CVE-2024-38621
- EPSS 0.01%
- Published 21.06.2024 11:15:11
- Last modified 04.11.2025 18:16:29
In the Linux kernel, the following vulnerability has been resolved: media: stk1160: fix bounds checking in stk1160_copy_video() The subtract in this condition is reversed. The ->length is the length of the buffer. The ->bytesused is how many byte...
CVE-2024-38622
- EPSS 0.03%
- Published 21.06.2024 11:15:11
- Last modified 17.09.2025 16:59:41
In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add callback function pointer check before its call In dpu_core_irq_callback_handler() callback function pointer is compared to NULL, but then callback function is unc...
CVE-2024-38623
- EPSS 0.25%
- Published 21.06.2024 11:15:11
- Last modified 24.03.2025 18:10:02
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Use variable length array instead of fixed size Should fix smatch warning: ntfs_set_label() error: __builtin_memcpy() 'uni->name' too small (20 vs 256)
CVE-2024-38624
- EPSS 0.03%
- Published 21.06.2024 11:15:11
- Last modified 03.10.2025 16:08:44
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow For example, in the expression: vbo = 2 * vbo + skip
CVE-2024-38625
- EPSS 0.03%
- Published 21.06.2024 11:15:11
- Last modified 07.01.2025 16:09:49
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Check 'folio' pointer for NULL It can be NULL if bmap is called.
CVE-2024-38626
- EPSS 0.05%
- Published 21.06.2024 11:15:11
- Last modified 03.10.2025 14:49:28
In the Linux kernel, the following vulnerability has been resolved: fuse: clear FR_SENT when re-adding requests into pending list The following warning was reported by lee bruce: ------------[ cut here ]------------ WARNING: CPU: 0 PID: 8264 a...
CVE-2024-38627
- EPSS 0.02%
- Published 21.06.2024 11:15:11
- Last modified 04.11.2025 18:16:29
In the Linux kernel, the following vulnerability has been resolved: stm class: Fix a double free in stm_register_device() The put_device(&stm->dev) call will trigger stm_device_release() which frees "stm" so the vfree(stm) on the next line is a dou...
CVE-2024-38628
- EPSS 0.02%
- Published 21.06.2024 11:15:11
- Last modified 24.03.2025 18:09:37
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind. Hang on to the control IDs instead of pointers since those are correctly handled with lock...
CVE-2024-38629
- EPSS 0.02%
- Published 21.06.2024 11:15:11
- Last modified 03.10.2025 14:53:37
In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Avoid unnecessary destruction of file_ida file_ida is allocated during cdev open and is freed accordingly during cdev release. This sequence is guaranteed by drive...
CVE-2024-38630
- EPSS 0.02%
- Published 21.06.2024 11:15:11
- Last modified 21.11.2024 09:26:31
In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the cpu5wdt module is removing, the origin code uses del_timer() to de-activate the timer. If the timer h...