CVE-2024-38624
- EPSS 0.03%
- Veröffentlicht 21.06.2024 11:15:11
- Zuletzt bearbeitet 03.10.2025 16:08:44
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow For example, in the expression: vbo = 2 * vbo + skip
CVE-2024-38625
- EPSS 0.03%
- Veröffentlicht 21.06.2024 11:15:11
- Zuletzt bearbeitet 07.01.2025 16:09:49
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Check 'folio' pointer for NULL It can be NULL if bmap is called.
CVE-2024-38627
- EPSS 0.02%
- Veröffentlicht 21.06.2024 11:15:11
- Zuletzt bearbeitet 04.11.2025 18:16:29
In the Linux kernel, the following vulnerability has been resolved: stm class: Fix a double free in stm_register_device() The put_device(&stm->dev) call will trigger stm_device_release() which frees "stm" so the vfree(stm) on the next line is a dou...
CVE-2024-38628
- EPSS 0.03%
- Veröffentlicht 21.06.2024 11:15:11
- Zuletzt bearbeitet 24.03.2025 18:09:37
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind. Hang on to the control IDs instead of pointers since those are correctly handled with lock...
CVE-2024-38630
- EPSS 0.03%
- Veröffentlicht 21.06.2024 11:15:11
- Zuletzt bearbeitet 21.11.2024 09:26:31
In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the cpu5wdt module is removing, the origin code uses del_timer() to de-activate the timer. If the timer h...
CVE-2024-38632
- EPSS 0.01%
- Veröffentlicht 21.06.2024 11:15:11
- Zuletzt bearbeitet 03.11.2025 22:17:02
In the Linux kernel, the following vulnerability has been resolved: vfio/pci: fix potential memory leak in vfio_intx_enable() If vfio_irq_ctx_alloc() failed will lead to 'name' memory leak.
CVE-2024-36270
- EPSS 0.02%
- Veröffentlicht 21.06.2024 11:15:10
- Zuletzt bearbeitet 12.05.2026 12:16:47
In the Linux kernel, the following vulnerability has been resolved: netfilter: tproxy: bail out if IP has been disabled on the device syzbot reports: general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT...
CVE-2024-36286
- EPSS 0.02%
- Veröffentlicht 21.06.2024 11:15:10
- Zuletzt bearbeitet 12.05.2026 12:16:48
In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() syzbot reported that nf_reinject() could be called without rcu_read_lock() : WARNING: suspicious RCU ...
CVE-2024-36478
- EPSS 0.01%
- Veröffentlicht 21.06.2024 11:15:10
- Zuletzt bearbeitet 03.11.2025 22:16:58
In the Linux kernel, the following vulnerability has been resolved: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' Writing 'power' and 'submit_queues' concurrently will trigger kernel panic: Test script: modprobe...
CVE-2024-36484
- EPSS 0.01%
- Veröffentlicht 21.06.2024 11:15:10
- Zuletzt bearbeitet 12.05.2026 12:16:48
In the Linux kernel, the following vulnerability has been resolved: net: relax socket state check at accept time. Christoph reported the following splat: WARNING: CPU: 1 PID: 772 at net/ipv4/af_inet.c:761 __inet_accept+0x1f4/0x4a0 Modules linked i...