CVE-2024-53099
- EPSS 0.01%
- Veröffentlicht 25.11.2024 22:15:16
- Zuletzt bearbeitet 03.11.2025 21:17:25
In the Linux kernel, the following vulnerability has been resolved: bpf: Check validity of link->type in bpf_link_show_fdinfo() If a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing bpf_link_type_strs[link->type] may result in an out...
CVE-2024-8805
- EPSS 2.59%
- Veröffentlicht 22.11.2024 21:15:18
- Zuletzt bearbeitet 03.11.2025 23:17:32
BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this...
CVE-2024-53095
- EPSS 0.01%
- Veröffentlicht 21.11.2024 19:15:12
- Zuletzt bearbeitet 24.03.2025 17:21:57
In the Linux kernel, the following vulnerability has been resolved: smb: client: Fix use-after-free of network namespace. Recently, we got a customer report that CIFS triggers oops while reconnecting to a server. [0] The workload runs on Kubernet...
CVE-2024-53063
- EPSS 0.02%
- Veröffentlicht 19.11.2024 18:15:26
- Zuletzt bearbeitet 03.11.2025 23:17:17
In the Linux kernel, the following vulnerability has been resolved: media: dvbdev: prevent the risk of out of memory access The dvbdev contains a static variable used to store dvb minors. The behavior of it depends if CONFIG_DVB_DYNAMIC_MINORS is ...
CVE-2024-53066
- EPSS 0.02%
- Veröffentlicht 19.11.2024 18:15:26
- Zuletzt bearbeitet 03.11.2025 23:17:17
In the Linux kernel, the following vulnerability has been resolved: nfs: Fix KMSAN warning in decode_getfattr_attrs() Fix the following KMSAN warning: CPU: 1 UID: 0 PID: 7651 Comm: cp Tainted: G B Tainted: [B]=BAD_PAGE Hardware name: QEMU Stand...
CVE-2024-53057
- EPSS 0.01%
- Veröffentlicht 19.11.2024 18:15:25
- Zuletzt bearbeitet 12.05.2026 13:16:21
In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT In qdisc_tree_reduce_backlog, Qdiscs with major handle ffff: are assumed to be either root or ingress. This assumption is bog...
CVE-2024-53060
- EPSS 0.02%
- Veröffentlicht 19.11.2024 18:15:25
- Zuletzt bearbeitet 03.11.2025 23:17:17
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported acpi_evaluate_object() may return AE_NOT_FOUND (failure), which would result in dereferencing buffer.pointer (...
CVE-2024-53061
- EPSS 0.01%
- Veröffentlicht 19.11.2024 18:15:25
- Zuletzt bearbeitet 03.11.2025 23:17:17
In the Linux kernel, the following vulnerability has been resolved: media: s5p-jpeg: prevent buffer overflows The current logic allows word to be less than 2. If this happens, there will be buffer overflows, as reported by smatch. Add extra checks ...
CVE-2024-50304
- EPSS 0.02%
- Veröffentlicht 19.11.2024 18:15:22
- Zuletzt bearbeitet 03.11.2025 21:17:19
In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() The per-netns IP tunnel hash table is protected by the RTNL mutex and ip_tunnel_find() is only called from the...
CVE-2024-50299
- EPSS 0.02%
- Veröffentlicht 19.11.2024 02:16:32
- Zuletzt bearbeitet 12.05.2026 13:16:20
In the Linux kernel, the following vulnerability has been resolved: sctp: properly validate chunk size in sctp_sf_ootb() A size validation fix similar to that in Commit 50619dbf8db7 ("sctp: add size validation when walking chunks") is also required...