CVE-2024-40949
- EPSS 0.04%
- Veröffentlicht 12.07.2024 13:15:17
- Zuletzt bearbeitet 06.10.2025 20:47:33
In the Linux kernel, the following vulnerability has been resolved: mm: shmem: fix getting incorrect lruvec when replacing a shmem folio When testing shmem swapin, I encountered the warning below on my machine. The reason is that replacing an old ...
CVE-2024-40951
- EPSS 0.02%
- Veröffentlicht 12.07.2024 13:15:17
- Zuletzt bearbeitet 16.04.2025 19:15:51
In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix NULL pointer dereference in ocfs2_abort_trigger() bdev->bd_super has been removed and commit 8887b94d9322 change the usage from bdev->bd_super to b_assoc_map->host->i_sb...
CVE-2024-40952
- EPSS 0.04%
- Veröffentlicht 12.07.2024 13:15:17
- Zuletzt bearbeitet 21.11.2024 09:31:56
In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix NULL pointer dereference in ocfs2_journal_dirty() bdev->bd_super has been removed and commit 8887b94d9322 change the usage from bdev->bd_super to b_assoc_map->host->i_sb...
CVE-2024-40953
- EPSS 0.01%
- Veröffentlicht 12.07.2024 13:15:17
- Zuletzt bearbeitet 03.11.2025 22:17:17
In the Linux kernel, the following vulnerability has been resolved: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() Use {READ,WRITE}_ONCE() to access kvm->last_boosted_vcpu to ensure the loads and stores are atomic. In the extremel...
CVE-2024-40954
- EPSS 0.01%
- Veröffentlicht 12.07.2024 13:15:17
- Zuletzt bearbeitet 03.11.2025 22:17:17
In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe c...
CVE-2024-40955
- EPSS 0.02%
- Veröffentlicht 12.07.2024 13:15:17
- Zuletzt bearbeitet 21.11.2024 09:31:56
In the Linux kernel, the following vulnerability has been resolved: ext4: fix slab-out-of-bounds in ext4_mb_find_good_group_avg_frag_lists() We can trigger a slab-out-of-bounds with the following commands: mkfs.ext4 -F /dev/$disk 10G mount...
CVE-2024-40956
- EPSS 0.01%
- Veröffentlicht 12.07.2024 13:15:17
- Zuletzt bearbeitet 03.11.2025 22:17:17
In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list Use list_for_each_entry_safe() to allow iterating through the list and deleting the entry in the iteration pro...
CVE-2024-40957
- EPSS 0.01%
- Veröffentlicht 12.07.2024 13:15:17
- Zuletzt bearbeitet 03.11.2025 22:17:17
In the Linux kernel, the following vulnerability has been resolved: seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors input_action_end_dx4() and input_action_end_dx6() are called NF_HOOK() for PREROUTING hook, in P...
CVE-2024-40958
- EPSS 0.01%
- Veröffentlicht 12.07.2024 13:15:17
- Zuletzt bearbeitet 12.05.2026 12:17:00
In the Linux kernel, the following vulnerability has been resolved: netns: Make get_net_ns() handle zero refcount net Syzkaller hit a warning: refcount_t: addition on 0; use-after-free. WARNING: CPU: 3 PID: 7890 at lib/refcount.c:25 refcount_warn_s...
CVE-2024-40959
- EPSS 0.01%
- Veröffentlicht 12.07.2024 13:15:17
- Zuletzt bearbeitet 12.05.2026 12:17:00
In the Linux kernel, the following vulnerability has been resolved: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() ip6_dst_idev() can return NULL, xfrm6_get_saddr() must act accordingly. syzbot reported: Oops: general protection fa...