4.7

CVSS3.1

CVE-2024-39500 - sock_map: avoid race between sock_map_close and sk_psock_put

In the Linux kernel, the following vulnerability has been resolved: sock_map: avoid race between sock_map_close and sk_psock_put sk_psock_get will return NULL if the refcount of psock has gone to 0, which will happen when the last call of sk_psock_put is done. However, sk_psock_drop may not have …

πŸ“… Published: July 12, 2024, midnight πŸ”„ Last Modified: Jan. 19, 2026, 12:17 p.m.

7.8

CVSS3.1

CVE-2024-39495 - greybus: Fix use-after-free bug in gb_interface_release due to race condition.

In the Linux kernel, the following vulnerability has been resolved: greybus: Fix use-after-free bug in gb_interface_release due to race condition. In gb_interface_create, &intf->mode_switch_completion is bound with gb_interface_mode_switch_work. Then it will be started by gb_interface_request_mod…

πŸ“… Published: July 12, 2024, midnight πŸ”„ Last Modified: Jan. 5, 2026, 10:36 a.m.

5.5

CVSS3.1

CVE-2024-40931 - mptcp: ensure snd_una is properly initialized on connect

In the Linux kernel, the following vulnerability has been resolved: mptcp: ensure snd_una is properly initialized on connect This is strictly related to commit fb7a0d334894 ("mptcp: ensure snd_nxt is properly initialized on connect"). It turns out that syzkaller can trigger the retransmit after f…

πŸ“… Published: July 12, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 10:17 p.m.

7.8

CVSS3.1

CVE-2024-41003 - bpf: Fix reg_set_min_max corruption of fake_reg

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix reg_set_min_max corruption of fake_reg Juan reported that after doing some changes to buzzer [0] and implementing a new fuzzing strategy guided by coverage, they noticed the following in one of the probes: [...] 13:…

πŸ“… Published: July 12, 2024, midnight πŸ”„ Last Modified: Sept. 25, 2025, 7:39 p.m.

8.8

CVSS3.1

CVE-2024-40544 -

PublicCMS v4.0.202302.e was discovered to contain a Server-Side Request Forgery (SSRF) via the component /admin/#maintenance_sysTask/edit.

πŸ“… Published: July 12, 2024, midnight πŸ”„ Last Modified: March 26, 2025, 4:15 p.m.

5.5

CVSS3.1

CVE-2024-40967 - serial: imx: Introduce timeout when waiting on transmitter empty

In the Linux kernel, the following vulnerability has been resolved: serial: imx: Introduce timeout when waiting on transmitter empty By waiting at most 1 second for USR2_TXDC to be set, we avoid a potential deadlock. In case of the timeout, there is not much we can do, so we simply ignore the tr…

πŸ“… Published: July 12, 2024, midnight πŸ”„ Last Modified: Jan. 5, 2026, 10:36 a.m.

5.5

CVSS3.1

CVE-2024-40970 - Avoid hw_desc array overrun in dw-axi-dmac

In the Linux kernel, the following vulnerability has been resolved: Avoid hw_desc array overrun in dw-axi-dmac I have a use case where nr_buffers = 3 and in which each descriptor is composed by 3 segments, resulting in the DMA channel descs_allocated to be 9. Since axi_desc_put() handles the hw_d…

πŸ“… Published: July 12, 2024, midnight πŸ”„ Last Modified: Jan. 5, 2026, 10:36 a.m.

5.5

CVSS3.1

CVE-2024-39509 - HID: core: remove unnecessary WARN_ON() in implement()

In the Linux kernel, the following vulnerability has been resolved: HID: core: remove unnecessary WARN_ON() in implement() Syzkaller hit a warning [1] in a call to implement() when trying to write a value into a field of smaller size in an output report. Since implement() already has a warn mess…

πŸ“… Published: July 12, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 10:17 p.m.

7.0

CVSS3.1

CVE-2024-39503 - netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type Lion Ackermann reported that there is a race condition between namespace cleanup in ipset and the garbage collection of the list:set type. The names…

πŸ“… Published: July 12, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 10:17 p.m.

5.5

CVSS3.1

CVE-2024-39505 - drm/komeda: check for error-valued pointer

In the Linux kernel, the following vulnerability has been resolved: drm/komeda: check for error-valued pointer komeda_pipeline_get_state() may return an error-valued pointer, thus check the pointer for negative or null value before dereferencing.

πŸ“… Published: July 12, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 10:17 p.m.
Total resulsts: 343944
Page 8643 of 34,395
Β« previous page Β» next page
Filters