CVE-2024-58019
- EPSS 0.01%
- Veröffentlicht 27.02.2025 03:15:12
- Zuletzt bearbeitet 28.10.2025 20:41:36
In the Linux kernel, the following vulnerability has been resolved: nvkm/gsp: correctly advance the read pointer of GSP message queue A GSP event message consists three parts: message header, RPC header, message body. GSP calculates the number of p...
CVE-2024-58001
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:11
- Zuletzt bearbeitet 03.11.2025 20:16:57
In the Linux kernel, the following vulnerability has been resolved: ocfs2: handle a symlink read error correctly Patch series "Convert ocfs2 to use folios". Mark did a conversion of ocfs2 to use folios and sent it to me as a giant patch for review...
CVE-2024-58005
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:11
- Zuletzt bearbeitet 12.05.2026 13:16:25
In the Linux kernel, the following vulnerability has been resolved: tpm: Change to kvalloc() in eventlog/acpi.c The following failure was reported on HPE ProLiant D320: [ 10.693310][ T1] tpm_tis STM0925:00: 2.0 TPM (device-id 0x3, rev-id 0) [...
CVE-2024-52559
- EPSS 0.01%
- Veröffentlicht 27.02.2025 03:15:10
- Zuletzt bearbeitet 01.10.2025 20:17:16
In the Linux kernel, the following vulnerability has been resolved: drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() The "submit->cmd[i].size" and "submit->cmd[i].offset" variables are u32 values that come from the user via the submi...
CVE-2024-52560
- EPSS 0.06%
- Veröffentlicht 27.02.2025 03:15:10
- Zuletzt bearbeitet 23.10.2025 13:05:38
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Mark inode as bad as soon as error detected in mi_enum_attr() Extended the `mi_enum_attr()` function interface with an additional parameter, `struct ntfs_inode *ni`, to a...
CVE-2024-54456
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:10
- Zuletzt bearbeitet 23.10.2025 13:05:11
In the Linux kernel, the following vulnerability has been resolved: NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client() name is char[64] where the size of clnt->cl_program->name remains unknown. Invoking strcat() directly will also lea...
CVE-2024-54458
- EPSS 0.01%
- Veröffentlicht 27.02.2025 03:15:10
- Zuletzt bearbeitet 03.11.2025 20:16:43
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: bsg: Set bsg_queue to NULL after removal Currently, this does not cause any issues, but I believe it is necessary to set bsg_queue to NULL after removing it to prevent p...
CVE-2024-57834
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:10
- Zuletzt bearbeitet 03.11.2025 20:16:55
In the Linux kernel, the following vulnerability has been resolved: media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread syzbot report a null-ptr-deref in vidtv_mux_stop_thread. [1] If dvb->mux is not initialized successfully by vidtv_mux_i...
CVE-2024-57852
- EPSS 0.01%
- Veröffentlicht 27.02.2025 03:15:10
- Zuletzt bearbeitet 23.10.2025 13:04:42
In the Linux kernel, the following vulnerability has been resolved: firmware: qcom: scm: smc: Handle missing SCM device Commit ca61d6836e6f ("firmware: qcom: scm: fix a NULL-pointer dereference") makes it explicit that qcom_scm_get_tzmem_pool() can...
CVE-2025-21730
- EPSS 0.07%
- Veröffentlicht 27.02.2025 02:15:16
- Zuletzt bearbeitet 23.10.2025 13:05:24
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: avoid to init mgnt_entry list twice when WoWLAN failed If WoWLAN failed in resume flow, the rtw89_ops_add_interface() triggered without removing the interface first. T...