CVE-2024-26801
- EPSS 0.03%
- Veröffentlicht 04.04.2024 09:15:09
- Zuletzt bearbeitet 20.12.2024 15:52:36
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Avoid potential use-after-free in hci_error_reset While handling the HCI_EV_HARDWARE_ERROR event, if the underlying BT controller is not responding, the GPIO reset mecha...
CVE-2024-26804
- EPSS 0.35%
- Veröffentlicht 04.04.2024 09:15:09
- Zuletzt bearbeitet 21.03.2025 14:58:15
In the Linux kernel, the following vulnerability has been resolved: net: ip_tunnel: prevent perpetual headroom growth syzkaller triggered following kasan splat: BUG: KASAN: use-after-free in __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector....
CVE-2024-26805
- EPSS 0.01%
- Veröffentlicht 04.04.2024 09:15:09
- Zuletzt bearbeitet 27.02.2025 14:35:09
In the Linux kernel, the following vulnerability has been resolved: netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter syzbot reported the following uninit-value access issue [1]: netlink_to_full_skb() creates a new `skb` and puts the ...
CVE-2024-26791
- EPSS 0.01%
- Veröffentlicht 04.04.2024 09:15:08
- Zuletzt bearbeitet 20.12.2024 14:35:01
In the Linux kernel, the following vulnerability has been resolved: btrfs: dev-replace: properly validate device names There's a syzbot report that device name buffers passed to device replace are not properly checked for string termination which c...
CVE-2024-26793
- EPSS 0.02%
- Veröffentlicht 04.04.2024 09:15:08
- Zuletzt bearbeitet 20.12.2024 15:56:00
In the Linux kernel, the following vulnerability has been resolved: gtp: fix use-after-free and null-ptr-deref in gtp_newlink() The gtp_link_ops operations structure for the subsystem must be registered after registering the gtp_net_ops pernet oper...
CVE-2024-26772
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 04.04.2025 14:16:47
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() Places the logic for checking if the group's block bitmap is corrupt under the protection of the group ...
CVE-2024-26773
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 18.03.2025 16:47:14
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() Determine if the group block bitmap is corrupted before using ac_b_ex in ext4_mb_try_best_found() to ...
CVE-2024-26774
- EPSS 0.02%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 19.06.2025 13:15:31
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt Determine if bb_fragments is 0 instead of determining bb_free to eliminate the risk of dividing...
CVE-2024-26775
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 17.07.2025 17:15:35
In the Linux kernel, the following vulnerability has been resolved: aoe: avoid potential deadlock at set_capacity Move set_capacity() outside of the section procected by (&d->lock). To avoid possible interrupt unsafe locking scenario: CPU0...
CVE-2024-26776
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 27.02.2025 14:34:43
In the Linux kernel, the following vulnerability has been resolved: spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected Return IRQ_NONE from the interrupt handler when no interrupt was detected. Because an empty interrupt will cause ...