŸ”„ Last Modified: Jan. 5, 2026, 10:54 a.m.

7.8

CVSS3.1

CVE-2024-49889 - ext4: avoid use-after-free in ext4_ext_show_leaf()

In the Linux kernel, the following vulnerability has been resolved: ext4: avoid use-after-free in ext4_ext_show_leaf() In ext4_find_extent(), path may be freed by error or be reallocated, so using a previously saved *ppath may have been freed and thus may trigger use-after-free, as follows: ext4…

πŸ“… Published: Oct. 21, 2024, midnight πŸ”„ Last Modified: Jan. 5, 2026, 10:54 a.m.

5.5

CVSS3.1

CVE-2024-49868 - btrfs: fix a NULL pointer dereference when failed to start a new trasacntion

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion [BUG] Syzbot reported a NULL pointer dereference with the following crash: FAULT_INJECTION: forcing a failure. start_transaction+0x830/0x1670 fs/b…

πŸ“… Published: Oct. 21, 2024, midnight πŸ”„ Last Modified: Jan. 5, 2026, 10:54 a.m.

5.5

CVSS3.1

CVE-2024-49867 - btrfs: wait for fixup workers before stopping cleaner kthread during umount

In the Linux kernel, the following vulnerability has been resolved: btrfs: wait for fixup workers before stopping cleaner kthread during umount During unmount, at close_ctree(), we have the following steps in this order: 1) Park the cleaner kthread - this doesn't destroy the kthread, it basicall…

πŸ“… Published: Oct. 21, 2024, midnight πŸ”„ Last Modified: Jan. 5, 2026, 10:54 a.m.

5.5

CVSS3.1

CVE-2022-49010 - hwmon: (coretemp) Check for null before removing sysfs attrs

In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) Check for null before removing sysfs attrs If coretemp_add_core() gets an error then pdata->core_data[indx] is already NULL and has been kfreed. Don't pass that to sysfs_remove_group() as that will crash in sysf…

πŸ“… Published: Oct. 21, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 8:27 a.m.

7.1

CVSS3.1

CVE-2022-48966 - net: mvneta: Prevent out of bounds read in mvneta_config_rss()

In the Linux kernel, the following vulnerability has been resolved: net: mvneta: Prevent out of bounds read in mvneta_config_rss() The pp->indir[0] value comes from the user. It is passed to: if (cpu_online(pp->rxq_def)) inside the mvneta_percpu_elect() function. It needs bounds checkeding t…

πŸ“… Published: Oct. 21, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 8:27 a.m.

5.5

CVSS3.1

CVE-2024-47755 - kernel: nvdimm: Fix devs leaks in scan_labels()

This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

πŸ“… Published: Oct. 21, 2024, midnight πŸ”„ Last Modified: Oct. 23, 2024, 6:15 a.m.

7.8

CVSS3.1

CVE-2024-47727 - x86/tdx: Fix "in-kernel MMIO" check

In the Linux kernel, the following vulnerability has been resolved: x86/tdx: Fix "in-kernel MMIO" check TDX only supports kernel-initiated MMIO operations. The handle_mmio() function checks if the #VE exception occurred in the kernel and rejects the operation if it did not. However, userspace ca…

πŸ“… Published: Oct. 21, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 11:16 p.m.

7.8

CVSS3.1

CVE-2024-50007 - ALSA: asihpi: Fix potential OOB array access

In the Linux kernel, the following vulnerability has been resolved: ALSA: asihpi: Fix potential OOB array access ASIHPI driver stores some values in the static array upon a response from the driver, and its index depends on the firmware. We shouldn't trust it blindly. This patch adds a sanity c…

πŸ“… Published: Oct. 21, 2024, midnight πŸ”„ Last Modified: Jan. 5, 2026, 10:54 a.m.
Total resulsts: 349182
Page 8212 of 34,919
Β« previous page Β» next page
Filters