CVE-2024-39480
- EPSS 0.02%
- Veröffentlicht 05.07.2024 07:15:10
- Zuletzt bearbeitet 21.11.2024 09:27:46
In the Linux kernel, the following vulnerability has been resolved: kdb: Fix buffer overflow during tab-complete Currently, when the user attempts symbol completion with the Tab key, kdb will use strncpy() to insert the completed symbol into the co...
CVE-2024-39482
- EPSS 0.02%
- Veröffentlicht 05.07.2024 07:15:10
- Zuletzt bearbeitet 12.05.2026 12:16:56
In the Linux kernel, the following vulnerability has been resolved: bcache: fix variable length array abuse in btree_iter btree_iter is used in two ways: either allocated on the stack with a fixed size MAX_BSETS, or from a mempool with a dynamic si...
CVE-2024-39484
- EPSS 0.03%
- Veröffentlicht 05.07.2024 07:15:10
- Zuletzt bearbeitet 03.11.2025 22:17:04
In the Linux kernel, the following vulnerability has been resolved: mmc: davinci: Don't strip remove function when driver is builtin Using __exit for the remove function results in the remove callback being discarded with CONFIG_MMC_DAVINCI=y. When...
CVE-2023-52340
- EPSS 0.08%
- Veröffentlicht 05.07.2024 02:15:09
- Zuletzt bearbeitet 04.11.2025 18:15:49
The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
CVE-2016-20022
- EPSS 0.11%
- Veröffentlicht 27.06.2024 23:15:50
- Zuletzt bearbeitet 15.04.2026 00:35:42
In the Linux kernel before 4.8, usb_parse_endpoint in drivers/usb/core/config.c does not validate the wMaxPacketSize field of an endpoint descriptor. NOTE: This vulnerability only affects products that are no longer supported by the supplier.
CVE-2024-39467
- EPSS 0.01%
- Veröffentlicht 25.06.2024 15:15:15
- Zuletzt bearbeitet 17.09.2025 16:07:38
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to do sanity check on i_xattr_nid in sanity_check_inode() syzbot reports a kernel bug as below: F2FS-fs (loop0): Mounted with checkpoint version = 48b305e4 =============...
CVE-2024-39468
- EPSS 0.01%
- Veröffentlicht 25.06.2024 15:15:15
- Zuletzt bearbeitet 12.05.2026 12:16:56
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix deadlock in smb2_find_smb_tcon() Unlock cifs_tcp_ses_lock before calling cifs_put_smb_ses() to avoid such deadlock.
CVE-2024-39469
- EPSS 0.03%
- Veröffentlicht 25.06.2024 15:15:15
- Zuletzt bearbeitet 03.11.2025 22:17:03
In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors The error handling in nilfs_empty_dir() when a directory folio/page read fails is incorrect, as in the old ext...
CVE-2024-39471
- EPSS 0.01%
- Veröffentlicht 25.06.2024 15:15:15
- Zuletzt bearbeitet 21.11.2024 09:27:44
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add error handle to avoid out-of-bounds if the sdma_v4_0_irq_id_to_seq return -EINVAL, the process should be stop to avoid out-of-bounds read, so directly return -EINVA...
CVE-2024-39301
- EPSS 0.03%
- Veröffentlicht 25.06.2024 15:15:14
- Zuletzt bearbeitet 21.11.2024 09:27:25
In the Linux kernel, the following vulnerability has been resolved: net/9p: fix uninit-value in p9_client_rpc() Syzbot with the help of KMSAN reported the following error: BUG: KMSAN: uninit-value in trace_9p_client_res include/trace/events/9p.h:1...