CVE-2024-49935
- EPSS 0.06%
- Veröffentlicht 21.10.2024 18:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:31
In the Linux kernel, the following vulnerability has been resolved: ACPI: PAD: fix crash in exit_round_robin() The kernel occasionally crashes in cpumask_clear_cpu(), which is called within exit_round_robin(), because when executing clear_bit(nr, a...
CVE-2024-49936
- EPSS 0.04%
- Veröffentlicht 21.10.2024 18:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:31
In the Linux kernel, the following vulnerability has been resolved: net/xen-netback: prevent UAF in xenvif_flush_hash() During the list_for_each_entry_rcu iteration call of xenvif_flush_hash, kfree_rcu does not exist inside the rcu read critical se...
CVE-2024-49937
- EPSS 0.03%
- Veröffentlicht 21.10.2024 18:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:32
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Set correct chandef when starting CAC When starting CAC in a mode other than AP mode, it return a "WARNING: CPU: 0 PID: 63 at cfg80211_chandef_dfs_usable+0x20/0xaf ...
CVE-2024-49938
- EPSS 0.03%
- Veröffentlicht 21.10.2024 18:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:32
In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit Syzbot points out that skb_trim() has a sanity check on the existing length of the skb, which can be unini...
CVE-2024-49939
- EPSS 0.04%
- Veröffentlicht 21.10.2024 18:15:15
- Zuletzt bearbeitet 03.11.2025 21:16:38
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: avoid to add interface to list twice when SER If SER L2 occurs during the WoWLAN resume flow, the add interface flow is triggered by ieee80211_reconfig(). However, due...
CVE-2024-49940
- EPSS 0.04%
- Veröffentlicht 21.10.2024 18:15:15
- Zuletzt bearbeitet 13.11.2024 13:26:01
In the Linux kernel, the following vulnerability has been resolved: l2tp: prevent possible tunnel refcount underflow When a session is created, it sets a backpointer to its tunnel. When the session refcount drops to 0, l2tp_session_free drops the t...
CVE-2024-49941
- EPSS 0.04%
- Veröffentlicht 21.10.2024 18:15:15
- Zuletzt bearbeitet 25.10.2024 15:17:30
In the Linux kernel, the following vulnerability has been resolved: gpiolib: Fix potential NULL pointer dereference in gpiod_get_label() In `gpiod_get_label()`, it is possible that `srcu_dereference_check()` may return a NULL pointer, leading to a ...
CVE-2024-49942
- EPSS 0.03%
- Veröffentlicht 21.10.2024 18:15:15
- Zuletzt bearbeitet 25.10.2024 14:56:59
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Prevent null pointer access in xe_migrate_copy xe_migrate_copy designed to copy content of TTM resources. When source resource is null, it will trigger a NULL pointer deref...
CVE-2024-49943
- EPSS 0.03%
- Veröffentlicht 21.10.2024 18:15:15
- Zuletzt bearbeitet 01.11.2024 14:54:07
In the Linux kernel, the following vulnerability has been resolved: drm/xe/guc_submit: add missing locking in wedged_fini Any non-wedged queue can have a zero refcount here and can be running concurrently with an async queue destroy, therefore dere...
CVE-2024-49944
- EPSS 0.04%
- Veröffentlicht 21.10.2024 18:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:32
In the Linux kernel, the following vulnerability has been resolved: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start In sctp_listen_start() invoked by sctp_inet_listen(), it should set the sk_state back to CLOSED if sctp_aut...