CVE-2024-27389
- EPSS 0.01%
- Veröffentlicht 01.05.2024 13:15:51
- Zuletzt bearbeitet 18.09.2025 16:14:57
In the Linux kernel, the following vulnerability has been resolved: pstore: inode: Only d_invalidate() is needed Unloading a modular pstore backend with records in pstorefs would trigger the dput() double-drop warning: WARNING: CPU: 0 PID: 2569 ...
CVE-2024-27390
- EPSS 0.01%
- Veröffentlicht 01.05.2024 13:15:51
- Zuletzt bearbeitet 18.09.2025 16:06:53
In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: remove one synchronize_net() barrier in ipv6_mc_down() As discussed in the past (commit 2d3916f31891 ("ipv6: fix skb drops in igmp6_event_query() and igmp6_event_repor...
CVE-2024-27051
- EPSS 0.01%
- Veröffentlicht 01.05.2024 13:15:50
- Zuletzt bearbeitet 23.12.2024 19:11:23
In the Linux kernel, the following vulnerability has been resolved: cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value cpufreq_cpu_get may return NULL. To avoid NULL-dereference check it and return 0 in case of error. Found...
CVE-2024-27052
- EPSS 0.01%
- Veröffentlicht 01.05.2024 13:15:50
- Zuletzt bearbeitet 12.05.2026 12:16:30
In the Linux kernel, the following vulnerability has been resolved: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work The workqueue might still be running, when the driver is stopped. To avoid a use-after-free, call cancel_work_sync() in rtl8x...
CVE-2024-27053
- EPSS 0.13%
- Veröffentlicht 01.05.2024 13:15:50
- Zuletzt bearbeitet 12.05.2026 12:16:31
In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: fix RCU usage in connect path With lockdep enabled, calls to the connect function from cfg802.11 layer lead to the following warning: =============================...
CVE-2024-27054
- EPSS 0.01%
- Veröffentlicht 01.05.2024 13:15:50
- Zuletzt bearbeitet 02.05.2025 07:15:52
In the Linux kernel, the following vulnerability has been resolved: s390/dasd: fix double module refcount decrement Once the discipline is associated with the device, deleting the device takes care of decrementing the module's refcount. Doing it m...
CVE-2024-27056
- EPSS 0.02%
- Veröffentlicht 01.05.2024 13:15:50
- Zuletzt bearbeitet 03.11.2025 20:16:11
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: ensure offloading TID queue exists The resume code path assumes that the TX queue for the offloading TID has been configured. At resume time it then tries to sy...
CVE-2024-27057
- EPSS 0.02%
- Veröffentlicht 01.05.2024 13:15:50
- Zuletzt bearbeitet 18.09.2025 15:17:53
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend When the system is suspended while audio is active, the sof_ipc4_pcm_hw_free() is invoked to reset the pipeli...
CVE-2024-27059
- EPSS 0.01%
- Veröffentlicht 01.05.2024 13:15:50
- Zuletzt bearbeitet 12.05.2026 12:16:31
In the Linux kernel, the following vulnerability has been resolved: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command The isd200 sub-driver in usb-storage uses the HEADS and SECTORS values in the ATA ID information to calculate cyli...
CVE-2024-27062
- EPSS 0.01%
- Veröffentlicht 01.05.2024 13:15:50
- Zuletzt bearbeitet 08.04.2025 19:42:41
In the Linux kernel, the following vulnerability has been resolved: nouveau: lock the client object tree. It appears the client object tree has no locking unless I've missed something else. Fix races around adding/removing client objects, mostly vr...