CVE-2024-42125
- EPSS 0.01%
- Veröffentlicht 30.07.2024 08:15:04
- Zuletzt bearbeitet 06.10.2025 17:16:44
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband We have some policy via BIOS to block uses of 6 GHz. In this case, 6 GHz sband will be NULL even if it is...
CVE-2024-42126
- EPSS 0.01%
- Veröffentlicht 30.07.2024 08:15:04
- Zuletzt bearbeitet 03.11.2025 22:17:40
In the Linux kernel, the following vulnerability has been resolved: powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt. nmi_enter()/nmi_exit() touches per cpu variables which can lead to kernel crash when invoked during real mode interrupt ha...
CVE-2024-42127
- EPSS 0.02%
- Veröffentlicht 30.07.2024 08:15:04
- Zuletzt bearbeitet 03.11.2025 22:17:40
In the Linux kernel, the following vulnerability has been resolved: drm/lima: fix shared irq handling on driver remove lima uses a shared interrupt, so the interrupt handlers must be prepared to be called at any time. At driver removal time, the cl...
CVE-2024-42128
- EPSS 0.03%
- Veröffentlicht 30.07.2024 08:15:04
- Zuletzt bearbeitet 29.09.2025 14:28:29
In the Linux kernel, the following vulnerability has been resolved: leds: an30259a: Use devm_mutex_init() for mutex initialization In this driver LEDs are registered using devm_led_classdev_register() so they are automatically unregistered after mo...
CVE-2024-42129
- EPSS 0.02%
- Veröffentlicht 30.07.2024 08:15:04
- Zuletzt bearbeitet 03.11.2025 20:16:27
In the Linux kernel, the following vulnerability has been resolved: leds: mlxreg: Use devm_mutex_init() for mutex initialization In this driver LEDs are registered using devm_led_classdev_register() so they are automatically unregistered after modu...
CVE-2024-42105
- EPSS 0.01%
- Veröffentlicht 30.07.2024 08:15:03
- Zuletzt bearbeitet 03.11.2025 22:17:38
In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix inode number range checks Patch series "nilfs2: fix potential issues related to reserved inodes". This series fixes one use-after-free issue reported by syzbot, caused...
CVE-2024-42106
- EPSS 0.02%
- Veröffentlicht 30.07.2024 08:15:03
- Zuletzt bearbeitet 03.11.2025 22:17:39
In the Linux kernel, the following vulnerability has been resolved: inet_diag: Initialize pad field in struct inet_diag_req_v2 KMSAN reported uninit-value access in raw_lookup() [1]. Diag for raw sockets uses the pad field in struct inet_diag_req_v...
CVE-2024-42107
- EPSS 0.01%
- Veröffentlicht 30.07.2024 08:15:03
- Zuletzt bearbeitet 08.01.2025 21:32:03
In the Linux kernel, the following vulnerability has been resolved: ice: Don't process extts if PTP is disabled The ice_ptp_extts_event() function can race with ice_ptp_release() and result in a NULL pointer dereference which leads to a kernel pani...
CVE-2024-42108
- EPSS 0.02%
- Veröffentlicht 30.07.2024 08:15:03
- Zuletzt bearbeitet 17.04.2025 16:56:53
In the Linux kernel, the following vulnerability has been resolved: net: rswitch: Avoid use-after-free in rswitch_poll() The use-after-free is actually in rswitch_tx_free(), which is inlined in rswitch_poll(). Since `skb` and `gq->skbs[gq->dirty]` ...
CVE-2024-42109
- EPSS 0.01%
- Veröffentlicht 30.07.2024 08:15:03
- Zuletzt bearbeitet 03.11.2025 22:17:39
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: unconditionally flush pending work before notifier syzbot reports: KASAN: slab-uaf in nft_ctx_update include/net/netfilter/nf_tables.h:1831 KASAN: slab-uaf i...