CVE-2024-26774
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 19.06.2025 13:15:31
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt Determine if bb_fragments is 0 instead of determining bb_free to eliminate the risk of dividing...
CVE-2024-26775
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 17.07.2025 17:15:35
In the Linux kernel, the following vulnerability has been resolved: aoe: avoid potential deadlock at set_capacity Move set_capacity() outside of the section procected by (&d->lock). To avoid possible interrupt unsafe locking scenario: CPU0...
CVE-2024-26776
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 27.02.2025 14:34:43
In the Linux kernel, the following vulnerability has been resolved: spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected Return IRQ_NONE from the interrupt handler when no interrupt was detected. Because an empty interrupt will cause ...
CVE-2024-26777
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 27.02.2025 14:34:43
In the Linux kernel, the following vulnerability has been resolved: fbdev: sis: Error out if pixclock equals zero The userspace program could pass any values to the driver through ioctl() interface. If the driver doesn't check the value of pixclock...
CVE-2024-26778
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 27.02.2025 14:34:43
In the Linux kernel, the following vulnerability has been resolved: fbdev: savage: Error out if pixclock equals zero The userspace program could pass any values to the driver through ioctl() interface. If the driver doesn't check the value of pixcl...
CVE-2024-26779
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 04.04.2025 14:15:05
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix race condition on enabling fast-xmit fast-xmit must only be enabled after the sta has been uploaded to the driver, otherwise it could end up passing the not-yet...
CVE-2024-26754
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:52
- Zuletzt bearbeitet 07.01.2025 21:13:04
In the Linux kernel, the following vulnerability has been resolved: gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() The gtp_net_ops pernet operations structure for the subsystem must be registered before registering the generic ne...
CVE-2024-26755
- EPSS 0.16%
- Veröffentlicht 03.04.2024 17:15:52
- Zuletzt bearbeitet 04.04.2025 14:30:49
In the Linux kernel, the following vulnerability has been resolved: md: Don't suspend the array for interrupted reshape md_start_sync() will suspend the array if there are spares that can be added or removed from conf, however, if reshape is still ...
CVE-2024-26756
- EPSS 0.02%
- Veröffentlicht 03.04.2024 17:15:52
- Zuletzt bearbeitet 17.03.2025 16:56:57
In the Linux kernel, the following vulnerability has been resolved: md: Don't register sync_thread for reshape directly Currently, if reshape is interrupted, then reassemble the array will register sync_thread directly from pers->run(), in this cas...
CVE-2024-26757
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:52
- Zuletzt bearbeitet 04.04.2025 14:30:42
In the Linux kernel, the following vulnerability has been resolved: md: Don't ignore read-only array in md_check_recovery() Usually if the array is not read-write, md_check_recovery() won't register new sync_thread in the first place. And if the ar...