CVE-2024-4060
- EPSS 0.15%
- Veröffentlicht 01.05.2024 13:15:52
- Zuletzt bearbeitet 04.11.2025 18:16:42
Use after free in Dawn in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-4331
- EPSS 0.95%
- Veröffentlicht 01.05.2024 13:15:52
- Zuletzt bearbeitet 20.12.2024 17:22:46
Use after free in Picture In Picture in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-4368
- EPSS 0.33%
- Veröffentlicht 01.05.2024 13:15:52
- Zuletzt bearbeitet 13.03.2025 20:15:23
Use after free in Dawn in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-27014
- EPSS 0.01%
- Veröffentlicht 01.05.2024 06:15:20
- Zuletzt bearbeitet 04.11.2025 18:16:11
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Prevent deadlock while disabling aRFS When disabling aRFS under the `priv->state_lock`, any scheduled aRFS works are canceled using the `cancel_work_sync` function, whic...
CVE-2024-27015
- EPSS 0.01%
- Veröffentlicht 01.05.2024 06:15:20
- Zuletzt bearbeitet 04.11.2025 18:16:11
In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: incorrect pppoe tuple pppoe traffic reaching ingress path does not match the flowtable entry because the pppoe header is expected to be at the network header ...
CVE-2024-27016
- EPSS 0.01%
- Veröffentlicht 01.05.2024 06:15:20
- Zuletzt bearbeitet 04.11.2025 18:16:11
In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: validate pppoe header Ensure there is sufficient room to access the protocol field of the PPPoe header. Validate it once before the flowtable lookup, then use...
CVE-2024-27017
- EPSS 0.01%
- Veröffentlicht 01.05.2024 06:15:20
- Zuletzt bearbeitet 04.11.2025 18:16:11
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: walk over current view on netlink dump The generation mask can be updated while netlink dump is in progress. The pipapo set backend walk iterator cannot ...
CVE-2024-27018
- EPSS 0.01%
- Veröffentlicht 01.05.2024 06:15:20
- Zuletzt bearbeitet 04.11.2025 18:16:11
In the Linux kernel, the following vulnerability has been resolved: netfilter: br_netfilter: skip conntrack input hook for promisc packets For historical reasons, when bridge device is in promisc mode, packets that are directed to the taps follow b...
CVE-2024-27019
- EPSS 0.01%
- Veröffentlicht 01.05.2024 06:15:20
- Zuletzt bearbeitet 04.11.2025 18:16:11
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() nft_unregister_obj() can concurrent with __nft_obj_type_get(), and there is not any protection when iterate ov...
CVE-2024-27021
- EPSS 0.01%
- Veröffentlicht 01.05.2024 06:15:20
- Zuletzt bearbeitet 04.11.2025 18:16:12
In the Linux kernel, the following vulnerability has been resolved: r8169: fix LED-related deadlock on module removal Binding devm_led_classdev_register() to the netdev is problematic because on module removal we get a RTNL-related deadlock. Fix th...