CVE-2024-58006
- EPSS 0.03%
- Veröffentlicht 27.02.2025 03:15:11
- Zuletzt bearbeitet 23.10.2025 13:04:07
In the Linux kernel, the following vulnerability has been resolved: PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() In commit 4284c88fff0e ("PCI: designware-ep: Allow pci_epc_set_bar() update inbound map address") set_bar() was m...
CVE-2024-58008
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:11
- Zuletzt bearbeitet 23.10.2025 13:03:58
In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y With vmalloc stack addresses enabled (CONFIG_VMAP_STACK=y) DCP trusted keys can crash during en- and decryption of ...
CVE-2024-58009
- EPSS 0.05%
- Veröffentlicht 27.02.2025 03:15:11
- Zuletzt bearbeitet 03.11.2025 20:16:57
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc A NULL sock pointer is passed into l2cap_sock_alloc() when it is called from l2cap_sock_new_connection_cb() and the e...
CVE-2024-49570
- EPSS 0.03%
- Veröffentlicht 27.02.2025 03:15:10
- Zuletzt bearbeitet 24.03.2025 18:56:21
In the Linux kernel, the following vulnerability has been resolved: drm/xe/tracing: Fix a potential TP_printk UAF The commit afd2627f727b ("tracing: Check "%s" dereference via the field and not the TP_printk format") exposes potential UAFs in the x...
CVE-2024-52560
- EPSS 0.04%
- Veröffentlicht 27.02.2025 03:15:10
- Zuletzt bearbeitet 23.10.2025 13:05:38
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Mark inode as bad as soon as error detected in mi_enum_attr() Extended the `mi_enum_attr()` function interface with an additional parameter, `struct ntfs_inode *ni`, to a...
CVE-2024-54456
- EPSS 0.04%
- Veröffentlicht 27.02.2025 03:15:10
- Zuletzt bearbeitet 23.10.2025 13:05:11
In the Linux kernel, the following vulnerability has been resolved: NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client() name is char[64] where the size of clnt->cl_program->name remains unknown. Invoking strcat() directly will also lea...
CVE-2024-54458
- EPSS 0.03%
- Veröffentlicht 27.02.2025 03:15:10
- Zuletzt bearbeitet 03.11.2025 20:16:43
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: bsg: Set bsg_queue to NULL after removal Currently, this does not cause any issues, but I believe it is necessary to set bsg_queue to NULL after removing it to prevent p...
CVE-2024-57852
- EPSS 0.03%
- Veröffentlicht 27.02.2025 03:15:10
- Zuletzt bearbeitet 23.10.2025 13:04:42
In the Linux kernel, the following vulnerability has been resolved: firmware: qcom: scm: smc: Handle missing SCM device Commit ca61d6836e6f ("firmware: qcom: scm: fix a NULL-pointer dereference") makes it explicit that qcom_scm_get_tzmem_pool() can...
CVE-2025-21724
- EPSS 0.03%
- Veröffentlicht 27.02.2025 02:15:16
- Zuletzt bearbeitet 03.11.2025 20:17:12
In the Linux kernel, the following vulnerability has been resolved: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() Resolve a UBSAN shift-out-of-bounds issue in iova_bitmap_offset_to_index() where shifting the constant...
CVE-2025-21725
- EPSS 0.05%
- Veröffentlicht 27.02.2025 02:15:16
- Zuletzt bearbeitet 03.11.2025 20:17:12
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix oops due to unset link speed It isn't guaranteed that NETWORK_INTERFACE_INFO::LinkSpeed will always be set by the server, so the client must handle any values and ...