CVE-2021-47302
- EPSS 0.01%
- Veröffentlicht 21.05.2024 15:15:17
- Zuletzt bearbeitet 26.12.2024 20:44:51
In the Linux kernel, the following vulnerability has been resolved: igc: Fix use-after-free error during reset Cleans the next descriptor to watch (next_to_watch) when cleaning the TX ring. Failure to do so can cause invalid memory accesses. If ig...
CVE-2021-47277
- EPSS 0.02%
- Veröffentlicht 21.05.2024 15:15:16
- Zuletzt bearbeitet 30.04.2025 14:30:29
In the Linux kernel, the following vulnerability has been resolved: kvm: avoid speculation-based attacks from out-of-range memslot accesses KVM's mechanism for accessing guest memory translates a guest physical address (gpa) to a host virtual addre...
CVE-2021-47278
- EPSS 0.04%
- Veröffentlicht 21.05.2024 15:15:16
- Zuletzt bearbeitet 26.12.2024 20:48:56
In the Linux kernel, the following vulnerability has been resolved: bus: mhi: pci_generic: Fix possible use-after-free in mhi_pci_remove() This driver's remove path calls del_timer(). However, that function does not wait until the timer handler fin...
CVE-2021-47279
- EPSS 0.04%
- Veröffentlicht 21.05.2024 15:15:16
- Zuletzt bearbeitet 26.12.2024 20:49:05
In the Linux kernel, the following vulnerability has been resolved: usb: misc: brcmstb-usb-pinmap: check return value after calling platform_get_resource() It will cause null-ptr-deref if platform_get_resource() returns NULL, we need check the retu...
- EPSS 0.02%
- Veröffentlicht 21.05.2024 15:15:16
- Zuletzt bearbeitet 24.12.2024 16:31:41
In the Linux kernel, the following vulnerability has been resolved: drm: Fix use-after-free read in drm_getunique() There is a time-of-check-to-time-of-use error in drm_getunique() due to retrieving file_priv->master prior to locking the device's m...
- EPSS 0.02%
- Veröffentlicht 21.05.2024 15:15:16
- Zuletzt bearbeitet 24.12.2024 16:30:22
In the Linux kernel, the following vulnerability has been resolved: ALSA: seq: Fix race of snd_seq_timer_open() The timer instance per queue is exclusive, and snd_seq_timer_open() should have managed the concurrent accesses. It looks as if it's ch...
CVE-2021-47282
- EPSS 0.05%
- Veröffentlicht 21.05.2024 15:15:16
- Zuletzt bearbeitet 30.04.2025 14:30:12
In the Linux kernel, the following vulnerability has been resolved: spi: bcm2835: Fix out-of-bounds access with more than 4 slaves Commit 571e31fa60b3 ("spi: bcm2835: Cache CS register value for ->prepare_message()") limited the number of slaves to...
CVE-2021-47283
- EPSS 0.02%
- Veröffentlicht 21.05.2024 15:15:16
- Zuletzt bearbeitet 26.12.2024 20:49:20
In the Linux kernel, the following vulnerability has been resolved: net:sfc: fix non-freed irq in legacy irq mode SFC driver can be configured via modparam to work using MSI-X, MSI or legacy IRQ interrupts. In the last one, the interrupt was not pr...
CVE-2021-47284
- EPSS 0.01%
- Veröffentlicht 21.05.2024 15:15:16
- Zuletzt bearbeitet 02.04.2025 14:48:11
In the Linux kernel, the following vulnerability has been resolved: isdn: mISDN: netjet: Fix crash in nj_probe: 'nj_setup' in netjet.c might fail with -EIO and in this case 'card->irq' is initialized and is bigger than zero. A subsequent call to 'n...
CVE-2021-47286
- EPSS 0.1%
- Veröffentlicht 21.05.2024 15:15:16
- Zuletzt bearbeitet 30.04.2025 14:26:35
In the Linux kernel, the following vulnerability has been resolved: bus: mhi: core: Validate channel ID when processing command completions MHI reads the channel ID from the event ring element sent by the device which can be any value between 0 and...