CVE-2024-36951
- EPSS 0.02%
- Veröffentlicht 30.05.2024 16:15:18
- Zuletzt bearbeitet 01.10.2025 14:12:00
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: range check cp bad op exception interrupts Due to a CP interrupt bug, bad packet garbage exception codes are raised. Do a range check so that the debugger and runtime d...
CVE-2024-36952
- EPSS 0.03%
- Veröffentlicht 30.05.2024 16:15:18
- Zuletzt bearbeitet 01.10.2025 14:11:24
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up There are cases after NPIV deletion where the fabric switch still believes the NPIV is logged into the f...
CVE-2024-36953
- EPSS 0.01%
- Veröffentlicht 30.05.2024 16:15:18
- Zuletzt bearbeitet 23.12.2025 19:16:51
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() vgic_v2_parse_attr() is responsible for finding the vCPU that matches the user-provided CPUID, which (of course...
CVE-2024-36954
- EPSS 0.03%
- Veröffentlicht 30.05.2024 16:15:18
- Zuletzt bearbeitet 14.01.2025 16:27:50
In the Linux kernel, the following vulnerability has been resolved: tipc: fix a possible memleak in tipc_buf_append __skb_linearize() doesn't free the skb when it fails, so move '*buf = NULL' after __skb_linearize(), so that the skb can be freed on...
CVE-2024-36955
- EPSS 0.03%
- Veröffentlicht 30.05.2024 16:15:18
- Zuletzt bearbeitet 01.04.2025 18:35:58
In the Linux kernel, the following vulnerability has been resolved: ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() The documentation for device_get_named_child_node() mentions this important point: " The caller is responsibl...
CVE-2024-36957
- EPSS 0.03%
- Veröffentlicht 30.05.2024 16:15:18
- Zuletzt bearbeitet 23.12.2025 19:16:46
In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: avoid off-by-one read from userspace We try to access count + 1 byte from userspace with memdup_user(buffer, count + 1). However, the userspace only provides buffer o...
CVE-2024-36959
- EPSS 0.03%
- Veröffentlicht 30.05.2024 16:15:18
- Zuletzt bearbeitet 12.05.2026 12:16:50
In the Linux kernel, the following vulnerability has been resolved: pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() If we fail to allocate propname buffer, we need to drop the reference count we just took. Because the pinctrl_dt_free_...
CVE-2024-36940
- EPSS 0.02%
- Veröffentlicht 30.05.2024 16:15:17
- Zuletzt bearbeitet 12.05.2026 12:16:50
In the Linux kernel, the following vulnerability has been resolved: pinctrl: core: delete incorrect free in pinctrl_enable() The "pctldev" struct is allocated in devm_pinctrl_register_and_init(). It's a devm_ managed pointer that is freed by devm_p...
CVE-2024-36941
- EPSS 0.02%
- Veröffentlicht 30.05.2024 16:15:17
- Zuletzt bearbeitet 20.05.2025 15:16:04
In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: don't free NULL coalescing rule If the parsing fails, we can dereference a NULL pointer here.
CVE-2024-36944
- EPSS 0.02%
- Veröffentlicht 30.05.2024 16:15:17
- Zuletzt bearbeitet 01.04.2025 18:35:48
In the Linux kernel, the following vulnerability has been resolved: Reapply "drm/qxl: simplify qxl_fence_wait" This reverts commit 07ed11afb68d94eadd4ffc082b97c2331307c5ea. Stephen Rostedt reports: "I went to run my tests on my VMs and the tests ...