CVE-2023-52479
- EPSS 0.02%
- Veröffentlicht 29.02.2024 06:15:45
- Zuletzt bearbeitet 19.03.2025 15:51:23
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix uaf in smb20_oplock_break_ack drop reference after use opinfo.
- EPSS 0.13%
- Veröffentlicht 29.02.2024 01:42:05
- Zuletzt bearbeitet 15.04.2026 00:35:42
bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.
CVE-2021-47041
- EPSS 0.02%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 06.12.2024 18:41:12
In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: fix incorrect locking in state_change sk callback We are not changing anything in the TCP connection state so we should not take a write_lock but rather a read lock. Th...
CVE-2021-47043
- EPSS 0.03%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 09.01.2025 15:21:46
In the Linux kernel, the following vulnerability has been resolved: media: venus: core: Fix some resource leaks in the error path of 'venus_probe()' If an error occurs after a successful 'of_icc_get()' call, it must be undone. Use 'devm_of_icc_get...
CVE-2021-47044
- EPSS 0.02%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 19.03.2025 15:50:56
In the Linux kernel, the following vulnerability has been resolved: sched/fair: Fix shift-out-of-bounds in load_balance() Syzbot reported a handful of occurrences where an sd->nr_balance_failed can grow to much higher values than one would expect. ...
CVE-2021-47046
- EPSS 0.02%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 09.12.2024 19:02:52
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix off by one in hdmi_14_process_transaction() The hdcp_i2c_offsets[] array did not have an entry for HDCP_MESSAGE_ID_WRITE_CONTENT_STREAM_TYPE so it led to an of...
CVE-2021-47047
- EPSS 0.02%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 10.01.2025 18:26:24
In the Linux kernel, the following vulnerability has been resolved: spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails The spi controller supports 44-bit address space on AXI in DMA mode, so set dma_addr_t width to 44-bit to avoid using ...
CVE-2021-47048
- EPSS 0.04%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 09.12.2024 19:05:02
In the Linux kernel, the following vulnerability has been resolved: spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op When handling op->addr, it is using the buffer "tmpbuf" which has been freed. This will trigger a use-after-free KA...
CVE-2021-47049
- EPSS 0.02%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 09.12.2024 19:06:07
In the Linux kernel, the following vulnerability has been resolved: Drivers: hv: vmbus: Use after free in __vmbus_open() The "open_info" variable is added to the &vmbus_connection.chn_msg_list, but the error handling frees "open_info" without remov...
CVE-2021-47050
- EPSS 0.03%
- Veröffentlicht 28.02.2024 09:15:40
- Zuletzt bearbeitet 09.12.2024 19:06:24
In the Linux kernel, the following vulnerability has been resolved: memory: renesas-rpc-if: fix possible NULL pointer dereference of resource The platform_get_resource_byname() can return NULL which would be immediately dereferenced by resource_siz...