CVE-2024-50095
- EPSS 0.01%
- Veröffentlicht 05.11.2024 17:15:06
- Zuletzt bearbeitet 12.05.2026 13:16:17
In the Linux kernel, the following vulnerability has been resolved: RDMA/mad: Improve handling of timed out WRs of mad agent Current timeout handler of mad agent acquires/releases mad_agent_priv lock for every timed out WRs. This causes heavy locki...
CVE-2024-50096
- EPSS 0.01%
- Veröffentlicht 05.11.2024 17:15:06
- Zuletzt bearbeitet 03.11.2025 23:16:50
In the Linux kernel, the following vulnerability has been resolved: nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error The `nouveau_dmem_copy_one` function ensures that the copy push command is sent to the device firmware but does no...
CVE-2023-52920
- EPSS 0.02%
- Veröffentlicht 05.11.2024 10:15:24
- Zuletzt bearbeitet 17.05.2026 16:16:13
In the Linux kernel, the following vulnerability has been resolved: bpf: support non-r10 register spill/fill to/from stack in precision tracking Use instruction (jump) history to record instructions that performed register spill/fill to/from stack,...
CVE-2024-50082
- EPSS 0.01%
- Veröffentlicht 29.10.2024 01:15:05
- Zuletzt bearbeitet 03.11.2025 23:16:48
In the Linux kernel, the following vulnerability has been resolved: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race We're seeing crashes from rq_qos_wake_function that look like this: BUG: unable to handle page fault for addre...
CVE-2024-50083
- EPSS 0.1%
- Veröffentlicht 29.10.2024 01:15:05
- Zuletzt bearbeitet 03.11.2025 23:16:48
In the Linux kernel, the following vulnerability has been resolved: tcp: fix mptcp DSS corruption due to large pmtu xmit Syzkaller was able to trigger a DSS corruption: TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Send...
CVE-2024-50072
- EPSS 0.02%
- Veröffentlicht 29.10.2024 01:15:04
- Zuletzt bearbeitet 03.11.2025 23:16:46
In the Linux kernel, the following vulnerability has been resolved: x86/bugs: Use code segment selector for VERW operand Robert Gill reported below #GP in 32-bit mode when dosemu software was executing vm86() system call: general protection faul...
CVE-2024-50074
- EPSS 0.02%
- Veröffentlicht 29.10.2024 01:15:04
- Zuletzt bearbeitet 03.11.2025 23:16:47
In the Linux kernel, the following vulnerability has been resolved: parport: Proper fix for array out-of-bounds access The recent fix for array out-of-bounds accesses replaced sprintf() calls blindly with snprintf(). However, since snprintf() retu...
CVE-2024-50076
- EPSS 0.13%
- Veröffentlicht 29.10.2024 01:15:04
- Zuletzt bearbeitet 08.11.2024 16:15:45
In the Linux kernel, the following vulnerability has been resolved: vt: prevent kernel-infoleak in con_font_get() font.data may not initialize all memory spaces depending on the implementation of vc->vc_sw->con_font_get. This may cause info-leak, s...
CVE-2024-50067
- EPSS 0.03%
- Veröffentlicht 28.10.2024 01:15:02
- Zuletzt bearbeitet 03.11.2025 23:16:46
In the Linux kernel, the following vulnerability has been resolved: uprobe: avoid out-of-bounds memory access of fetching args Uprobe needs to fetch args into a percpu buffer, and then copy to ring buffer to avoid non-atomic context problem. Somet...
CVE-2023-52918
- EPSS 0.01%
- Veröffentlicht 22.10.2024 08:15:02
- Zuletzt bearbeitet 03.11.2025 22:16:32
In the Linux kernel, the following vulnerability has been resolved: media: pci: cx23885: check cx23885_vdev_init() return cx23885_vdev_init() can return a NULL pointer, but that pointer is used in the next line without a check. Add a NULL pointer ...