5.5

CVSS3.1

CVE-2021-47591 - mptcp: remove tcp ulp setsockopt support

In the Linux kernel, the following vulnerability has been resolved: mptcp: remove tcp ulp setsockopt support TCP_ULP setsockopt cannot be used for mptcp because its already used internally to plumb subflow (tcp) sockets to the mptcp layer. syzbot managed to trigger a crash for mptcp connections …

πŸ“… Published: June 19, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 7:14 a.m.

5.5

CVSS3.1

CVE-2021-47588 - sit: do not call ipip6_dev_free() from sit_init_net()

In the Linux kernel, the following vulnerability has been resolved: sit: do not call ipip6_dev_free() from sit_init_net() ipip6_dev_free is sit dev->priv_destructor, already called by register_netdevice() if something goes wrong. Alternative would be to make ipip6_dev_free() robust against multi…

πŸ“… Published: June 19, 2024, midnight πŸ”„ Last Modified: Oct. 1, 2025, 1:42 p.m.

5.5

CVSS3.1

CVE-2021-47586 - net: stmmac: dwmac-rk: fix oob read in rk_gmac_setup

In the Linux kernel, the following vulnerability has been resolved: net: stmmac: dwmac-rk: fix oob read in rk_gmac_setup KASAN reports an out-of-bounds read in rk_gmac_setup on the line: while (ops->regs[i]) { This happens for most platforms since the regs flexible array member is empty, so th…

πŸ“… Published: June 19, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 7:14 a.m.

7.8

CVSS3.1

CVE-2024-36979 - net: bridge: mst: fix vlan use-after-free

In the Linux kernel, the following vulnerability has been resolved: net: bridge: mst: fix vlan use-after-free syzbot reported a suspicious rcu usage[1] in bridge's mst code. While fixing it I noticed that nothing prevents a vlan to be freed while walking the list from the same path (br forward de…

πŸ“… Published: June 19, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 9:13 a.m.

6.3

CVSS3.1

CVE-2024-34993 -

In the module "Bulk Export products to Google Merchant-Google Shopping" (bagoogleshopping) up to version 1.0.26 from Buy Addons for PrestaShop, a guest can perform SQL injection via`GenerateCategories::renderCategories().

πŸ“… Published: June 19, 2024, midnight πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.5

CVSS3.1

CVE-2024-38579 - crypto: bcm - Fix pointer arithmetic

In the Linux kernel, the following vulnerability has been resolved: crypto: bcm - Fix pointer arithmetic In spu2_dump_omd() value of ptr is increased by ciph_key_len instead of hash_iv_len which could lead to going beyond the buffer boundaries. Fix this bug by changing ciph_key_len to hash_iv_len…

πŸ“… Published: June 19, 2024, midnight πŸ”„ Last Modified: Nov. 4, 2025, 6:16 p.m.

5.5

CVSS3.1

CVE-2024-38598 - md: fix resync softlockup when bitmap size is less than array size

In the Linux kernel, the following vulnerability has been resolved: md: fix resync softlockup when bitmap size is less than array size Is is reported that for dm-raid10, lvextend + lvchange --syncaction will trigger following softlockup: kernel:watchdog: BUG: soft lockup - CPU#3 stuck for 26s! […

πŸ“… Published: June 19, 2024, midnight πŸ”„ Last Modified: Nov. 4, 2025, 6:16 p.m.

7.8

CVSS3.1

CVE-2021-47598 - sch_cake: do not call cake_destroy() from cake_init()

In the Linux kernel, the following vulnerability has been resolved: sch_cake: do not call cake_destroy() from cake_init() qdiscs are not supposed to call their own destroy() method from init(), because core stack already does that. syzbot was able to trigger use after free: DEBUG_LOCKS_WARN_ON(…

πŸ“… Published: June 19, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 7:14 a.m.

7.8

CVSS3.1

CVE-2024-36978 - net: sched: sch_multiq: fix possible OOB write in multiq_tune()

In the Linux kernel, the following vulnerability has been resolved: net: sched: sch_multiq: fix possible OOB write in multiq_tune() q->bands will be assigned to qopt->bands to execute subsequent code logic after kmalloc. So the old q->bands should not be used in kmalloc. Otherwise, an out-of-boun…

πŸ“… Published: June 19, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 10:17 p.m.

5.5

CVSS3.1

CVE-2024-38597 - eth: sungem: remove .ndo_poll_controller to avoid deadlocks

In the Linux kernel, the following vulnerability has been resolved: eth: sungem: remove .ndo_poll_controller to avoid deadlocks Erhard reports netpoll warnings from sungem: netpoll_send_skb_on_dev(): eth0 enabled interrupts in poll (gem_start_xmit+0x0/0x398) WARNING: CPU: 1 PID: 1 at net/cor…

πŸ“… Published: June 19, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 9:14 a.m.
Total resulsts: 346628
Page 9151 of 34,663
Β« previous page Β» next page
Filters