5.5

CVSS3.1

CVE-2024-44936 - power: supply: rt5033: Bring back i2c_set_clientdata

In the Linux kernel, the following vulnerability has been resolved: power: supply: rt5033: Bring back i2c_set_clientdata Commit 3a93da231c12 ("power: supply: rt5033: Use devm_power_supply_register() helper") reworked the driver to use devm. While at it, the i2c_set_clientdata was dropped along wi…

πŸ“… Published: Aug. 26, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 9:29 a.m.

7.8

CVSS3.1

CVE-2024-44932 - idpf: fix UAFs when destroying the queues

In the Linux kernel, the following vulnerability has been resolved: idpf: fix UAFs when destroying the queues The second tagged commit started sometimes (very rarely, but possible) throwing WARNs from net/core/page_pool.c:page_pool_disable_direct_recycling(). Turned out idpf frees interrupt vecto…

πŸ“… Published: Aug. 26, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 9:29 a.m.

5.5

CVSS3.1

CVE-2024-43906 - drm/admgpu: fix dereferencing null pointer context

In the Linux kernel, the following vulnerability has been resolved: drm/admgpu: fix dereferencing null pointer context When user space sets an invalid ta type, the pointer context will be empty. So it need to check the pointer context before using it

πŸ“… Published: Aug. 26, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 9:28 a.m.

7.8

CVSS3.1

CVE-2024-43888 - mm: list_lru: fix UAF for memory cgroup

In the Linux kernel, the following vulnerability has been resolved: mm: list_lru: fix UAF for memory cgroup The mem_cgroup_from_slab_obj() is supposed to be called under rcu lock or cgroup_mutex or others which could prevent returned memcg from being freed. Fix it by adding missing rcu read lock…

πŸ“… Published: Aug. 26, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 9:28 a.m.

5.5

CVSS3.1

CVE-2024-43886 - drm/amd/display: Add null check in resource_log_pipe_topology_update

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add null check in resource_log_pipe_topology_update [WHY] When switching from "Extend" to "Second Display Only" we sometimes call resource_get_otg_master_for_stream on a stream for the eDP, which is disconnected.…

πŸ“… Published: Aug. 26, 2024, midnight πŸ”„ Last Modified: Sept. 3, 2025, 1:06 p.m.

5.5

CVSS3.1

CVE-2024-43912 - wifi: nl80211: disallow setting special AP channel widths

In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: disallow setting special AP channel widths Setting the AP channel width is meant for use with the normal 20/40/... MHz channel width progression, and switching around in S1G or narrow channels isn't supported. Disa…

πŸ“… Published: Aug. 26, 2024, midnight πŸ”„ Last Modified: Jan. 5, 2026, 10:52 a.m.

6.1

CVSS3.1

CVE-2024-44795 -

A cross-site scripting (XSS) vulnerability in the component /login/disabled.php of Gazelle commit 63b3370 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username parameter.

πŸ“… Published: Aug. 26, 2024, midnight πŸ”„ Last Modified: Sept. 5, 2024, 6:26 p.m.

4.7

CVSS3.1

CVE-2024-43892 - memcg: protect concurrent access to mem_cgroup_idr

In the Linux kernel, the following vulnerability has been resolved: memcg: protect concurrent access to mem_cgroup_idr Commit 73f576c04b94 ("mm: memcontrol: fix cgroup creation failure after many small jobs") decoupled the memcg IDs from the CSS ID space to fix the cgroup creation failures. It i…

πŸ“… Published: Aug. 26, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 10:18 p.m.

5.5

CVSS3.1

CVE-2024-43884 - Bluetooth: MGMT: Add error handling to pair_device()

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Add error handling to pair_device() hci_conn_params_add() never checks for a NULL value and could lead to a NULL pointer dereference causing a crash. Fixed by adding error handling in the function.

πŸ“… Published: Aug. 26, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 10:18 p.m.

7.8

CVSS3.1

CVE-2024-44934 - net: bridge: mcast: wait for previous gc cycles when removing port

In the Linux kernel, the following vulnerability has been resolved: net: bridge: mcast: wait for previous gc cycles when removing port syzbot hit a use-after-free[1] which is caused because the bridge doesn't make sure that all previous garbage has been collected when removing a port. What happen…

πŸ“… Published: Aug. 26, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 11:15 p.m.
Total resulsts: 349182
Page 8737 of 34,919
Β« previous page Β» next page
Filters