CVE-2024-42155
- EPSS 0.02%
- Veröffentlicht 30.07.2024 08:15:07
- Zuletzt bearbeitet 21.11.2024 09:33:42
In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Wipe copies of protected- and secure-keys Although the clear-key of neither protected- nor secure-keys is accessible, this key material should only be visible to the cal...
CVE-2024-42156
- EPSS 0.02%
- Veröffentlicht 30.07.2024 08:15:07
- Zuletzt bearbeitet 09.12.2024 13:10:02
In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Wipe copies of clear-key structures on failure Wipe all sensitive data from stack for all IOCTLs, which convert a clear-key into a protected- or secure-key.
CVE-2024-42157
- EPSS 0.02%
- Veröffentlicht 30.07.2024 08:15:07
- Zuletzt bearbeitet 03.11.2025 22:17:43
In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Wipe sensitive data on failure Wipe sensitive data from stack also if the copy_to_user() fails.
CVE-2024-42158
- EPSS 0.02%
- Veröffentlicht 30.07.2024 08:15:07
- Zuletzt bearbeitet 21.11.2024 09:33:43
In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings Replace memzero_explicit() and kfree() with kfree_sensitive() to fix warnings reported by Coccinelle: WARNING opportuni...
CVE-2024-42159
- EPSS 0.03%
- Veröffentlicht 30.07.2024 08:15:07
- Zuletzt bearbeitet 25.03.2026 14:27:16
In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Sanitise num_phys Information is stored in mr_sas_port->phy_mask, values larger then size of this field shouldn't be allowed.
CVE-2024-42160
- EPSS 0.02%
- Veröffentlicht 30.07.2024 08:15:07
- Zuletzt bearbeitet 25.03.2026 14:34:47
In the Linux kernel, the following vulnerability has been resolved: f2fs: check validation of fault attrs in f2fs_build_fault_attr() - It missed to check validation of fault attrs in parse_options(), let's fix to add check condition in f2fs_build_f...
CVE-2024-42161
- EPSS 0.03%
- Veröffentlicht 30.07.2024 08:15:07
- Zuletzt bearbeitet 03.11.2025 22:17:44
In the Linux kernel, the following vulnerability has been resolved: bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD [Changes from V1: - Use a default branch in the switch statement to initialize `val'.] GCC warns that `val' may be used u...
- EPSS 0.02%
- Veröffentlicht 30.07.2024 08:15:07
- Zuletzt bearbeitet 21.11.2024 09:33:43
In the Linux kernel, the following vulnerability has been resolved: gve: Account for stopped queues when reading NIC stats We now account for the fact that the NIC might send us stats for a subset of queues. Without this change, gve_get_ethtool_sta...
CVE-2024-42223
- EPSS 0.03%
- Veröffentlicht 30.07.2024 08:15:07
- Zuletzt bearbeitet 03.11.2025 22:17:44
In the Linux kernel, the following vulnerability has been resolved: media: dvb-frontends: tda10048: Fix integer overflow state->xtal_hz can be up to 16M, so it can overflow a 32 bit integer when multiplied by pll_mfactor. Create a new 64 bit varia...
CVE-2024-42224
- EPSS 0.04%
- Veröffentlicht 30.07.2024 08:15:07
- Zuletzt bearbeitet 03.11.2025 22:17:44
In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Correct check for empty list Since commit a3c53be55c95 ("net: dsa: mv88e6xxx: Support multiple MDIO busses") mv88e6xxx_default_mdio_bus() has checked that the ...