CVE-2024-57912
- EPSS 0.02%
- Veröffentlicht 19.01.2025 12:15:25
- Zuletzt bearbeitet 03.11.2025 21:18:42
In the Linux kernel, the following vulnerability has been resolved: iio: pressure: zpa2326: fix information leak in triggered buffer The 'sample' local struct is used to push data to user space from a triggered buffer, but it has a hole between the...
CVE-2024-57913
- EPSS 0.02%
- Veröffentlicht 19.01.2025 12:15:25
- Zuletzt bearbeitet 12.05.2026 13:16:23
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Remove WARN_ON in functionfs_bind This commit addresses an issue related to below kernel panic where panic_on_warn is enabled. It is caused by the unnecessary us...
- EPSS 0.04%
- Veröffentlicht 19.01.2025 12:15:25
- Zuletzt bearbeitet 13.02.2025 16:16:43
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-57908
- EPSS 0.02%
- Veröffentlicht 19.01.2025 12:15:24
- Zuletzt bearbeitet 03.11.2025 21:18:42
In the Linux kernel, the following vulnerability has been resolved: iio: imu: kmx61: fix information leak in triggered buffer The 'buffer' local array is used to push data to user space from a triggered buffer, but it does not set values for inacti...
CVE-2024-57904
- EPSS 0.01%
- Veröffentlicht 19.01.2025 12:15:23
- Zuletzt bearbeitet 03.11.2025 21:18:41
In the Linux kernel, the following vulnerability has been resolved: iio: adc: at91: call input_free_device() on allocated iio_dev Current implementation of at91_ts_register() calls input_free_deivce() on st->ts_input, however, the err label can be ...
CVE-2025-21648
- EPSS 0.03%
- Veröffentlicht 19.01.2025 11:15:10
- Zuletzt bearbeitet 12.05.2026 13:16:30
In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: clamp maximum hashtable size to INT_MAX Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_n...
CVE-2025-21653
- EPSS 0.03%
- Veröffentlicht 19.01.2025 11:15:10
- Zuletzt bearbeitet 12.05.2026 13:16:30
In the Linux kernel, the following vulnerability has been resolved: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute syzbot found that TCA_FLOW_RSHIFT attribute was not validated. Right shitfing a 32bit integer is undefined for large shift v...
CVE-2025-21635
- EPSS 0.02%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 01.10.2025 20:18:15
In the Linux kernel, the following vulnerability has been resolved: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for dif...
CVE-2025-21638
- EPSS 0.03%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 12.05.2026 13:16:29
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: auth_enable: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different r...
CVE-2025-21639
- EPSS 0.03%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 12.05.2026 13:16:30
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: rto_min/max: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different r...