CVE-2024-53165
- EPSS 0.01%
- Veröffentlicht 27.12.2024 14:15:23
- Zuletzt bearbeitet 03.11.2025 21:17:35
In the Linux kernel, the following vulnerability has been resolved: sh: intc: Fix use-after-free bug in register_intc_controller() In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use...
CVE-2024-53166
- EPSS 0.01%
- Veröffentlicht 27.12.2024 14:15:23
- Zuletzt bearbeitet 03.11.2025 20:16:39
In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix bfqq uaf in bfq_limit_depth() Set new allocated bfqq to bic or remove freed bfqq from bic are both protected by bfqd->lock, however bfq_limit_depth() is deferencing...
CVE-2024-53167
- EPSS 0.01%
- Veröffentlicht 27.12.2024 14:15:23
- Zuletzt bearbeitet 08.10.2025 14:41:01
In the Linux kernel, the following vulnerability has been resolved: nfs/blocklayout: Don't attempt unregister for invalid block device Since commit d869da91cccb ("nfs/blocklayout: Fix premature PR key unregistration") an unmount of a pNFS SCSI layo...
CVE-2024-53168
- EPSS 0.01%
- Veröffentlicht 27.12.2024 14:15:23
- Zuletzt bearbeitet 10.02.2025 18:15:26
In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket BUG: KASAN: slab-use-after-free in tcp_write_timer_handler+0x156/0x3e0 Read of size 1 at addr ffff888111f322cd by task ...
CVE-2022-49034
- EPSS 0.01%
- Veröffentlicht 27.12.2024 14:15:22
- Zuletzt bearbeitet 03.11.2025 21:15:54
In the Linux kernel, the following vulnerability has been resolved: sh: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK When CONFIG_CPUMASK_OFFSTACK and CONFIG_DEBUG_PER_CPU_MAPS are selected, cpu_max_bits_warn() generates a runtime warning simi...
CVE-2024-53158
- EPSS 0.01%
- Veröffentlicht 24.12.2024 12:15:24
- Zuletzt bearbeitet 03.11.2025 21:17:34
In the Linux kernel, the following vulnerability has been resolved: soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() This loop is supposed to break if the frequency returned from clk_round_rate() is the same as on the previous itera...
CVE-2024-53160
- EPSS 0.01%
- Veröffentlicht 24.12.2024 12:15:24
- Zuletzt bearbeitet 01.10.2025 21:16:38
In the Linux kernel, the following vulnerability has been resolved: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu KCSAN reports a data race when access the krcp->monitor_work.timer.expires variable in the schedule_delayed_monitor_work(...
CVE-2024-53161
- EPSS 0.01%
- Veröffentlicht 24.12.2024 12:15:24
- Zuletzt bearbeitet 03.11.2025 21:17:34
In the Linux kernel, the following vulnerability has been resolved: EDAC/bluefield: Fix potential integer overflow The 64-bit argument for the "get DIMM info" SMC call consists of mem_ctrl_idx left-shifted 16 bits and OR-ed with DIMM index. With m...
CVE-2024-53162
- EPSS 0.02%
- Veröffentlicht 24.12.2024 12:15:24
- Zuletzt bearbeitet 01.10.2025 21:16:38
In the Linux kernel, the following vulnerability has been resolved: crypto: qat/qat_4xxx - fix off by one in uof_get_name() The fw_objs[] array has "num_objs" elements so the > needs to be >= to prevent an out of bounds read.
CVE-2024-53163
- EPSS 0.02%
- Veröffentlicht 24.12.2024 12:15:24
- Zuletzt bearbeitet 01.10.2025 21:16:38
In the Linux kernel, the following vulnerability has been resolved: crypto: qat/qat_420xx - fix off by one in uof_get_name() This is called from uof_get_name_420xx() where "num_objs" is the ARRAY_SIZE() of fw_objs[]. The > needs to be >= to preven...