CVE-2023-52658
- EPSS 0.01%
- Veröffentlicht 17.05.2024 12:15:09
- Zuletzt bearbeitet 18.09.2025 17:24:50
In the Linux kernel, the following vulnerability has been resolved: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" This reverts commit 662404b24a4c4d839839ed25e3097571f5938b9b. The revert is required due to the suspicion it ...
CVE-2024-27402
- EPSS 0.02%
- Veröffentlicht 17.05.2024 12:15:09
- Zuletzt bearbeitet 18.09.2025 17:26:45
In the Linux kernel, the following vulnerability has been resolved: phonet/pep: fix racy skb_queue_empty() use The receive queues are protected by their respective spin-lock, not the socket lock. This could lead to skb_peek() unexpectedly returning...
CVE-2024-25743
- EPSS 0.13%
- Veröffentlicht 15.05.2024 18:15:10
- Zuletzt bearbeitet 14.03.2025 19:15:45
In the Linux kernel through 6.9, an untrusted hypervisor can inject virtual interrupts 0 and 14 at any point in time and can trigger the SIGFPE signal handler in userspace applications. This affects AMD SEV-SNP and AMD SEV-ES.
- EPSS 0.02%
- Veröffentlicht 14.05.2024 15:12:29
- Zuletzt bearbeitet 21.11.2024 09:04:32
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 This reverts drm/amdgpu: fix ftrace event amdgpu_bo_move always move on same heap. The basic problem here is that af...
- EPSS 0.09%
- Veröffentlicht 14.05.2024 15:12:29
- Zuletzt bearbeitet 21.11.2024 09:04:32
In the Linux kernel, the following vulnerability has been resolved: firewire: nosy: ensure user_length is taken into account when fetching packet contents Ensure that packet_buffer_get respects the user_length provided. If the length of the head pa...
- EPSS 0.03%
- Veröffentlicht 14.05.2024 15:12:28
- Zuletzt bearbeitet 03.11.2025 22:16:48
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a timestamp field at the beginning of the transaction, store it in the nftables per-netns area. Update set...
- EPSS 1.02%
- Veröffentlicht 14.05.2024 15:12:28
- Zuletzt bearbeitet 30.11.2024 08:15:05
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout When the sco connection is established and then, the sco socket is releasing, timeout_work will be scheduled to judge ...
- EPSS 0.09%
- Veröffentlicht 14.05.2024 15:12:28
- Zuletzt bearbeitet 21.11.2024 09:04:32
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout There is a race condition between l2cap_chan_timeout() and l2cap_chan_del(). When we use l2cap_chan_del() to delete the c...
CVE-2024-27394
- EPSS 0.02%
- Veröffentlicht 14.05.2024 15:12:27
- Zuletzt bearbeitet 08.04.2025 19:41:12
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix Use-After-Free in tcp_ao_connect_init Since call_rcu, which is called in the hlist_for_each_entry_rcu traversal of tcp_ao_connect_init, is not part of the RCU read critica...
CVE-2024-27395
- EPSS 0.01%
- Veröffentlicht 14.05.2024 15:12:27
- Zuletzt bearbeitet 14.01.2025 14:27:22
In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: Fix Use-After-Free in ovs_ct_exit Since kfree_rcu, which is called in the hlist_for_each_entry_rcu traversal of ovs_ct_limit_exit, is not part of the RCU read cri...