CVE-2024-27410
- EPSS 0.01%
- Veröffentlicht 17.05.2024 12:15:11
- Zuletzt bearbeitet 17.12.2025 19:42:57
In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: reject iftype change with mesh ID change It's currently possible to change the mesh ID when the interface isn't yet in mesh mode, at the same time as changing it int...
CVE-2024-27405
- EPSS 0.23%
- Veröffentlicht 17.05.2024 12:15:10
- Zuletzt bearbeitet 08.04.2025 15:53:55
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs It is observed sometimes when tethering is used over NCM with Windows 11 as host, at some instances, the gadget_g...
CVE-2023-52657
- EPSS 0.04%
- Veröffentlicht 17.05.2024 12:15:09
- Zuletzt bearbeitet 18.09.2025 17:07:34
In the Linux kernel, the following vulnerability has been resolved: Revert "drm/amd/pm: resolve reboot exception for si oland" This reverts commit e490d60a2f76bff636c68ce4fe34c1b6c34bbd86. This causes hangs on SI when DC is enabled and errors on d...
CVE-2024-27402
- EPSS 0.02%
- Veröffentlicht 17.05.2024 12:15:09
- Zuletzt bearbeitet 18.09.2025 17:26:45
In the Linux kernel, the following vulnerability has been resolved: phonet/pep: fix racy skb_queue_empty() use The receive queues are protected by their respective spin-lock, not the socket lock. This could lead to skb_peek() unexpectedly returning...
CVE-2024-21823
- EPSS 0.06%
- Veröffentlicht 16.05.2024 21:16:03
- Zuletzt bearbeitet 15.04.2026 00:35:42
Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access
CVE-2024-25743
- EPSS 0.13%
- Veröffentlicht 15.05.2024 18:15:10
- Zuletzt bearbeitet 15.04.2026 00:35:42
In the Linux kernel through 6.9, an untrusted hypervisor can inject virtual interrupts 0 and 14 at any point in time and can trigger the SIGFPE signal handler in userspace applications. This affects AMD SEV-SNP and AMD SEV-ES.
CVE-2024-27401
- EPSS 0.01%
- Veröffentlicht 14.05.2024 15:12:29
- Zuletzt bearbeitet 22.01.2026 20:39:28
In the Linux kernel, the following vulnerability has been resolved: firewire: nosy: ensure user_length is taken into account when fetching packet contents Ensure that packet_buffer_get respects the user_length provided. If the length of the head pa...
- EPSS 0.04%
- Veröffentlicht 14.05.2024 15:12:28
- Zuletzt bearbeitet 12.05.2026 12:16:32
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a timestamp field at the beginning of the transaction, store it in the nftables per-netns area. Update set...
CVE-2024-27398
- EPSS 0.71%
- Veröffentlicht 14.05.2024 15:12:28
- Zuletzt bearbeitet 22.01.2026 20:37:07
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout When the sco connection is established and then, the sco socket is releasing, timeout_work will be scheduled to judge ...
CVE-2024-27399
- EPSS 0.01%
- Veröffentlicht 14.05.2024 15:12:28
- Zuletzt bearbeitet 22.01.2026 20:37:12
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout There is a race condition between l2cap_chan_timeout() and l2cap_chan_del(). When we use l2cap_chan_del() to delete the c...