CVE-2024-42121
- EPSS 0.02%
- Veröffentlicht 30.07.2024 08:15:04
- Zuletzt bearbeitet 03.11.2025 22:17:40
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check index msg_id before read or write [WHAT] msg_id is used as an array index and it cannot be a negative value, and therefore cannot be equal to MOD_HDCP_MESSAG...
CVE-2024-42122
- EPSS 0.02%
- Veröffentlicht 30.07.2024 08:15:04
- Zuletzt bearbeitet 03.11.2025 20:16:27
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add NULL pointer check for kzalloc [Why & How] Check return pointer of kzalloc before using it.
CVE-2024-42124
- EPSS 0.02%
- Veröffentlicht 30.07.2024 08:15:04
- Zuletzt bearbeitet 03.11.2025 22:17:40
In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Make qedf_execute_tmf() non-preemptible Stop calling smp_processor_id() from preemptible code in qedf_execute_tmf90. This results in BUG_ON() when running an RT kernel...
CVE-2024-42125
- EPSS 0.02%
- Veröffentlicht 30.07.2024 08:15:04
- Zuletzt bearbeitet 06.10.2025 17:16:44
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband We have some policy via BIOS to block uses of 6 GHz. In this case, 6 GHz sband will be NULL even if it is...
CVE-2024-42126
- EPSS 0.01%
- Veröffentlicht 30.07.2024 08:15:04
- Zuletzt bearbeitet 03.11.2025 22:17:40
In the Linux kernel, the following vulnerability has been resolved: powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt. nmi_enter()/nmi_exit() touches per cpu variables which can lead to kernel crash when invoked during real mode interrupt ha...
CVE-2024-42127
- EPSS 0.02%
- Veröffentlicht 30.07.2024 08:15:04
- Zuletzt bearbeitet 03.11.2025 22:17:40
In the Linux kernel, the following vulnerability has been resolved: drm/lima: fix shared irq handling on driver remove lima uses a shared interrupt, so the interrupt handlers must be prepared to be called at any time. At driver removal time, the cl...
CVE-2024-42128
- EPSS 0.03%
- Veröffentlicht 30.07.2024 08:15:04
- Zuletzt bearbeitet 29.09.2025 14:28:29
In the Linux kernel, the following vulnerability has been resolved: leds: an30259a: Use devm_mutex_init() for mutex initialization In this driver LEDs are registered using devm_led_classdev_register() so they are automatically unregistered after mo...
CVE-2024-42129
- EPSS 0.02%
- Veröffentlicht 30.07.2024 08:15:04
- Zuletzt bearbeitet 03.11.2025 20:16:27
In the Linux kernel, the following vulnerability has been resolved: leds: mlxreg: Use devm_mutex_init() for mutex initialization In this driver LEDs are registered using devm_led_classdev_register() so they are automatically unregistered after modu...
CVE-2024-42105
- EPSS 0.01%
- Veröffentlicht 30.07.2024 08:15:03
- Zuletzt bearbeitet 03.11.2025 22:17:38
In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix inode number range checks Patch series "nilfs2: fix potential issues related to reserved inodes". This series fixes one use-after-free issue reported by syzbot, caused...
CVE-2024-42106
- EPSS 0.02%
- Veröffentlicht 30.07.2024 08:15:03
- Zuletzt bearbeitet 03.11.2025 22:17:39
In the Linux kernel, the following vulnerability has been resolved: inet_diag: Initialize pad field in struct inet_diag_req_v2 KMSAN reported uninit-value access in raw_lookup() [1]. Diag for raw sockets uses the pad field in struct inet_diag_req_v...