CVE-2024-26810
- EPSS 0.01%
- Veröffentlicht 05.04.2024 09:15:09
- Zuletzt bearbeitet 12.05.2026 12:16:19
In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Lock external INTx masking ops Mask operations through config space changes to DisINTx may race INTx configuration changes via ioctl. Create wrappers that add locking fo...
CVE-2024-26812
- EPSS 0.01%
- Veröffentlicht 05.04.2024 09:15:09
- Zuletzt bearbeitet 12.05.2026 12:16:20
In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Create persistent INTx handler A vulnerability exists where the eventfd for INTx signaling can be deconfigured, which unregisters the IRQ handler but still allows eventfd...
CVE-2024-26813
- EPSS 0.02%
- Veröffentlicht 05.04.2024 09:15:09
- Zuletzt bearbeitet 20.12.2024 14:30:24
In the Linux kernel, the following vulnerability has been resolved: vfio/platform: Create persistent IRQ handlers The vfio-platform SET_IRQS ioctl currently allows loopback triggering of an interrupt before a signaling eventfd has been configured b...
CVE-2024-26814
- EPSS 0.02%
- Veröffentlicht 05.04.2024 09:15:09
- Zuletzt bearbeitet 27.03.2025 21:36:57
In the Linux kernel, the following vulnerability has been resolved: vfio/fsl-mc: Block calling interrupt handler without trigger The eventfd_ctx trigger pointer of the vfio_fsl_mc_irq object is initially NULL and may become NULL if the user sets th...
CVE-2024-27437
- EPSS 0.02%
- Veröffentlicht 05.04.2024 09:15:09
- Zuletzt bearbeitet 12.05.2026 12:16:33
In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Disable auto-enable of exclusive INTx IRQ Currently for devices requiring masking at the irqchip for INTx, ie. devices without DisINTx support, the IRQ is enabled in requ...
CVE-2024-26809
- EPSS 0.02%
- Veröffentlicht 04.04.2024 10:15:09
- Zuletzt bearbeitet 19.03.2025 16:19:56
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: release elements in clone only from destroy path Clone already always provides a current view of the lookup table, use it to destroy the set, otherwise i...
CVE-2024-26808
- EPSS 0.01%
- Veröffentlicht 04.04.2024 10:15:08
- Zuletzt bearbeitet 04.04.2025 14:21:16
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain Remove netdevice from inet/ingress basechain in case NETDEV_UNREGISTER event is reported, otherwise...
CVE-2024-26801
- EPSS 0.03%
- Veröffentlicht 04.04.2024 09:15:09
- Zuletzt bearbeitet 20.12.2024 15:52:36
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Avoid potential use-after-free in hci_error_reset While handling the HCI_EV_HARDWARE_ERROR event, if the underlying BT controller is not responding, the GPIO reset mecha...
CVE-2024-26804
- EPSS 0.35%
- Veröffentlicht 04.04.2024 09:15:09
- Zuletzt bearbeitet 21.03.2025 14:58:15
In the Linux kernel, the following vulnerability has been resolved: net: ip_tunnel: prevent perpetual headroom growth syzkaller triggered following kasan splat: BUG: KASAN: use-after-free in __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector....
CVE-2024-26805
- EPSS 0.01%
- Veröffentlicht 04.04.2024 09:15:09
- Zuletzt bearbeitet 27.02.2025 14:35:09
In the Linux kernel, the following vulnerability has been resolved: netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter syzbot reported the following uninit-value access issue [1]: netlink_to_full_skb() creates a new `skb` and puts the ...