CVE-2024-46840
- EPSS 0.01%
- Veröffentlicht 27.09.2024 13:15:16
- Zuletzt bearbeitet 03.11.2025 23:16:07
In the Linux kernel, the following vulnerability has been resolved: btrfs: clean up our handling of refs == 0 in snapshot delete In reada we BUG_ON(refs == 0), which could be unkind since we aren't holding a lock on the extent leaf and thus could g...
CVE-2024-46844
- EPSS 0.01%
- Veröffentlicht 27.09.2024 13:15:16
- Zuletzt bearbeitet 03.11.2025 23:16:07
In the Linux kernel, the following vulnerability has been resolved: um: line: always fill *error_out in setup_one_line() The pointer isn't initialized by callers, but I have encountered cases where it's still printed; initialize it in all possible ...
CVE-2024-46849
- EPSS 0.02%
- Veröffentlicht 27.09.2024 13:15:16
- Zuletzt bearbeitet 05.05.2026 15:21:02
In the Linux kernel, the following vulnerability has been resolved: ASoC: meson: axg-card: fix 'use-after-free' Buffer 'card->dai_link' is reallocated in 'meson_card_reallocate_links()', so move 'pad' pointer initialization after this function when...
CVE-2024-46853
- EPSS 0.03%
- Veröffentlicht 27.09.2024 13:15:16
- Zuletzt bearbeitet 05.05.2026 15:04:53
In the Linux kernel, the following vulnerability has been resolved: spi: nxp-fspi: fix the KASAN report out-of-bounds bug Change the memcpy length to fix the out-of-bounds issue when writing the data that is not 4 byte aligned to TX FIFO. To repro...
CVE-2024-46826
- EPSS 0.01%
- Veröffentlicht 27.09.2024 13:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:05
In the Linux kernel, the following vulnerability has been resolved: ELF: fix kernel.randomize_va_space double read ELF loader uses "randomize_va_space" twice. It is sysctl and can change at any moment, so 2 loads could see 2 different values in the...
CVE-2024-46828
- EPSS 0.01%
- Veröffentlicht 27.09.2024 13:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:05
In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: fix bulk flow accounting logic for host fairness In sch_cake, we keep track of the count of active bulk flows per host, when running in dst/src host fairness mode,...
CVE-2024-46829
- EPSS 0.01%
- Veröffentlicht 27.09.2024 13:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:05
In the Linux kernel, the following vulnerability has been resolved: rtmutex: Drop rt_mutex::wait_lock before scheduling rt_mutex_handle_deadlock() is called with rt_mutex::wait_lock held. In the good case it returns with the lock held and in the d...
CVE-2024-46815
- EPSS 0.01%
- Veröffentlicht 27.09.2024 13:15:14
- Zuletzt bearbeitet 03.11.2025 23:16:04
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] [WHY & HOW] num_valid_sets needs to be checked to avoid a negative index when accessing reader_wm_sets[num_v...
CVE-2024-46817
- EPSS 0.01%
- Veröffentlicht 27.09.2024 13:15:14
- Zuletzt bearbeitet 03.11.2025 23:16:04
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 [Why] Coverity reports OVERRUN warning. Should abort amdgpu_dm initialize. [How] Return failure to amdgp...
CVE-2024-46818
- EPSS 0.01%
- Veröffentlicht 27.09.2024 13:15:14
- Zuletzt bearbeitet 03.11.2025 23:16:04
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check gpio_id before used as array index [WHY & HOW] GPIO_ID_UNKNOWN (-1) is not a valid value for array index and therefore should be checked in advance. This fi...