CVE-2021-47204
- EPSS 0.02%
- Veröffentlicht 10.04.2024 19:15:48
- Zuletzt bearbeitet 14.01.2025 14:35:39
In the Linux kernel, the following vulnerability has been resolved: net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove Access to netdev after free_netdev() will cause use-after-free bug. Move debug log before free_netdev() call to avoid it.
CVE-2021-47205
- EPSS 0.02%
- Veröffentlicht 10.04.2024 19:15:48
- Zuletzt bearbeitet 03.03.2025 17:47:59
In the Linux kernel, the following vulnerability has been resolved: clk: sunxi-ng: Unregister clocks/resets when unbinding Currently, unbinding a CCU driver unmaps the device's MMIO region, while leaving its clocks/resets and their providers regist...
CVE-2021-47206
- EPSS 0.01%
- Veröffentlicht 10.04.2024 19:15:48
- Zuletzt bearbeitet 07.01.2025 17:12:26
In the Linux kernel, the following vulnerability has been resolved: usb: host: ohci-tmio: check return value after calling platform_get_resource() It will cause null-ptr-deref if platform_get_resource() returns NULL, we need check the return value.
CVE-2021-47207
- EPSS 0.01%
- Veröffentlicht 10.04.2024 19:15:48
- Zuletzt bearbeitet 13.01.2025 20:42:37
In the Linux kernel, the following vulnerability has been resolved: ALSA: gus: fix null pointer dereference on pointer block The pointer block return from snd_gf1_dma_next_block could be null, so there is a potential null pointer dereference issue....
CVE-2021-47209
- EPSS 0.02%
- Veröffentlicht 10.04.2024 19:15:48
- Zuletzt bearbeitet 27.03.2025 21:16:39
In the Linux kernel, the following vulnerability has been resolved: sched/fair: Prevent dead task groups from regaining cfs_rq's Kevin is reporting crashes which point to a use-after-free of a cfs_rq in update_blocked_averages(). Initial debugging ...
CVE-2021-47210
- EPSS 0.02%
- Veröffentlicht 10.04.2024 19:15:48
- Zuletzt bearbeitet 27.03.2025 21:17:41
In the Linux kernel, the following vulnerability has been resolved: usb: typec: tipd: Remove WARN_ON in tps6598x_block_read Calling tps6598x_block_read with a higher than allowed len can be handled by just returning an error. There's no need to cra...
CVE-2021-47211
- EPSS 0.01%
- Veröffentlicht 10.04.2024 19:15:48
- Zuletzt bearbeitet 14.01.2025 14:43:27
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: fix null pointer dereference on pointer cs_desc The pointer cs_desc return from snd_usb_find_clock_source could be null, so there is a potential null pointer deref...
CVE-2021-47212
- EPSS 0.01%
- Veröffentlicht 10.04.2024 19:15:48
- Zuletzt bearbeitet 27.03.2025 21:02:03
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Update error handler for UCTX and UMEM In the fast unload flow, the device state is set to internal error, which indicates that the driver started the destroy process. In...
CVE-2021-47214
- EPSS 0.02%
- Veröffentlicht 10.04.2024 19:15:48
- Zuletzt bearbeitet 27.03.2025 21:05:27
In the Linux kernel, the following vulnerability has been resolved: hugetlb, userfaultfd: fix reservation restore on userfaultfd error Currently in the is_continue case in hugetlb_mcopy_atomic_pte(), if we bail out using "goto out_release_unlock;" ...
CVE-2021-47215
- EPSS 0.02%
- Veröffentlicht 10.04.2024 19:15:48
- Zuletzt bearbeitet 27.03.2025 21:05:34
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: kTLS, Fix crash in RX resync flow For the TLS RX resync flow, we maintain a list of TLS contexts that require some attention, to communicate their resync information to ...