CVE-2024-53224
- EPSS 0.01%
- Veröffentlicht 27.12.2024 14:15:30
- Zuletzt bearbeitet 01.10.2025 20:17:21
In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Move events notifier registration to be after device registration Move pkey change work initialization and cleanup from device resources stage to notifier stage, since t...
CVE-2024-53216
- EPSS 0.01%
- Veröffentlicht 27.12.2024 14:15:29
- Zuletzt bearbeitet 24.03.2025 17:33:56
In the Linux kernel, the following vulnerability has been resolved: nfsd: release svc_expkey/svc_export with rcu_work The last reference for `cache_head` can be reduced to zero in `c_show` and `e_show`(using `rcu_read_lock` and `rcu_read_unlock`). ...
CVE-2024-53218
- EPSS 0.01%
- Veröffentlicht 27.12.2024 14:15:29
- Zuletzt bearbeitet 24.03.2025 17:33:42
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix race in concurrent f2fs_stop_gc_thread In my test case, concurrent calls to f2fs shutdown report the following stack trace: Oops: general protection fault, probably for...
CVE-2024-53219
- EPSS 0.01%
- Veröffentlicht 27.12.2024 14:15:29
- Zuletzt bearbeitet 01.10.2025 20:17:21
In the Linux kernel, the following vulnerability has been resolved: virtiofs: use pages instead of pointer for kernel direct IO When trying to insert a 10MB kernel module kept in a virtio-fs with cache disabled, the following warning was reported: ...
CVE-2024-53210
- EPSS 0.01%
- Veröffentlicht 27.12.2024 14:15:28
- Zuletzt bearbeitet 03.11.2025 21:17:42
In the Linux kernel, the following vulnerability has been resolved: s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() Passing MSG_PEEK flag to skb_recv_datagram() increments skb refcount (skb->users) and iucv_sock_recvmsg() does not de...
CVE-2024-53195
- EPSS 0.01%
- Veröffentlicht 27.12.2024 14:15:27
- Zuletzt bearbeitet 08.10.2025 14:07:06
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Get rid of userspace_irqchip_in_use Improper use of userspace_irqchip_in_use led to syzbot hitting the following WARN_ON() in kvm_timer_update_irq(): WARNING: CPU: 0 P...
CVE-2024-53187
- EPSS 0.01%
- Veröffentlicht 27.12.2024 14:15:26
- Zuletzt bearbeitet 01.10.2025 20:17:17
In the Linux kernel, the following vulnerability has been resolved: io_uring: check for overflows in io_pin_pages WARNING: CPU: 0 PID: 5834 at io_uring/memmap.c:144 io_pin_pages+0x149/0x180 io_uring/memmap.c:144 CPU: 0 UID: 0 PID: 5834 Comm: syz-ex...
CVE-2024-53190
- EPSS 0.01%
- Veröffentlicht 27.12.2024 14:15:26
- Zuletzt bearbeitet 03.11.2025 21:17:39
In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures Syzkaller reported a hung task with uevent_show() on stack trace. That specific issue was addressed...
CVE-2024-53177
- EPSS 0.01%
- Veröffentlicht 27.12.2024 14:15:25
- Zuletzt bearbeitet 24.03.2025 17:26:30
In the Linux kernel, the following vulnerability has been resolved: smb: prevent use-after-free due to open_cached_dir error paths If open_cached_dir() encounters an error parsing the lease from the server, the error handling may race with receivin...
CVE-2024-53178
- EPSS 0.01%
- Veröffentlicht 27.12.2024 14:15:25
- Zuletzt bearbeitet 01.10.2025 20:17:16
In the Linux kernel, the following vulnerability has been resolved: smb: Don't leak cfid when reconnect races with open_cached_dir open_cached_dir() may either race with the tcon reconnection even before compound_send_recv() or directly trigger a r...