CVE-2024-53052
- EPSS 0.01%
- Veröffentlicht 19.11.2024 18:15:25
- Zuletzt bearbeitet 03.11.2025 23:17:16
In the Linux kernel, the following vulnerability has been resolved: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write When io_uring starts a write, it'll call kiocb_start_write() to bump the super block rwsem, preventing any freezes fr...
CVE-2024-53055
- EPSS 0.01%
- Veröffentlicht 19.11.2024 18:15:25
- Zuletzt bearbeitet 03.11.2025 23:17:16
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix 6 GHz scan construction If more than 255 colocated APs exist for the set of all APs found during 2.4/5 GHz scanning, then the 6 GHz scan construction will l...
CVE-2024-53056
- EPSS 0.02%
- Veröffentlicht 19.11.2024 18:15:25
- Zuletzt bearbeitet 01.10.2025 21:16:23
In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() In mtk_crtc_create(), if the call to mbox_request_channel() fails then we set the "mtk_crtc->cmdq_client.chan" po...
CVE-2024-53057
- EPSS 0.01%
- Veröffentlicht 19.11.2024 18:15:25
- Zuletzt bearbeitet 12.05.2026 13:16:21
In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT In qdisc_tree_reduce_backlog, Qdiscs with major handle ffff: are assumed to be either root or ingress. This assumption is bog...
CVE-2024-53058
- EPSS 0.01%
- Veröffentlicht 19.11.2024 18:15:25
- Zuletzt bearbeitet 03.11.2025 23:17:16
In the Linux kernel, the following vulnerability has been resolved: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data In case the non-paged data of a SKB carries protocol header and protocol payload to be transmitted on a certai...
CVE-2024-53059
- EPSS 0.01%
- Veröffentlicht 19.11.2024 18:15:25
- Zuletzt bearbeitet 12.05.2026 13:16:21
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() 1. The size of the response packet is not validated. 2. The response buffer is not freed. Resolve these is...
CVE-2024-53061
- EPSS 0.01%
- Veröffentlicht 19.11.2024 18:15:25
- Zuletzt bearbeitet 03.11.2025 23:17:17
In the Linux kernel, the following vulnerability has been resolved: media: s5p-jpeg: prevent buffer overflows The current logic allows word to be less than 2. If this happens, there will be buffer overflows, as reported by smatch. Add extra checks ...
CVE-2024-53042
- EPSS 0.01%
- Veröffentlicht 19.11.2024 18:15:24
- Zuletzt bearbeitet 12.05.2026 13:16:21
In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() There are code paths from which the function is called without holding the RCU read lock, resulting in a ...
CVE-2024-50304
- EPSS 0.02%
- Veröffentlicht 19.11.2024 18:15:22
- Zuletzt bearbeitet 03.11.2025 21:17:19
In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() The per-netns IP tunnel hash table is protected by the RTNL mutex and ip_tunnel_find() is only called from the...
CVE-2024-50299
- EPSS 0.02%
- Veröffentlicht 19.11.2024 02:16:32
- Zuletzt bearbeitet 12.05.2026 13:16:20
In the Linux kernel, the following vulnerability has been resolved: sctp: properly validate chunk size in sctp_sf_ootb() A size validation fix similar to that in Commit 50619dbf8db7 ("sctp: add size validation when walking chunks") is also required...