CVE-2024-26810
- EPSS 0.01%
- Published 05.04.2024 09:15:09
- Last modified 08.04.2025 19:20:46
In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Lock external INTx masking ops Mask operations through config space changes to DisINTx may race INTx configuration changes via ioctl. Create wrappers that add locking fo...
CVE-2024-26812
- EPSS 0.01%
- Published 05.04.2024 09:15:09
- Last modified 18.03.2025 17:04:12
In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Create persistent INTx handler A vulnerability exists where the eventfd for INTx signaling can be deconfigured, which unregisters the IRQ handler but still allows eventfd...
CVE-2024-26813
- EPSS 0.01%
- Published 05.04.2024 09:15:09
- Last modified 20.12.2024 14:30:24
In the Linux kernel, the following vulnerability has been resolved: vfio/platform: Create persistent IRQ handlers The vfio-platform SET_IRQS ioctl currently allows loopback triggering of an interrupt before a signaling eventfd has been configured b...
CVE-2024-26814
- EPSS 0.01%
- Published 05.04.2024 09:15:09
- Last modified 27.03.2025 21:36:57
In the Linux kernel, the following vulnerability has been resolved: vfio/fsl-mc: Block calling interrupt handler without trigger The eventfd_ctx trigger pointer of the vfio_fsl_mc_irq object is initially NULL and may become NULL if the user sets th...
CVE-2024-27437
- EPSS 0.01%
- Published 05.04.2024 09:15:09
- Last modified 27.03.2025 21:37:24
In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Disable auto-enable of exclusive INTx IRQ Currently for devices requiring masking at the irqchip for INTx, ie. devices without DisINTx support, the IRQ is enabled in requ...
CVE-2024-26809
- EPSS 0.01%
- Published 04.04.2024 10:15:09
- Last modified 19.03.2025 16:19:56
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: release elements in clone only from destroy path Clone already always provides a current view of the lookup table, use it to destroy the set, otherwise i...
CVE-2024-26808
- EPSS 0.01%
- Published 04.04.2024 10:15:08
- Last modified 04.04.2025 14:21:16
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain Remove netdevice from inet/ingress basechain in case NETDEV_UNREGISTER event is reported, otherwise...
CVE-2024-26800
- EPSS 0.02%
- Published 04.04.2024 09:15:09
- Last modified 20.12.2024 15:55:10
In the Linux kernel, the following vulnerability has been resolved: tls: fix use-after-free on failed backlog decryption When the decrypt request goes to the backlog and crypto_aead_decrypt returns -EBUSY, tls_do_decryption will wait until all asyn...
CVE-2024-26801
- EPSS 0.01%
- Published 04.04.2024 09:15:09
- Last modified 20.12.2024 15:52:36
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Avoid potential use-after-free in hci_error_reset While handling the HCI_EV_HARDWARE_ERROR event, if the underlying BT controller is not responding, the GPIO reset mecha...
CVE-2024-26802
- EPSS 0.02%
- Published 04.04.2024 09:15:09
- Last modified 03.03.2025 17:47:59
In the Linux kernel, the following vulnerability has been resolved: stmmac: Clear variable when destroying workqueue Currently when suspending driver and stopping workqueue it is checked whether workqueue is not NULL and if so, it is destroyed. Fun...