CVE-2024-40902
- EPSS 0.01%
- Veröffentlicht 12.07.2024 13:15:13
- Zuletzt bearbeitet 03.11.2025 22:17:11
In the Linux kernel, the following vulnerability has been resolved: jfs: xattr: fix buffer overflow for invalid xattr When an xattr size is not what is expected, it is printed out to the kernel log in hex format as a form of debugging. But when th...
CVE-2024-40904
- EPSS 0.01%
- Veröffentlicht 12.07.2024 13:15:13
- Zuletzt bearbeitet 03.11.2025 22:17:12
In the Linux kernel, the following vulnerability has been resolved: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages The syzbot fuzzer found that the interrupt-URB completion callback in the cdc-wdm driver was taking too long, a...
CVE-2024-40905
- EPSS 0.01%
- Veröffentlicht 12.07.2024 13:15:13
- Zuletzt bearbeitet 12.05.2026 12:16:59
In the Linux kernel, the following vulnerability has been resolved: ipv6: fix possible race in __fib6_drop_pcpu_from() syzbot found a race in __fib6_drop_pcpu_from() [1] If compiler reads more than once (*ppcpu_rt), second read could read NULL, if...
CVE-2024-39494
- EPSS 0.01%
- Veröffentlicht 12.07.2024 13:15:12
- Zuletzt bearbeitet 06.01.2026 15:06:55
In the Linux kernel, the following vulnerability has been resolved: ima: Fix use-after-free on a dentry's dname.name ->d_name.name can change on rename and the earlier value can be freed; there are conditions sufficient to stabilize it (->d_lock on...
CVE-2024-39495
- EPSS 0.02%
- Veröffentlicht 12.07.2024 13:15:12
- Zuletzt bearbeitet 03.11.2025 22:17:04
In the Linux kernel, the following vulnerability has been resolved: greybus: Fix use-after-free bug in gb_interface_release due to race condition. In gb_interface_create, &intf->mode_switch_completion is bound with gb_interface_mode_switch_work. Th...
CVE-2024-39499
- EPSS 0.01%
- Veröffentlicht 12.07.2024 13:15:12
- Zuletzt bearbeitet 03.11.2025 22:17:05
In the Linux kernel, the following vulnerability has been resolved: vmci: prevent speculation leaks by sanitizing event in event_deliver() Coverity spotted that event_msg is controlled by user-space, event_msg->event_data.event is passed to event_d...
- EPSS 0.2%
- Veröffentlicht 12.07.2024 13:15:12
- Zuletzt bearbeitet 10.05.2025 15:15:58
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-39502
- EPSS 0.01%
- Veröffentlicht 12.07.2024 13:15:12
- Zuletzt bearbeitet 12.05.2026 12:16:57
In the Linux kernel, the following vulnerability has been resolved: ionic: fix use after netif_napi_del() When queues are started, netif_napi_add() and napi_enable() are called. If there are 4 queues and only 3 queues are used for the current confi...
- EPSS 0.01%
- Veröffentlicht 12.07.2024 13:15:12
- Zuletzt bearbeitet 12.05.2026 12:16:57
In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type Lion Ackermann reported that there is a race condition between namespace cleanup in ipset and the g...
CVE-2024-39505
- EPSS 0.02%
- Veröffentlicht 12.07.2024 13:15:12
- Zuletzt bearbeitet 03.11.2025 22:17:06
In the Linux kernel, the following vulnerability has been resolved: drm/komeda: check for error-valued pointer komeda_pipeline_get_state() may return an error-valued pointer, thus check the pointer for negative or null value before dereferencing.