CVE-2024-38636
- EPSS 0.03%
- Veröffentlicht 21.06.2024 11:15:12
- Zuletzt bearbeitet 03.10.2025 14:55:23
In the Linux kernel, the following vulnerability has been resolved: f2fs: multidev: fix to recognize valid zero block address As reported by Yi Zhang in mailing list [1], kernel warning was catched during zbd/010 test as below: ./check zbd/010 zbd...
CVE-2024-38637
- EPSS 0.03%
- Veröffentlicht 21.06.2024 11:15:12
- Zuletzt bearbeitet 04.11.2025 18:16:29
In the Linux kernel, the following vulnerability has been resolved: greybus: lights: check return of get_channel_from_mode If channel for the given node is not found we return null from get_channel_from_mode. Make sure we validate the return pointe...
CVE-2024-38659
- EPSS 0.02%
- Veröffentlicht 21.06.2024 11:15:12
- Zuletzt bearbeitet 12.05.2026 12:16:55
In the Linux kernel, the following vulnerability has been resolved: enic: Validate length of nl attributes in enic_set_vf_port enic_set_vf_port assumes that the nl attribute IFLA_PORT_PROFILE is of length PORT_PROFILE_MAX and that the nl attributes...
- EPSS 0.04%
- Veröffentlicht 21.06.2024 11:15:11
- Zuletzt bearbeitet 02.07.2024 20:15:05
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-38621
- EPSS 0.01%
- Veröffentlicht 21.06.2024 11:15:11
- Zuletzt bearbeitet 04.11.2025 18:16:29
In the Linux kernel, the following vulnerability has been resolved: media: stk1160: fix bounds checking in stk1160_copy_video() The subtract in this condition is reversed. The ->length is the length of the buffer. The ->bytesused is how many byte...
CVE-2024-38622
- EPSS 0.03%
- Veröffentlicht 21.06.2024 11:15:11
- Zuletzt bearbeitet 17.09.2025 16:59:41
In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add callback function pointer check before its call In dpu_core_irq_callback_handler() callback function pointer is compared to NULL, but then callback function is unc...
CVE-2024-38623
- EPSS 0.25%
- Veröffentlicht 21.06.2024 11:15:11
- Zuletzt bearbeitet 24.03.2025 18:10:02
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Use variable length array instead of fixed size Should fix smatch warning: ntfs_set_label() error: __builtin_memcpy() 'uni->name' too small (20 vs 256)
CVE-2024-38624
- EPSS 0.03%
- Veröffentlicht 21.06.2024 11:15:11
- Zuletzt bearbeitet 03.10.2025 16:08:44
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow For example, in the expression: vbo = 2 * vbo + skip
CVE-2024-38625
- EPSS 0.03%
- Veröffentlicht 21.06.2024 11:15:11
- Zuletzt bearbeitet 07.01.2025 16:09:49
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Check 'folio' pointer for NULL It can be NULL if bmap is called.
CVE-2024-38627
- EPSS 0.02%
- Veröffentlicht 21.06.2024 11:15:11
- Zuletzt bearbeitet 04.11.2025 18:16:29
In the Linux kernel, the following vulnerability has been resolved: stm class: Fix a double free in stm_register_device() The put_device(&stm->dev) call will trigger stm_device_release() which frees "stm" so the vfree(stm) on the next line is a dou...