CVE-2024-36898
- EPSS 0.01%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 18.09.2025 14:48:06
In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: fix uninitialised kfifo If a line is requested with debounce, and that results in debouncing in software, and the line is subsequently reconfigured to enable edge de...
- EPSS 0.01%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 03.11.2025 21:16:13
In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Fix use after free in lineinfo_changed_notify The use-after-free issue occurs as follows: when the GPIO chip device file is being closed by invoking gpio_chrdev_rele...
CVE-2024-36900
- EPSS 0.02%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 30.09.2025 17:49:17
In the Linux kernel, the following vulnerability has been resolved: net: hns3: fix kernel crash when devlink reload during initialization The devlink reload process will access the hardware resources, but the register operation is done before the h...
CVE-2024-36901
- EPSS 0.01%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 21.11.2024 09:22:46
In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent NULL dereference in ip6_output() According to syzbot, there is a chance that ip6_dst_idev() returns NULL in ip6_output(). Most places in IPv6 stack deal with a NULL i...
CVE-2024-36902
- EPSS 0.01%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 21.11.2024 09:22:46
In the Linux kernel, the following vulnerability has been resolved: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() syzbot is able to trigger the following crash [1], caused by unsafe ip6_dst_idev() use. Indeed ip6_dst_idev...
CVE-2024-36903
- EPSS 0.02%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 03.11.2025 20:16:16
In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix potential uninit-value access in __ip6_make_skb() As it was done in commit fc1092f51567 ("ipv4: Fix uninit-value access in __ip_make_skb()") for IPv4, check FLOWI_FLAG_KN...
- EPSS 0.53%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 21.11.2024 09:22:46
In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique() with nice analysis. Since commit ec94c2696f0b ("tcp...
CVE-2024-36886
- EPSS 0.94%
- Veröffentlicht 30.05.2024 16:15:12
- Zuletzt bearbeitet 21.11.2024 09:22:44
In the Linux kernel, the following vulnerability has been resolved: tipc: fix UAF in error path Sam Page (sam4k) working with Trend Micro Zero Day Initiative reported a UAF in the tipc_buf_append() error path: BUG: KASAN: slab-use-after-free in kf...
CVE-2024-36887
- EPSS 0.02%
- Veröffentlicht 30.05.2024 16:15:12
- Zuletzt bearbeitet 18.09.2025 14:37:53
In the Linux kernel, the following vulnerability has been resolved: e1000e: change usleep_range to udelay in PHY mdic access This is a partial revert of commit 6dbdd4de0362 ("e1000e: Workaround for sporadic MDI error on Meteor Lake systems"). The r...
CVE-2024-36888
- EPSS 0.02%
- Veröffentlicht 30.05.2024 16:15:12
- Zuletzt bearbeitet 01.04.2025 18:34:43
In the Linux kernel, the following vulnerability has been resolved: workqueue: Fix selection of wake_cpu in kick_pool() With cpu_possible_mask=0-63 and cpu_online_mask=0-7 the following kernel oops was observed: smp: Bringing up secondary CPUs ......