CVE-2024-26799
- EPSS 0.02%
- Veröffentlicht 04.04.2024 09:15:08
- Zuletzt bearbeitet 04.04.2025 14:28:13
In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: Fix uninitialized pointer dmactl In the case where __lpass_get_dmactl_handle is called and the driver id dai_id is invalid the pointer dmactl is not being assigned a va...
CVE-2024-26745
- EPSS 0.02%
- Veröffentlicht 04.04.2024 09:15:07
- Zuletzt bearbeitet 04.04.2025 14:12:28
In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV When kdump kernel tries to copy dump data over SR-IOV, LPAR panics due to NULL pointer exception: Ker...
CVE-2024-26746
- EPSS 0.02%
- Veröffentlicht 04.04.2024 09:15:07
- Zuletzt bearbeitet 18.03.2025 16:45:08
In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Ensure safe user copy of completion record If CONFIG_HARDENED_USERCOPY is enabled, copying completion record from event log cache to user triggers a kernel bug. [...
CVE-2024-26750
- EPSS 0.02%
- Veröffentlicht 04.04.2024 09:15:07
- Zuletzt bearbeitet 18.03.2025 16:49:59
In the Linux kernel, the following vulnerability has been resolved: af_unix: Drop oob_skb ref before purging queue in GC. syzbot reported another task hung in __unix_gc(). [0] The current while loop assumes that all of the left candidates have oo...
CVE-2024-26780
- EPSS 0.02%
- Veröffentlicht 04.04.2024 09:15:07
- Zuletzt bearbeitet 18.03.2025 16:52:16
In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix task hung while purging oob_skb in GC. syzbot reported a task hung; at the same time, GC was looping infinitely in list_for_each_entry_safe() for OOB skb. [0] syzbot...
CVE-2024-26781
- EPSS 0.01%
- Veröffentlicht 04.04.2024 09:15:07
- Zuletzt bearbeitet 07.01.2025 17:11:31
In the Linux kernel, the following vulnerability has been resolved: mptcp: fix possible deadlock in subflow diag Syzbot and Eric reported a lockdep splat in the subflow diag: WARNING: possible circular locking dependency detected 6.8.0-rc4-s...
CVE-2024-26772
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 04.04.2025 14:16:47
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() Places the logic for checking if the group's block bitmap is corrupt under the protection of the group ...
CVE-2024-26773
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 18.03.2025 16:47:14
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() Determine if the group block bitmap is corrupted before using ac_b_ex in ext4_mb_try_best_found() to ...
CVE-2024-26774
- EPSS 0.02%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 19.06.2025 13:15:31
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt Determine if bb_fragments is 0 instead of determining bb_free to eliminate the risk of dividing...
CVE-2024-26775
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 17.07.2025 17:15:35
In the Linux kernel, the following vulnerability has been resolved: aoe: avoid potential deadlock at set_capacity Move set_capacity() outside of the section procected by (&d->lock). To avoid possible interrupt unsafe locking scenario: CPU0...