CVE-2024-46828
- EPSS 0.01%
- Veröffentlicht 27.09.2024 13:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:05
In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: fix bulk flow accounting logic for host fairness In sch_cake, we keep track of the count of active bulk flows per host, when running in dst/src host fairness mode,...
CVE-2024-46829
- EPSS 0.01%
- Veröffentlicht 27.09.2024 13:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:05
In the Linux kernel, the following vulnerability has been resolved: rtmutex: Drop rt_mutex::wait_lock before scheduling rt_mutex_handle_deadlock() is called with rt_mutex::wait_lock held. In the good case it returns with the lock held and in the d...
CVE-2024-46830
- EPSS 0.01%
- Veröffentlicht 27.09.2024 13:15:15
- Zuletzt bearbeitet 19.01.2026 13:16:07
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS Grab kvm->srcu when processing KVM_SET_VCPU_EVENTS, as KVM will forcibly leave nested VMX/SVM if SMM mode is being tog...
CVE-2024-46831
- EPSS 0.02%
- Veröffentlicht 27.09.2024 13:15:15
- Zuletzt bearbeitet 02.10.2024 14:26:13
In the Linux kernel, the following vulnerability has been resolved: net: microchip: vcap: Fix use-after-free error in kunit test This is a clear use-after-free error. We remove it, and rely on checking the return code of vcap_del_rule.
CVE-2024-46832
- EPSS 0.01%
- Veröffentlicht 27.09.2024 13:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:06
In the Linux kernel, the following vulnerability has been resolved: MIPS: cevt-r4k: Don't call get_c0_compare_int if timer irq is installed This avoids warning: [ 0.118053] BUG: sleeping function called from invalid context at kernel/locking/mu...
CVE-2024-46833
- EPSS 0.02%
- Veröffentlicht 27.09.2024 13:15:15
- Zuletzt bearbeitet 09.10.2024 15:54:38
In the Linux kernel, the following vulnerability has been resolved: net: hns3: void array out of bound when loop tnl_num When query reg inf of SSU, it loops tnl_num times. However, tnl_num comes from hardware and the length of array is a fixed valu...
CVE-2024-46834
- EPSS 0.01%
- Veröffentlicht 27.09.2024 13:15:15
- Zuletzt bearbeitet 09.10.2024 15:57:03
In the Linux kernel, the following vulnerability has been resolved: ethtool: fail closed if we can't get max channel used in indirection tables Commit 0d1b7d6c9274 ("bnxt: fix crashes when reducing ring count with active RSS contexts") proves that ...
CVE-2024-46835
- EPSS 0.01%
- Veröffentlicht 27.09.2024 13:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:06
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix smatch static checker warning adev->gfx.imu.funcs could be NULL
CVE-2024-46836
- EPSS 0.02%
- Veröffentlicht 27.09.2024 13:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:07
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: aspeed_udc: validate endpoint index for ast udc We should verify the bound of the array to assure that host may not manipulate the index to point past endpoint array. ...
CVE-2024-46837
- EPSS 0.02%
- Veröffentlicht 27.09.2024 13:15:15
- Zuletzt bearbeitet 09.10.2024 15:37:51
In the Linux kernel, the following vulnerability has been resolved: drm/panthor: Restrict high priorities on group_create We were allowing any users to create a high priority group without any permission checks. As a result, this was allowing possi...