CVE-2024-26787
- EPSS 0.01%
- Veröffentlicht 04.04.2024 09:15:08
- Zuletzt bearbeitet 20.03.2025 10:39:37
In the Linux kernel, the following vulnerability has been resolved: mmc: mmci: stm32: fix DMA API overlapping mappings warning Turning on CONFIG_DMA_API_DEBUG_SG results in the following warning: DMA-API: mmci-pl18x 48220000.mmc: cacheline trackin...
CVE-2024-26788
- EPSS 0.01%
- Veröffentlicht 04.04.2024 09:15:08
- Zuletzt bearbeitet 01.04.2025 20:35:20
In the Linux kernel, the following vulnerability has been resolved: dmaengine: fsl-qdma: init irq after reg initialization Initialize the qDMA irqs after the registers are configured so that interrupts that may have been pending from a primary kern...
CVE-2024-26789
- EPSS 0.02%
- Veröffentlicht 04.04.2024 09:15:08
- Zuletzt bearbeitet 04.04.2025 14:29:32
In the Linux kernel, the following vulnerability has been resolved: crypto: arm64/neonbs - fix out-of-bounds access on short input The bit-sliced implementation of AES-CTR operates on blocks of 128 bytes, and will fall back to the plain NEON versio...
CVE-2024-26790
- EPSS 0.01%
- Veröffentlicht 04.04.2024 09:15:08
- Zuletzt bearbeitet 27.02.2025 21:59:09
In the Linux kernel, the following vulnerability has been resolved: dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read There is chip (ls1028a) errata: The SoC may hang on 16 byte unaligned read transactions by QDMA. Unaligned read tr...
CVE-2024-26791
- EPSS 0.01%
- Veröffentlicht 04.04.2024 09:15:08
- Zuletzt bearbeitet 20.12.2024 14:35:01
In the Linux kernel, the following vulnerability has been resolved: btrfs: dev-replace: properly validate device names There's a syzbot report that device name buffers passed to device replace are not properly checked for string termination which c...
CVE-2024-26792
- EPSS 0.02%
- Veröffentlicht 04.04.2024 09:15:08
- Zuletzt bearbeitet 20.12.2024 16:15:54
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix double free of anonymous device after snapshot creation failure When creating a snapshot we may do a double free of an anonymous device in case there's an error committi...
CVE-2024-26793
- EPSS 0.01%
- Veröffentlicht 04.04.2024 09:15:08
- Zuletzt bearbeitet 20.12.2024 15:56:00
In the Linux kernel, the following vulnerability has been resolved: gtp: fix use-after-free and null-ptr-deref in gtp_newlink() The gtp_link_ops operations structure for the subsystem must be registered after registering the gtp_net_ops pernet oper...
CVE-2024-26794
- EPSS 0.23%
- Veröffentlicht 04.04.2024 09:15:08
- Zuletzt bearbeitet 19.06.2025 13:15:31
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-26795
- EPSS 0.01%
- Veröffentlicht 04.04.2024 09:15:08
- Zuletzt bearbeitet 19.03.2025 11:42:41
In the Linux kernel, the following vulnerability has been resolved: riscv: Sparse-Memory/vmemmap out-of-bounds fix Offset vmemmap so that the first page of vmemmap will be mapped to the first page of physical memory in order to ensure that vmemmap’...
CVE-2024-26796
- EPSS 0.02%
- Veröffentlicht 04.04.2024 09:15:08
- Zuletzt bearbeitet 27.02.2025 14:35:09
In the Linux kernel, the following vulnerability has been resolved: drivers: perf: ctr_get_width function for legacy is not defined With parameters CONFIG_RISCV_PMU_LEGACY=y and CONFIG_RISCV_PMU_SBI=n linux kernel crashes when you try perf record: ...