3.3

CVSS3.1

CVE-2024-46794 - x86/tdx: Fix data leak in mmio_read()

In the Linux kernel, the following vulnerability has been resolved: x86/tdx: Fix data leak in mmio_read() The mmio_read() function makes a TDVMCALL to retrieve MMIO data for an address from the VMM. Sean noticed that mmio_read() unintentionally exposes the value of an initialized variable (val) …

πŸ“… Published: Sept. 18, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 11:16 p.m.

8.2

CVSS3.1

CVE-2024-34057 -

Triangle Microworks TMW IEC 61850 Client source code libraries before 12.2.0 lack a buffer size check when processing received messages. The resulting buffer overflow can cause a crash, resulting in a denial of service.

πŸ“… Published: Sept. 18, 2024, midnight πŸ”„ Last Modified: Sept. 25, 2024, 5:08 p.m.

7.8

CVSS3.1

CVE-2024-46800 - sch/netem: fix use after free in netem_dequeue

In the Linux kernel, the following vulnerability has been resolved: sch/netem: fix use after free in netem_dequeue If netem_dequeue() enqueues packet to inner qdisc and that qdisc returns __NET_XMIT_STOLEN. The packet is dropped but qdisc_tree_reduce_backlog() is not called to update the parent's…

πŸ“… Published: Sept. 18, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 11:16 p.m.

5.5

CVSS3.1

CVE-2024-46788 - tracing/osnoise: Use a cpumask to know what threads are kthreads

In the Linux kernel, the following vulnerability has been resolved: tracing/osnoise: Use a cpumask to know what threads are kthreads The start_kthread() and stop_thread() code was not always called with the interface_lock held. This means that the kthread variable could be unexpectedly changed ca…

πŸ“… Published: Sept. 18, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 9:34 a.m.

5.5

CVSS3.1

CVE-2024-46785 - eventfs: Use list_del_rcu() for SRCU protected list variable

In the Linux kernel, the following vulnerability has been resolved: eventfs: Use list_del_rcu() for SRCU protected list variable Chi Zhiling reported: We found a null pointer accessing in tracefs[1], the reason is that the variable 'ei_child' is set to LIST_POISON1, that means the list was …

πŸ“… Published: Sept. 18, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 12:58 p.m.

7.8

CVSS3.1

CVE-2024-46736 - smb: client: fix double put of @cfile in smb2_rename_path()

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix double put of @cfile in smb2_rename_path() If smb2_set_path_attr() is called with a valid @cfile and returned -EINVAL, we need to call cifs_get_writable_path() again as the reference of @cfile was already dropped…

πŸ“… Published: Sept. 18, 2024, midnight πŸ”„ Last Modified: Sept. 26, 2025, 5:44 p.m.

7.5

CVSS3.1

CVE-2024-46582 -

Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sSrvAddr parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

πŸ“… Published: Sept. 18, 2024, midnight πŸ”„ Last Modified: March 18, 2025, 2:15 p.m.

5.5

CVSS3.1

CVE-2024-46735 - ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery()

In the Linux kernel, the following vulnerability has been resolved: ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery() When two UBLK_CMD_START_USER_RECOVERY commands are submitted, the first one sets 'ubq->ubq_daemon' to NULL, and the second one triggers WARN in ublk_queue_reini…

πŸ“… Published: Sept. 18, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 11:15 p.m.

5.5

CVSS3.1

CVE-2024-46755 - wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id()

In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() mwifiex_get_priv_by_id() returns the priv pointer corresponding to the bss_num and bss_type, but without checking if the priv is actually currently in use. Unus…

πŸ“… Published: Sept. 18, 2024, midnight πŸ”„ Last Modified: Jan. 5, 2026, 10:53 a.m.

5.5

CVSS3.1

CVE-2024-46753 - btrfs: handle errors from btrfs_dec_ref() properly

In the Linux kernel, the following vulnerability has been resolved: btrfs: handle errors from btrfs_dec_ref() properly In walk_up_proc() we BUG_ON(ret) from btrfs_dec_ref(). This is incorrect, we have proper error handling here, return the error.

πŸ“… Published: Sept. 18, 2024, midnight πŸ”„ Last Modified: Jan. 5, 2026, 10:53 a.m.
Total resulsts: 349182
Page 8527 of 34,919
Β« previous page Β» next page
Filters