CVE-2024-46825
- EPSS 0.01%
- Published 27.09.2024 13:15:15
- Last modified 20.11.2024 17:24:04
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check The lookup function iwl_mvm_rcu_fw_link_id_to_link_conf() is normally called with input from the firmware, so it should use I...
CVE-2024-46826
- EPSS 0.01%
- Published 27.09.2024 13:15:15
- Last modified 03.11.2025 23:16:05
In the Linux kernel, the following vulnerability has been resolved: ELF: fix kernel.randomize_va_space double read ELF loader uses "randomize_va_space" twice. It is sysctl and can change at any moment, so 2 loads could see 2 different values in the...
CVE-2024-46827
- EPSS 0.03%
- Published 27.09.2024 13:15:15
- Last modified 20.11.2024 20:40:40
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix firmware crash due to invalid peer nss Currently, if the access point receives an association request containing an Extended HE Capabilities Information Element w...
CVE-2024-46828
- EPSS 0.02%
- Published 27.09.2024 13:15:15
- Last modified 03.11.2025 23:16:05
In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: fix bulk flow accounting logic for host fairness In sch_cake, we keep track of the count of active bulk flows per host, when running in dst/src host fairness mode,...
CVE-2024-46829
- EPSS 0.01%
- Published 27.09.2024 13:15:15
- Last modified 03.11.2025 23:16:05
In the Linux kernel, the following vulnerability has been resolved: rtmutex: Drop rt_mutex::wait_lock before scheduling rt_mutex_handle_deadlock() is called with rt_mutex::wait_lock held. In the good case it returns with the lock held and in the d...
CVE-2024-46830
- EPSS 0.02%
- Published 27.09.2024 13:15:15
- Last modified 03.11.2025 23:16:06
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS Grab kvm->srcu when processing KVM_SET_VCPU_EVENTS, as KVM will forcibly leave nested VMX/SVM if SMM mode is being tog...
CVE-2024-46831
- EPSS 0.02%
- Published 27.09.2024 13:15:15
- Last modified 02.10.2024 14:26:13
In the Linux kernel, the following vulnerability has been resolved: net: microchip: vcap: Fix use-after-free error in kunit test This is a clear use-after-free error. We remove it, and rely on checking the return code of vcap_del_rule.
CVE-2024-46832
- EPSS 0.01%
- Published 27.09.2024 13:15:15
- Last modified 03.11.2025 23:16:06
In the Linux kernel, the following vulnerability has been resolved: MIPS: cevt-r4k: Don't call get_c0_compare_int if timer irq is installed This avoids warning: [ 0.118053] BUG: sleeping function called from invalid context at kernel/locking/mu...
CVE-2024-46833
- EPSS 0.02%
- Published 27.09.2024 13:15:15
- Last modified 09.10.2024 15:54:38
In the Linux kernel, the following vulnerability has been resolved: net: hns3: void array out of bound when loop tnl_num When query reg inf of SSU, it loops tnl_num times. However, tnl_num comes from hardware and the length of array is a fixed valu...
CVE-2024-46834
- EPSS 0.01%
- Published 27.09.2024 13:15:15
- Last modified 09.10.2024 15:57:03
In the Linux kernel, the following vulnerability has been resolved: ethtool: fail closed if we can't get max channel used in indirection tables Commit 0d1b7d6c9274 ("bnxt: fix crashes when reducing ring count with active RSS contexts") proves that ...