CVE-2024-33847
- EPSS 0.03%
- Veröffentlicht 24.06.2024 14:15:11
- Zuletzt bearbeitet 01.10.2025 13:56:01
In the Linux kernel, the following vulnerability has been resolved: f2fs: compress: don't allow unaligned truncation on released compress inode f2fs image may be corrupted after below testcase: - mkfs.f2fs -O extra_attr,compression -f /dev/vdb - mo...
- EPSS 0.02%
- Veröffentlicht 24.06.2024 14:15:11
- Zuletzt bearbeitet 24.03.2025 18:09:02
In the Linux kernel, the following vulnerability has been resolved: f2fs: compress: fix to cover {reserve,release}_compress_blocks() w/ cp_rwsem lock It needs to cover {reserve,release}_compress_blocks() w/ cp_rwsem lock to avoid racing with checkp...
CVE-2024-34030
- EPSS 0.03%
- Veröffentlicht 24.06.2024 14:15:11
- Zuletzt bearbeitet 24.03.2025 17:29:24
In the Linux kernel, the following vulnerability has been resolved: PCI: of_property: Return error for int_map allocation failure Return -ENOMEM from of_pci_prop_intr_map() if kcalloc() fails to prevent a NULL pointer dereference in this case. [bh...
CVE-2024-36477
- EPSS 0.03%
- Veröffentlicht 21.06.2024 12:15:11
- Zuletzt bearbeitet 23.05.2025 20:48:04
In the Linux kernel, the following vulnerability has been resolved: tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer The TPM SPI transfer mechanism uses MAX_SPI_FRAMESIZE for computing the maximum transfer length and the size...
CVE-2024-36481
- EPSS 0.02%
- Veröffentlicht 21.06.2024 12:15:11
- Zuletzt bearbeitet 21.11.2024 09:22:16
In the Linux kernel, the following vulnerability has been resolved: tracing/probes: fix error check in parse_btf_field() btf_find_struct_member() might return NULL or an error via the ERR_PTR() macro. However, its caller in parse_btf_field() only c...
CVE-2024-38662
- EPSS 0.04%
- Veröffentlicht 21.06.2024 12:15:11
- Zuletzt bearbeitet 21.11.2024 09:26:34
In the Linux kernel, the following vulnerability has been resolved: bpf: Allow delete from sockmap/sockhash only if update is allowed We have seen an influx of syzkaller reports where a BPF program attached to a tracepoint triggers a locking rule v...
CVE-2024-38780
- EPSS 0.01%
- Veröffentlicht 21.06.2024 12:15:11
- Zuletzt bearbeitet 04.11.2025 18:16:30
In the Linux kernel, the following vulnerability has been resolved: dma-buf/sw-sync: don't enable IRQ from sync_print_obj() Since commit a6aa8fca4d79 ("dma-buf/sw-sync: Reduce irqsave/irqrestore from known context") by error replaced spin_unlock_ir...
CVE-2024-39277
- EPSS 0.08%
- Veröffentlicht 21.06.2024 12:15:11
- Zuletzt bearbeitet 30.05.2025 19:30:44
In the Linux kernel, the following vulnerability has been resolved: dma-mapping: benchmark: handle NUMA_NO_NODE correctly cpumask_of_node() can be called for NUMA_NO_NODE inside do_map_benchmark() resulting in the following sanitizer report: UBSAN...
CVE-2024-34777
- EPSS 0.05%
- Veröffentlicht 21.06.2024 12:15:10
- Zuletzt bearbeitet 17.09.2025 17:00:58
In the Linux kernel, the following vulnerability has been resolved: dma-mapping: benchmark: fix node id validation While validating node ids in map_benchmark_ioctl(), node_possible() may be provided with invalid argument outside of [0,MAX_NUMNODES-...
CVE-2024-36288
- EPSS 0.01%
- Veröffentlicht 21.06.2024 12:15:10
- Zuletzt bearbeitet 04.11.2025 18:16:24
In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix loop termination condition in gss_free_in_token_pages() The in_token->pages[] array is not NULL terminated. This results in the following KASAN splat: KASAN: maybe w...