CVE-2021-47247
- EPSS 0.01%
- Veröffentlicht 21.05.2024 15:15:13
- Zuletzt bearbeitet 14.11.2025 17:16:18
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix use-after-free of encap entry in neigh update handler Function mlx5e_rep_neigh_update() wasn't updated to accommodate rtnl lock removal from TC filter update path an...
CVE-2021-47233
- EPSS 0.05%
- Veröffentlicht 21.05.2024 15:15:12
- Zuletzt bearbeitet 30.12.2024 19:51:12
In the Linux kernel, the following vulnerability has been resolved: regulator: rt4801: Fix NULL pointer dereference if priv->enable_gpios is NULL devm_gpiod_get_array_optional may return NULL if no GPIO was assigned.
CVE-2021-47234
- EPSS 0.02%
- Veröffentlicht 21.05.2024 15:15:12
- Zuletzt bearbeitet 29.04.2025 19:42:29
In the Linux kernel, the following vulnerability has been resolved: phy: phy-mtk-tphy: Fix some resource leaks in mtk_phy_init() Use clk_disable_unprepare() in the error path of mtk_phy_init() to fix some resource leaks.
CVE-2020-36788
- EPSS 0.02%
- Veröffentlicht 21.05.2024 15:15:11
- Zuletzt bearbeitet 11.12.2024 16:37:00
In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: avoid a use-after-free when BO init fails nouveau_bo_init() is backed by ttm_bo_init() and ferries its return code back to the caller. On failures, ttm_bo_init() invok...
CVE-2021-47221
- EPSS 0.02%
- Veröffentlicht 21.05.2024 15:15:11
- Zuletzt bearbeitet 29.04.2025 19:07:02
In the Linux kernel, the following vulnerability has been resolved: mm/slub: actually fix freelist pointer vs redzoning It turns out that SLUB redzoning ("slub_debug=Z") checks from s->object_size rather than from s->inuse (which is normally bumped...
CVE-2021-47226
- EPSS 0.05%
- Veröffentlicht 21.05.2024 15:15:11
- Zuletzt bearbeitet 29.04.2025 19:26:36
In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Invalidate FPU state after a failed XRSTOR from a user buffer Both Intel and AMD consider it to be architecturally valid for XRSTOR to fail with #PF but nonetheless change...
CVE-2024-35998
- EPSS 0.03%
- Veröffentlicht 20.05.2024 10:15:14
- Zuletzt bearbeitet 10.01.2025 18:12:11
In the Linux kernel, the following vulnerability has been resolved: smb3: fix lock ordering potential deadlock in cifs_sync_mid_result Coverity spotted that the cifs_sync_mid_result function could deadlock "Thread deadlock (ORDER_REVERSAL) lock_or...
CVE-2024-35999
- EPSS 0.02%
- Veröffentlicht 20.05.2024 10:15:14
- Zuletzt bearbeitet 04.04.2025 14:32:31
In the Linux kernel, the following vulnerability has been resolved: smb3: missing lock when picking channel Coverity spotted a place where we should have been holding the channel lock when accessing the ses channel index. Addresses-Coverity: 15820...
CVE-2024-36009
- EPSS 0.02%
- Veröffentlicht 20.05.2024 10:15:14
- Zuletzt bearbeitet 23.09.2025 18:47:09
In the Linux kernel, the following vulnerability has been resolved: ax25: Fix netdev refcount issue The dev_tracker is added to ax25_cb in ax25_bind(). When the ax25 device is detaching, the dev_tracker of ax25_cb should be deallocated in ax25_kill...
CVE-2024-35995
- EPSS 0.02%
- Veröffentlicht 20.05.2024 10:15:13
- Zuletzt bearbeitet 24.09.2025 18:21:27
In the Linux kernel, the following vulnerability has been resolved: ACPI: CPPC: Use access_width over bit_width for system memory accesses To align with ACPI 6.3+, since bit_width can be any 8-bit value, it cannot be depended on to be always on a c...