CVE-2021-47041
- EPSS 0.02%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 06.12.2024 18:41:12
In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: fix incorrect locking in state_change sk callback We are not changing anything in the TCP connection state so we should not take a write_lock but rather a read lock. Th...
CVE-2021-47042
- EPSS 0.04%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 06.12.2024 18:41:24
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Free local data after use Fixes the following memory leak in dc_link_construct(): unreferenced object 0xffffa03e81471400 (size 1024): comm "amd_module_load", pid ...
CVE-2021-47043
- EPSS 0.03%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 09.01.2025 15:21:46
In the Linux kernel, the following vulnerability has been resolved: media: venus: core: Fix some resource leaks in the error path of 'venus_probe()' If an error occurs after a successful 'of_icc_get()' call, it must be undone. Use 'devm_of_icc_get...
CVE-2021-47044
- EPSS 0.02%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 19.03.2025 15:50:56
In the Linux kernel, the following vulnerability has been resolved: sched/fair: Fix shift-out-of-bounds in load_balance() Syzbot reported a handful of occurrences where an sd->nr_balance_failed can grow to much higher values than one would expect. ...
CVE-2021-47045
- EPSS 0.02%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 06.12.2024 18:41:37
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() It is possible to call lpfc_issue_els_plogi() passing a did for which no matching ndlp is found. A call is then mad...
CVE-2021-47046
- EPSS 0.02%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 09.12.2024 19:02:52
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix off by one in hdmi_14_process_transaction() The hdcp_i2c_offsets[] array did not have an entry for HDCP_MESSAGE_ID_WRITE_CONTENT_STREAM_TYPE so it led to an of...
CVE-2021-47047
- EPSS 0.02%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 10.01.2025 18:26:24
In the Linux kernel, the following vulnerability has been resolved: spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails The spi controller supports 44-bit address space on AXI in DMA mode, so set dma_addr_t width to 44-bit to avoid using ...
CVE-2021-47048
- EPSS 0.04%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 09.12.2024 19:05:02
In the Linux kernel, the following vulnerability has been resolved: spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op When handling op->addr, it is using the buffer "tmpbuf" which has been freed. This will trigger a use-after-free KA...
CVE-2021-47049
- EPSS 0.01%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 09.12.2024 19:06:07
In the Linux kernel, the following vulnerability has been resolved: Drivers: hv: vmbus: Use after free in __vmbus_open() The "open_info" variable is added to the &vmbus_connection.chn_msg_list, but the error handling frees "open_info" without remov...
CVE-2021-47050
- EPSS 0.03%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 09.12.2024 19:06:24
In the Linux kernel, the following vulnerability has been resolved: memory: renesas-rpc-if: fix possible NULL pointer dereference of resource The platform_get_resource_byname() can return NULL which would be immediately dereferenced by resource_siz...