CVE-2024-27392
- EPSS 0.04%
- Veröffentlicht 01.05.2024 13:15:51
- Zuletzt bearbeitet 26.12.2024 20:32:43
In the Linux kernel, the following vulnerability has been resolved: nvme: host: fix double-free of struct nvme_id_ns in ns_update_nuse() When nvme_identify_ns() fails, it frees the pointer to the struct nvme_id_ns before it returns. However, ns_upd...
CVE-2024-27049
- EPSS 0.02%
- Veröffentlicht 01.05.2024 13:15:50
- Zuletzt bearbeitet 23.12.2024 19:11:05
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7925e: fix use-after-free in free_irq() From commit a304e1b82808 ("[PATCH] Debug shared irqs"), there is a test to make sure the shared irq handler should be able to ...
CVE-2024-27050
- EPSS 0.02%
- Veröffentlicht 01.05.2024 13:15:50
- Zuletzt bearbeitet 08.04.2025 18:38:39
In the Linux kernel, the following vulnerability has been resolved: libbpf: Use OPTS_SET() macro in bpf_xdp_query() When the feature_flags and xdp_zc_max_segs fields were added to the libbpf bpf_xdp_query_opts, the code writing them did not use the...
CVE-2024-27051
- EPSS 0.01%
- Veröffentlicht 01.05.2024 13:15:50
- Zuletzt bearbeitet 23.12.2024 19:11:23
In the Linux kernel, the following vulnerability has been resolved: cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value cpufreq_cpu_get may return NULL. To avoid NULL-dereference check it and return 0 in case of error. Found...
CVE-2024-27052
- EPSS 0.01%
- Veröffentlicht 01.05.2024 13:15:50
- Zuletzt bearbeitet 12.05.2026 12:16:30
In the Linux kernel, the following vulnerability has been resolved: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work The workqueue might still be running, when the driver is stopped. To avoid a use-after-free, call cancel_work_sync() in rtl8x...
CVE-2024-27053
- EPSS 0.13%
- Veröffentlicht 01.05.2024 13:15:50
- Zuletzt bearbeitet 12.05.2026 12:16:31
In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: fix RCU usage in connect path With lockdep enabled, calls to the connect function from cfg802.11 layer lead to the following warning: =============================...
CVE-2024-27054
- EPSS 0.01%
- Veröffentlicht 01.05.2024 13:15:50
- Zuletzt bearbeitet 02.05.2025 07:15:52
In the Linux kernel, the following vulnerability has been resolved: s390/dasd: fix double module refcount decrement Once the discipline is associated with the device, deleting the device takes care of decrementing the module's refcount. Doing it m...
CVE-2024-27058
- EPSS 0.05%
- Veröffentlicht 01.05.2024 13:15:50
- Zuletzt bearbeitet 08.04.2025 19:42:55
In the Linux kernel, the following vulnerability has been resolved: tmpfs: fix race on handling dquot rbtree A syzkaller reproducer found a race while attempting to remove dquot information from the rb tree. Fetching the rb_tree root node must als...
CVE-2024-27063
- EPSS 0.02%
- Veröffentlicht 01.05.2024 13:15:50
- Zuletzt bearbeitet 18.09.2025 15:48:53
In the Linux kernel, the following vulnerability has been resolved: leds: trigger: netdev: Fix kernel panic on interface rename trig notify Commit d5e01266e7f5 ("leds: trigger: netdev: add additional specific link speed mode") in the various change...
CVE-2024-27064
- EPSS 0.02%
- Veröffentlicht 01.05.2024 13:15:50
- Zuletzt bearbeitet 23.12.2024 14:17:03
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix a memory leak in nf_tables_updchain If nft_netdev_register_hooks() fails, the memory associated with nft_stats is not freed, causing a memory leak. This ...