INFSA-2025:6966: kernel security update
Information about definition
Identificator: INFSA-2025:6966
Type: security
Release date: 2025-07-31 16:13:14 UTC
Information about package
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Vulnerabilities description
- CVE-2024-43871
In the Linux kernel, the following vulnerability has been resolved: devres: Fix memory leakage caused by driver API devm_free_percpu().
- CVE-2024-42265
In the Linux kernel, the following vulnerability has been resolved: protect the fetch of ->fd[fd] in do_dup2() from mispredictions.
- CVE-2024-38541
A buffer overflow flaw was found in of_modalias() in the Linux kernel, occurring after the first snprintf() call. This issue could result in loss of availability of the system.
- CVE-2024-43889
A denial of service vulnerability exists in the Linux kernel. A possible divide-by-0 is in the padata_mt_helper() function when the ps->chunk_size is 0. This vulnerability could result in a loss of system availability.
- CVE-2024-44989
In the Linux kernel, the following vulnerability has been resolved: bonding: fix xfrm real_dev null pointer dereference.
- CVE-2024-50256
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6().
- CVE-2022-48969
In the Linux kernel, the following vulnerability has been resolved: xen-netfront: Fix NULL sring after live migration.
- CVE-2022-48989
In the Linux kernel, the following vulnerability has been resolved: fscache: Fix oops due to race with cookie_lru and use_cookie.
- CVE-2022-49006
In the Linux kernel, the following vulnerability has been resolved: tracing: Free buffers when a used dynamic event is removed.
- CVE-2022-49014
In the Linux kernel, the following vulnerability has been resolved: net: tun: Fix use-after-free in tun_detach().
- CVE-2022-49029
In the Linux kernel, the following vulnerability has been resolved: hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails.
- CVE-2023-52672
In the Linux kernel, the following vulnerability has been resolved: pipe: wakeup wr_wait after setting max_usage.
- CVE-2023-52917
In the Linux kernel, the following vulnerability has been resolved: ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir().
- CVE-2024-27008
In the Linux kernel, the following vulnerability has been resolved: drm: nv04: Fix out of bounds access.
- CVE-2024-27398
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout.
- CVE-2024-35891
In the Linux kernel, the following vulnerability has been resolved: net: phy: micrel: Fix potential null pointer dereference.
- CVE-2024-35933
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btintel: Fix null ptr deref in btintel_read_version.
- CVE-2024-35934
Linux Kernel is vulnerable to a denial of service, caused by a flaw related to rtnl pressure in smc_pnet_create_pnetids_list(). By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.
- CVE-2024-35963
Linux Kernel is vulnerable to a denial of service, caused by improper validation of setsockopt user input. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.
- CVE-2024-35964
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Fix not validating setsockopt user input Check user input length before copying data.
- CVE-2024-35965
- CVE-2024-35966
Linux Kernel is vulnerable to a denial of service, caused by not validating setsockopt user input by the Bluetooth: RFCOMM module. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.
- CVE-2024-35967
This CVE pertains to a vulnerability in the Linux kernel's Bluetooth subsystem, specifically within the SCO (Synchronous Connection-Oriented) protocol. The issue arises from the sco_sock_setsockopt() function, which copies data without properly validating the length of user input. This oversight can lead to a slab-out-of-bounds read, potentially causing system instability or crashes.
- CVE-2024-35978
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix memory leak in hci_req_sync_complete().
- CVE-2024-36011
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: HCI: Fix potential null-ptr-deref.
- CVE-2024-36012
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: msft: fix slab-use-after-free in msft_do_close().
- CVE-2024-36013
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect().
- CVE-2024-36880
Linux Kernel is vulnerable to a denial of service, caused by missing firmware sanity checks. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service.
- CVE-2024-36968
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init().
- CVE-2024-39500
In the Linux kernel, the following vulnerability has been resolved: sock_map: avoid race between sock_map_close and sk_psock_put.
- CVE-2024-40956
In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list.
- CVE-2024-41010
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix too early release of tcx_entry.
- CVE-2024-41062
In the Linux kernel, the following vulnerability has been resolved: bluetooth/l2cap: sync sock recv cb and release.
- CVE-2024-42133
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Ignore too large handle values in BIG.
- CVE-2024-42253
In the Linux kernel, the following vulnerability has been resolved: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race.
- CVE-2024-42278
In the Linux kernel, the following vulnerability has been resolved: ASoC: TAS2781: Fix tasdev_load_calibrated_data().
- CVE-2024-42291
Linux Kernel is vulnerable to a denial of service, caused by a resource exhaustion in ice/ice_ethtool_fdir.c. By sending a specially crafted request, a local attacker could exploit this vulnerability to cause a denial of service.
- CVE-2024-42294
In the Linux kernel, the following vulnerability has been resolved: block: fix deadlock between sd_remove & sd_release.
- CVE-2024-42302
In the Linux kernel, the following vulnerability has been resolved: PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal.
- CVE-2024-42304
Linux Kernel is vulnerable to a denial of service, caused by a flaw related to the first directory block is a hole. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.
- CVE-2024-42305
Linux Kernel is vulnerable to a denial of service, caused by not checking dot and dotdot of dx_root before making dir indexed. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.
- CVE-2024-42312
Linux Kernel is vulnerable to a denial of service, caused by improper initialization in i_uid/i_gid. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.
- CVE-2024-42315
In the Linux kernel, the following vulnerability has been resolved: exfat: fix potential deadlock on __exfat_get_dentry_set.
- CVE-2024-42316
In the Linux kernel, the following vulnerability has been resolved: mm/mglru: fix div-by-zero in vmpressure_calc_level().
- CVE-2024-42321
Linux Kernel is vulnerable to a denial of service, caused by a flaw in flow_dissector.c. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service.
- CVE-2024-43820
Linux Kernel is vulnerable to a denial of service, caused by a flaw in dm-raid.c. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service.
- CVE-2024-43821
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix a possible null pointer dereference.
- CVE-2024-43823
In the Linux kernel, the following vulnerability has been resolved: PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs().
- CVE-2024-43828
In the Linux kernel, the following vulnerability has been resolved: ext4: fix infinite loop when replaying fast_commit.
- CVE-2024-43834
In the Linux kernel, the following vulnerability has been resolved: xdp: fix invalid wait context of page_pool_destroy().
- CVE-2024-43846
In the Linux kernel, the following vulnerability has been resolved: lib: objagg: Fix general protection fault.
- CVE-2024-43853
In the Linux kernel, the following vulnerability has been resolved: cgroup/cpuset: Prevent UAF in proc_cpuset_show().
- CVE-2024-43873
In the Linux kernel, the following vulnerability has been resolved: vhost/vsock: always initialize seqpacket_allow.
- CVE-2024-43882
In the Linux kernel, the following vulnerability has been resolved: exec: Fix ToCToU between perm check and set-uid/gid usage.
- CVE-2024-43884
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Add error handling to pair_device().
- CVE-2024-43898
Linux Kernel is vulnerable to a denial of service, caused by a Null pointer dereference in ext4_force_shutdown of 'ext4: sanity'. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.
- CVE-2024-43910
In the Linux kernel, the following vulnerability has been resolved: bpf: add missing check_func_arg_reg_off() to prevent out-of-bounds memory accesses.
- CVE-2024-43914
In the Linux kernel, the following vulnerability has been resolved: md/raid5: avoid BUG_ON() while continue reshape after reassembling.
- CVE-2024-44931
In the Linux kernel, the following vulnerability has been resolved: gpio: prevent potential speculation leaks in gpio_device_get_desc().
- CVE-2024-44932
In the Linux kernel, the following vulnerability has been resolved: idpf: fix UAFs when destroying the queues.
- CVE-2024-44934
In the Linux kernel, the following vulnerability has been resolved: net: bridge: mcast: wait for previous gc cycles when removing port.
- CVE-2024-44952
A vulnerability in the Linux kernel's driver core related to uevent_show() and driver detach has been identified. The issue involved a race condition where uevent_show() attempted to dereference dev->driver->name, leading to a potential deadlock due to improper locking. While this could cause system instability, an attacker would need the ability to manipulate device attributes and timing precisely, making exploitation impractical.
- CVE-2024-44958
In the Linux kernel, the following vulnerability has been resolved: sched/smt: Fix unbalance sched_smt_present dec/inc.
- CVE-2024-44964
In the Linux kernel, the following vulnerability has been resolved: idpf: fix memory leaks and crashes while performing a soft reset.
- CVE-2024-44975
In the Linux kernel, the following vulnerability has been resolved: cgroup/cpuset: fix panic caused by partcmd_update.
- CVE-2024-44987
In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent UAF in ip6_send_skb().
- CVE-2024-45000
In the Linux kernel, the following vulnerability has been resolved: fs/netfs/fscache_cookie: add missing "n_accesses" check.
- CVE-2024-45009
In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: only decrement add_addr_accepted for MPJ req.
- CVE-2024-45010
In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: only mark 'subflow' endp as available.
- CVE-2024-45016
In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails.
- CVE-2024-45022
In the Linux kernel, the following vulnerability has been resolved: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0.
- CVE-2024-46673
In the Linux kernel, the following vulnerability has been resolved: scsi: aacraid: Fix double-free on probe failure.
- CVE-2024-46675
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: core: Prevent USB core invalid event buffer address access.
- CVE-2024-46711
In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: fix ID 0 endp usage after multiple re-creations.
- CVE-2024-46722
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix mc_data out-of-bounds read warning.
- CVE-2024-46723
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix ucode out-of-bounds read warning.
- CVE-2024-46724
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number.
- CVE-2024-46725
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix out-of-bounds write warning.
- CVE-2024-46743
In the Linux kernel, the following vulnerability has been resolved: of/irq: Prevent device address out-of-bounds read in interrupt map walk.
- CVE-2024-46745
In the Linux kernel, the following vulnerability has been resolved: Input: uinput - reject requests with unreasonable number of slots.
- CVE-2024-46747
In the Linux kernel, the following vulnerability has been resolved: HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup.
- CVE-2024-46750
In the Linux kernel, the following vulnerability has been resolved: PCI: Add missing bridge lock to pci_bus_lock().
- CVE-2024-46754
In the Linux kernel, the following vulnerability has been resolved: bpf: Remove tst_run from lwt_seg6local_prog_ops.
- CVE-2024-46756
A vulnerability in the Linux kernel's hwmon subsystem (w83627ehf driver) has been identified, where writing large negative values (e.g., -9223372036854775808) to limit attributes caused an underflow due to improper ordering of operations in DIV_ROUND_CLOSEST(). An attacker with write access to these attributes could potentially trigger unexpected behavior or system instability.
- CVE-2024-46758
A buffer underrun vulnerability was found in the Linux kernel. DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large negative number, such as -9223372036854775808, is provided by the user, resulting in loss of availability of the system.
- CVE-2024-46759
In the Linux kernel, the following vulnerability has been resolved: hwmon: (adc128d818) Fix underflows seen when writing limit attributes.
- CVE-2024-46761
In the Linux kernel, the following vulnerability has been resolved: pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv.
- CVE-2024-46783
In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: fix return value of tcp_bpf_sendmsg().
- CVE-2024-46786
In the Linux kernel, the following vulnerability has been resolved: fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF.
- CVE-2024-46787
In the Linux kernel, the following vulnerability has been resolved: userfaultfd: fix checks for huge PMDs.
- CVE-2024-46800
In the Linux kernel, the following vulnerability has been resolved: sch/netem: fix use after free in netem_dequeue.
- CVE-2024-46805
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix the waring dereferencing hive.
- CVE-2024-46806
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix the warning division or modulo by zero.
- CVE-2024-46807
In the Linux kernel, the following vulnerability has been resolved: drm/amd/amdgpu: Check tbo resource pointer.
- CVE-2024-46819
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: the warning dereferencing obj for nbio_v7_4.
- CVE-2024-46820
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/vcn: remove irq disabling in vcn 5 suspend.
- CVE-2024-46822
In the Linux kernel, the following vulnerability has been resolved: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry.
- CVE-2024-46828
In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: fix bulk flow accounting logic for host fairness.
- CVE-2024-46835
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix smatch static checker warning.
- CVE-2024-46839
A performance issue in the Linux Kernel's workqueue subsystem can cause hard lockups on high-CPU systems during operations like CPU hotplugging. The issue arises from contention when multiple CPUs update the global wq_watchdog_touched variable, leading to degraded performance and lockups in workqueue management routines.
- CVE-2024-46853
In the Linux kernel, the following vulnerability has been resolved: spi: nxp-fspi: fix the KASAN report out-of-bounds bug.
- CVE-2024-46864
In the Linux kernel, the following vulnerability has been resolved: x86/hyperv: fix kexec crash due to VP assist page corruption.
- CVE-2024-46871
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX.
- CVE-2024-47141
In the Linux kernel, the following vulnerability has been resolved: pinmux: Use sequential access to access desc->pinmux data.
- CVE-2024-47660
In the Linux kernel, the following vulnerability has been resolved: fsnotify: clear PARENT_WATCHED flags lazily.
- CVE-2024-47668
In the Linux kernel, the following vulnerability has been resolved: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc().
- CVE-2024-47678
In the Linux kernel, the following vulnerability has been resolved: icmp: change the order of rate limits.
- CVE-2024-47685
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put().
- CVE-2024-47687
In the Linux kernel, the following vulnerability has been resolved: vdpa/mlx5: Fix invalid mr resource destroy.
- CVE-2024-47692
In the Linux kernel, the following vulnerability has been resolved: nfsd: return -EINVAL when namelen is 0.
- CVE-2024-47700
In the Linux kernel, the following vulnerability has been resolved: ext4: check stripe size compatibility on remount as well.
- CVE-2024-47703
In the Linux kernel, the following vulnerability has been resolved: bpf, lsm: Add check for BPF LSM return value.
- CVE-2024-47705
In the Linux kernel, the following vulnerability has been resolved: block: fix potential invalid pointer dereference in blk_add_partition.
- CVE-2024-47706
In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix possible UAF for bfqq->bic with merge chain.
- CVE-2024-47710
In the Linux kernel, the following vulnerability has been resolved: sock_map: Add a cond_resched() in sock_hash_free().
- CVE-2024-47713
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop().
- CVE-2024-47715
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7915: fix oops on non-dbdc mt7986.
- CVE-2024-47718
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: always wait for both firmware loading attempts.
- CVE-2024-47719
In the Linux kernel, the following vulnerability has been resolved: iommufd: Protect against overflow of ALIGN() during iova allocation.
- CVE-2024-47737
In the Linux kernel, the following vulnerability has been resolved: nfsd: call cache_put if xdr_reserve_space returns NULL.
- CVE-2024-47738
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't use rate mask for offchannel TX either.
- CVE-2024-47739
In the Linux kernel, the following vulnerability has been resolved: padata: use integer wrap around to prevent deadlock on seq_nr overflow.
- CVE-2024-47745
In the Linux kernel, the following vulnerability has been resolved: mm: call the security_mmap_file() LSM hook in remap_file_pages().
- CVE-2024-47748
In the Linux kernel, the following vulnerability has been resolved: vhost_vdpa: assign irq bypass producer token correctly.
- CVE-2024-48873
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: check return value of ieee80211_probereq_get() for RNR.
- CVE-2024-49569
Linux Kernel is vulnerable to a denial of service, caused by a flaw in nvme-rdma.
- CVE-2024-49851
In the Linux kernel, the following vulnerability has been resolved: tpm: Clean up TPM space after command failure.
- CVE-2024-49856
In the Linux kernel, the following vulnerability has been resolved: x86/sgx: Fix deadlock in SGX NUMA node search.
- CVE-2024-49860
In the Linux kernel, the following vulnerability has been resolved: ACPI: sysfs: validate return type of _STR method.
- CVE-2024-49862
In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi().
- CVE-2024-49870
In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix dentry leak in cachefiles_open_file().
- CVE-2024-49875
In the Linux kernel, the following vulnerability has been resolved: nfsd: map the EBADMSG to nfserr_io to avoid warning.
- CVE-2024-49878
In the Linux kernel, the following vulnerability has been resolved: resource: fix region_intersects() vs add_memory_driver_managed().
- CVE-2024-49881
In the Linux kernel, the following vulnerability has been resolved: ext4: update orig_path in ext4_find_extent().
- CVE-2024-49882
In the Linux kernel, the following vulnerability has been resolved: ext4: fix double brelse() the buffer of the extents path.
- CVE-2024-49883
In the Linux kernel, the following vulnerability has been resolved: ext4: aovid use-after-free in ext4_ext_insert_extent().
- CVE-2024-49884
In the Linux kernel, the following vulnerability has been resolved: ext4: fix slab-use-after-free in ext4_split_extent_at().
- CVE-2024-49885
In the Linux kernel, the following vulnerability has been resolved: mm, slub: avoid zeroing kmalloc redzone.
- CVE-2024-49886
In the Linux kernel, the following vulnerability has been resolved: platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug.
- CVE-2024-49889
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid use-after-free in ext4_ext_show_leaf().
- CVE-2024-49904
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add list empty check to avoid null pointer issue.
- CVE-2024-49927
In the Linux kernel, the following vulnerability has been resolved: x86/ioapic: Handle allocation failures gracefully.
- CVE-2024-49928
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: avoid reading out of bounds when loading TX power FW elements.
- CVE-2024-49929
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: avoid NULL pointer dereference.
- CVE-2024-49930
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix array out-of-bound access in SoC stats.
- CVE-2024-49933
In the Linux kernel, the following vulnerability has been resolved: blk_iocost: fix more out of bound shifts.
- CVE-2024-49934
In the Linux kernel, the following vulnerability has been resolved: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name.
- CVE-2024-49935
In the Linux kernel, the following vulnerability has been resolved: ACPI: PAD: fix crash in exit_round_robin().
- CVE-2024-49937
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Set correct chandef when starting CAC.
- CVE-2024-49938
In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit.
- CVE-2024-49939
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: avoid to add interface to list twice when SER.
- CVE-2024-49946
In the Linux kernel, the following vulnerability has been resolved: ppp: do not assume bh is held in ppp_channel_bridge_input().
- CVE-2024-49948
In the Linux kernel, the following vulnerability has been resolved: net: add more sanity checks to qdisc_pkt_len_init().
- CVE-2024-49950
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2cap_connect.
- CVE-2024-49951
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed.
- CVE-2024-49954
In the Linux kernel, the following vulnerability has been resolved: static_call: Replace pointless WARN_ON() in static_call_module_notify().
- CVE-2024-49959
In the Linux kernel, the following vulnerability has been resolved: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error.
- CVE-2024-49960
In the Linux kernel, the following vulnerability has been resolved: ext4: fix timer use-after-free on failed mount.
- CVE-2024-49962
In the Linux kernel, the following vulnerability has been resolved: ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package().
- CVE-2024-49967
In the Linux kernel, the following vulnerability has been resolved: ext4: no need to continue when the number of entries is 1.
- CVE-2024-49968
In the Linux kernel, the following vulnerability has been resolved: ext4: filesystems without casefold feature cannot be mounted with siphash.
- CVE-2024-49971
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Increase array size of dummy_boolean.
- CVE-2024-49973
In the Linux kernel, the following vulnerability has been resolved: r8169: add tally counter fields added with RTL8125.
- CVE-2024-49974
In the Linux kernel, the following vulnerability has been resolved: NFSD: Limit the number of concurrent async COPY operations.
- CVE-2024-49975
In the Linux kernel, the following vulnerability has been resolved: uprobes: fix kernel info leak via "[uprobes]" vma.
- CVE-2024-49977
In the Linux kernel, the following vulnerability has been resolved: net: stmmac: Fix zero-division error when disabling tc cbs.
- CVE-2024-49983
In the Linux kernel, the following vulnerability has been resolved: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free.
- CVE-2024-49991
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer.
- CVE-2024-49993
A vulnerability has been identified in the Linux kernel's IOMMU (iommu/vt-d) subsystem, where calling qi_submit_sync() with zero invalidation descriptors could lead to a soft lockup due to misinterpreted descriptor statuses. An attacker with control over IOMMU operations could potentially trigger a deadlock, causing system instability.
- CVE-2024-49994
In the Linux kernel, the following vulnerability has been resolved: block: fix integer overflow in BLKSECDISCARD.
- CVE-2024-49995
A string buffer over-run was found in the Linux kernel. Copying media_name and if_name to name_parts may overwrite the destination, resulting in a software crash.
- CVE-2024-49999
In the Linux kernel, the following vulnerability has been resolved: afs: Fix the setting of the server responding flag.
- CVE-2024-50002
In the Linux kernel, the following vulnerability has been resolved: static_call: Handle module init failure correctly in static_call_del_module().
- CVE-2024-50006
In the Linux kernel, the following vulnerability has been resolved: ext4: fix i_data_sem unlock order in ext4_ind_migrate().
- CVE-2024-50008
In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext().
- CVE-2024-50009
In the Linux kernel, the following vulnerability has been resolved: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value.
- CVE-2024-50013
In the Linux kernel, the following vulnerability has been resolved: exfat: fix memory leak in exfat_load_bitmap().
- CVE-2024-50014
In the Linux kernel, the following vulnerability has been resolved: ext4: fix access to uninitialised lock in fc replay path.
- CVE-2024-50015
In the Linux kernel, the following vulnerability has been resolved: ext4: dax: fix overflowing extents beyond inode size when partially writing.
- CVE-2024-50018
A vulnerability has been identified in the Linux kernel's networking (net: napi) subsystem, where an integer overflow in napi_defer_hard_irqs allowed writing values exceeding S32_MAX, causing unintended negative values. This could lead to unexpected behavior in NAPI IRQ deferral, potentially impacting network performance. An attacker with sysfs write access could exploit this to manipulate IRQ handling inconsistently.
- CVE-2024-50019
In the Linux kernel, the following vulnerability has been resolved: kthread: unpark only parked kthread.
- CVE-2024-50022
In the Linux kernel, the following vulnerability has been resolved: device-dax: correct pgoff align in dax_set_mapping().
- CVE-2024-50023
In the Linux kernel, the following vulnerability has been resolved: net: phy: Remove LED entry from LEDs list on unregister.
- CVE-2024-50024
In the Linux kernel, the following vulnerability has been resolved: net: Fix an unsafe loop on the list.
- CVE-2024-50027
In the Linux kernel, the following vulnerability has been resolved: thermal: core: Free tzp copy along with the thermal zone.
- CVE-2024-50028
In the Linux kernel, the following vulnerability has been resolved: thermal: core: Reference count the zone in thermal_zone_get_by_id().
- CVE-2024-50029
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync.
- CVE-2024-50033
In the Linux kernel, the following vulnerability has been resolved: slip: make slhc_remember() more robust against malicious packets.
- CVE-2024-50035
In the Linux kernel, the following vulnerability has been resolved: ppp: fix ppp_async_encode() illegal access.
- CVE-2024-50038
In the Linux kernel, the following vulnerability has been resolved: netfilter: xtables: avoid NFPROTO_UNSPEC where needed.
- CVE-2024-50039
In the Linux kernel, the following vulnerability has been resolved: net/sched: accept TCA_STAB only for root qdisc.
- CVE-2024-50044
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change.
- CVE-2024-50046
In the Linux kernel, the following vulnerability has been resolved: NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies().
- CVE-2024-50047
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix UAF in async decryption.
- CVE-2024-50055
In the Linux kernel, the following vulnerability has been resolved: driver core: bus: Fix double free in driver API bus_register().
- CVE-2024-50057
In the Linux kernel, the following vulnerability has been resolved: usb: typec: tipd: Free IRQ only if it was requested before.
- CVE-2024-50058
In the Linux kernel, the following vulnerability has been resolved: serial: protect uart_port_dtr_rts() in uart_shutdown() too.
- CVE-2024-50064
In the Linux kernel, the following vulnerability has been resolved: zram: free secondary algorithms names.
- CVE-2024-50067
In the Linux kernel, the following vulnerability has been resolved: uprobe: avoid out-of-bounds memory access of fetching args.
- CVE-2024-50073
In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux.
- CVE-2024-50074
In the Linux kernel, the following vulnerability has been resolved: parport: Proper fix for array out-of-bounds access.
- CVE-2024-50075
In the Linux kernel, the following vulnerability has been resolved: xhci: tegra: fix checked USB2 port number.
- CVE-2024-50077
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Fix multiple init when debugfs is disabled.
- CVE-2024-50078
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Call iso_exit() on module unload.
- CVE-2024-50081
In the Linux kernel, the following vulnerability has been resolved: blk-mq: setup queue ->tag_set before initializing hctx.
- CVE-2024-50082
In the Linux kernel, the following vulnerability has been resolved: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race.
- CVE-2024-50093
In the Linux kernel, the following vulnerability has been resolved: thermal: intel: int340x: processor: Fix warning during module unload.
- CVE-2024-50101
In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices.
- CVE-2024-50102
In the Linux kernel, the following vulnerability has been resolved: x86: fix user address masking non-canonical speculation issue.
- CVE-2024-50106
In the Linux kernel, the following vulnerability has been resolved: nfsd: fix race between laundromat and free_stateid.
- CVE-2024-50107
In the Linux kernel, the following vulnerability has been resolved: platform/x86/intel/pmc: Fix pmc_core_iounmap to call iounmap for valid addresses.
- CVE-2024-50109
In the Linux kernel, the following vulnerability has been resolved: md/raid10: fix null ptr dereference in raid10_size().
- CVE-2024-50117
In the Linux kernel, the following vulnerability has been resolved: drm/amd: Guard against bad data for ATIF ACPI method.
- CVE-2024-50120
In the Linux kernel, the following vulnerability has been resolved: smb: client: Handle kstrdup failures for passwords.
- CVE-2024-50121
In the Linux kernel, the following vulnerability has been resolved: nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net.
- CVE-2024-50126
In the Linux kernel, the following vulnerability has been resolved: net: sched: use RCU read-side critical section in taprio_dump().
- CVE-2024-50127
In the Linux kernel, the following vulnerability has been resolved: net: sched: fix use-after-free in taprio_change().
- CVE-2024-50128
In the Linux kernel, the following vulnerability has been resolved: net: wwan: fix global oob in wwan_rtnl_policy.
- CVE-2024-50130
In the Linux kernel, the following vulnerability has been resolved: netfilter: bpf: must hold reference on net namespace.
- CVE-2024-50141
In the Linux kernel, the following vulnerability has been resolved: ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context.
- CVE-2024-50143
In the Linux kernel, the following vulnerability has been resolved: udf: fix uninit-value use in udf_get_fileshortad.
- CVE-2024-50150
In the Linux kernel, the following vulnerability has been resolved: usb: typec: altmode should keep reference to parent.
- CVE-2024-50151
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix OOBs when building SMB2_IOCTL request.
- CVE-2024-50152
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix possible double free in smb2_set_ea().
- CVE-2024-50153
In the Linux kernel, the following vulnerability has been resolved: scsi: target: core: Fix null-ptr-deref in target_alloc_device().
- CVE-2024-50162
In the Linux kernel, the following vulnerability has been resolved: bpf: devmap: provide rxq after redirect.
- CVE-2024-50163
In the Linux kernel, the following vulnerability has been resolved: bpf: Make sure internal and UAPI bpf_redirect flags don't overlap.
- CVE-2024-50169
In the Linux kernel, the following vulnerability has been resolved: vsock: Update rx_bytes on read_skb().
- CVE-2024-50182
In the Linux kernel, the following vulnerability has been resolved: secretmem: disable memfd_secret() if arch cannot set direct map.
- CVE-2024-50186
In the Linux kernel, the following vulnerability has been resolved: net: explicitly clear the sk pointer, when pf->create fails.
- CVE-2024-50189
In the Linux kernel, the following vulnerability has been resolved: HID: amd_sfh: Switch to device-managed dmam_alloc_coherent().
- CVE-2024-50191
In the Linux kernel, the following vulnerability has been resolved: ext4: don't set SB_RDONLY after filesystem errors.
- CVE-2024-50197
In the Linux kernel, the following vulnerability has been resolved: pinctrl: intel: platform: fix error path in device_for_each_child_node().
- CVE-2024-50199
Linux Kernel is vulnerable to a denial of service, caused by a flaw in mm/swapfile. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service.
- CVE-2024-50200
Linux Kernel is vulnerable to a denial of service, caused by a flaw in maple_tree. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service.
- CVE-2024-50201
In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Fix encoder->possible_clones.
- CVE-2024-50215
In the Linux kernel, the following vulnerability has been resolved: nvmet-auth: assign dh_key to NULL after kfree_sensitive.
- CVE-2024-50216
In the Linux kernel, the following vulnerability has been resolved: xfs: fix finding a last resort AG in xfs_filestream_pick_ag.
- CVE-2024-50219
A vulnerability in the Linux kernel's memory management (mm/page_alloc) has been identified, where GFP_ATOMIC order-0 allocations could fail under memory pressure, despite available highatomic reserves. This issue caused packet loss in high-performance networking environments, as observed on Cloudflare's fleet. An attacker could theoretically exploit this by inducing high memory contention, potentially impacting real-time operations. However, since the fix ensures proper fallback behavior without introducing a security risk, the issue has been rejected as a CVE.
- CVE-2024-50228
A vulnerability was identified in the Linux kernel’s shmem subsystem, where a data race in shmem_getattr() could cause inconsistent inode timestamps due to concurrent access by generic_fillattr() and operations like shmem_unlink() or shmem_mknod(). This issue, detected by Kernel Concurrency Sanitizer (KCSAN), could lead to unexpected behavior when retrieving file attributes. An attacker could potentially exploit this by triggering rapid file operations to induce race conditions, causing unpredictable system responses.
- CVE-2024-50235
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: clear wdev->cqm_config pointer on free.
- CVE-2024-50236
In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: Fix memory leak in management tx.
- CVE-2024-50237
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower.
- CVE-2024-50261
In the Linux kernel, the following vulnerability has been resolved: macsec: Fix use-after-free while sending the offloading packet.
- CVE-2024-50271
In the Linux kernel, the following vulnerability has been resolved: signal: restore the override_rlimit logic.
- CVE-2024-50272
In the Linux kernel, the following vulnerability has been resolved: filemap: Fix bounds checking in filemap_read().
- CVE-2024-50278
In the Linux kernel, the following vulnerability has been resolved: dm cache: fix potential out-of-bounds access on the first resume.
- CVE-2024-50282
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read().
- CVE-2024-50299
In the Linux kernel, the following vulnerability has been resolved: sctp: properly validate chunk size in sctp_sf_ootb().
- CVE-2024-50304
In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find().
- CVE-2024-53042
In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow().
- CVE-2024-53044
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_api: fix xa_insert() error path in tcf_block_get_ext().
- CVE-2024-53047
In the Linux kernel, the following vulnerability has been resolved: mptcp: init: protect sched with rcu_read_lock.
- CVE-2024-53050
In the Linux kernel, the following vulnerability has been resolved: drm/i915/hdcp: Add encoder check in hdcp2_get_capability.
- CVE-2024-53051
In the Linux kernel, the following vulnerability has been resolved: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability.
- CVE-2024-53055
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix 6 GHz scan construction.
- CVE-2024-53057
In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT.
- CVE-2024-53059
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd().
- CVE-2024-53060
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported.
- CVE-2024-53070
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: fix fault at system suspend if device was already runtime suspended.
- CVE-2024-53072
In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd/pmc: Detect when STB is not available.
- CVE-2024-53074
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't leak a link on AP removal.
- CVE-2024-53082
In the Linux kernel, the following vulnerability has been resolved: virtio_net: Add hash_key_length check.
- CVE-2024-53085
In the Linux kernel, the following vulnerability has been resolved: tpm: Lock TPM chip in tpm_pm_suspend() first.
- CVE-2024-53091
In the Linux kernel, the following vulnerability has been resolved: bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx.
- CVE-2024-53093
In the Linux kernel, the following vulnerability has been resolved: nvme-multipath: defer partition scanning.
- CVE-2024-53095
In the Linux kernel, the following vulnerability has been resolved: smb: client: Fix use-after-free of network namespace.
- CVE-2024-53096
In the Linux kernel, the following vulnerability has been resolved: mm: resolve faulty mmap_region() error path behaviour.
- CVE-2024-53097
In the Linux kernel, the following vulnerability has been resolved: mm: krealloc: Fix MTE false alarm in __do_krealloc.
- CVE-2024-53103
In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer.
- CVE-2024-53105
In the Linux kernel, the following vulnerability has been resolved: mm: page_alloc: move mlocked flag clearance into free_pages_prepare().
- CVE-2024-53110
In the Linux kernel, the following vulnerability has been resolved: vp_vdpa: fix id_table array not null terminated error.
- CVE-2024-53117
In the Linux kernel, the following vulnerability has been resolved: virtio/vsock: Improve MSG_ZEROCOPY error handling.
- CVE-2024-53118
In the Linux kernel, the following vulnerability has been resolved: vsock: Fix sk_error_queue memory leak.
- CVE-2024-53120
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: CT: Fix null-ptr-deref in add rule err flow.
- CVE-2024-53121
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: fs, lock FTE when checking if active.
- CVE-2024-53123
In the Linux kernel, the following vulnerability has been resolved: mptcp: error out earlier on disconnect.
- CVE-2024-53124
In the Linux kernel, the following vulnerability has been resolved: net: fix data-races around sk->sk_forward_alloc.
- CVE-2024-53134
In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx93-blk-ctrl: correct remove path.
- CVE-2024-53136
In the Linux kernel, the following vulnerability has been resolved: mm: revert "mm: shmem: fix data-race in shmem_getattr()".
- CVE-2024-53142
In the Linux kernel, the following vulnerability has been resolved: initramfs: avoid filename buffer overrun.
- CVE-2024-53146
In the Linux kernel, the following vulnerability has been resolved: NFSD: Prevent a potential integer overflow.
- CVE-2024-53152
In the Linux kernel, the following vulnerability has been resolved: PCI: tegra194: Move controller cleanups to pex_ep_event_pex_rst_deassert().
- CVE-2024-53156
In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service().
- CVE-2024-53160
In the Linux kernel, the following vulnerability has been resolved: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu.
- CVE-2024-53161
In the Linux kernel, the following vulnerability has been resolved: EDAC/bluefield: Fix potential integer overflow.
- CVE-2024-53164
In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ordering of qlen adjustment.
- CVE-2024-53166
In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix bfqq uaf in bfq_limit_depth().
- CVE-2024-53173
In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open().
- CVE-2024-53174
In the Linux kernel, the following vulnerability has been resolved: SUNRPC: make sure cache entry active before cache_show.
- CVE-2024-53190
A deadlock condition exists in the Linux kernel. During the probe of rtl8192cu, the driver ends-up performing an refuse read procedure and the read_efuse() function calls read_efuse_byte() based on the efuse size.
- CVE-2024-53194
In the Linux kernel, the following vulnerability has been resolved: PCI: Fix use-after-free of slot->bus on hot remove.
- CVE-2024-53203
In the Linux kernel, the following vulnerability has been resolved: usb: typec: fix potential array underflow in ucsi_ccg_sync_control().
- CVE-2024-53208
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync.
- CVE-2024-53213
In the Linux kernel, the following vulnerability has been resolved: net: usb: lan78xx: Fix double free issue with interrupt buffer allocation.
- CVE-2024-53222
In the Linux kernel, the following vulnerability has been resolved: zram: fix NULL pointer in comp_algorithm_show().
- CVE-2024-53224
In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Move events notifier registration to be after device registration.
- CVE-2024-53237
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: fix use-after-free in device_for_each_child().
- CVE-2024-53681
In the Linux kernel, the following vulnerability has been resolved: nvmet: Don't overflow subsysnqn.
- CVE-2024-54460
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: iso: Fix circular lock in iso_listen_bis.
- CVE-2024-54680
A vulnerability was suspected in the Linux kernel's SMB client module related to TCP timers and potential deadlocks after module removal (rmmod cifs). The issue stemmed from incorrect manual manipulation of sk->sk_net_refcnt, which led to TCP timers not being properly cleared, causing lockdep warnings and deadlocks. However, this was an internal kernel misconfiguration affecting cleanup behavior rather than a security flaw exploitable by an attacker. Since no privilege escalation or data exposure was possible, this does not qualify as a security vulnerability.
- CVE-2024-56535
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: coex: check NULL return of kmalloc in btc_fw_set_monreg().
- CVE-2024-56544
In the Linux kernel, the following vulnerability has been resolved: udmabuf: change folios array from kmalloc to kvmalloc.
- CVE-2024-56551
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix usage slab after free.
- CVE-2024-56558
In the Linux kernel, the following vulnerability has been resolved: nfsd: make sure exp active before svc_export_show.
- CVE-2024-56562
A vulnerability was found in the i3c_master_put_i3c_addrs() function in the Linux kernel's i3c driver. A memory management issue can occur due to a copy-paste error between "dyn_addr" and "init_dyn_addr", which leads to incorrect handling of memory, potentially causing resource mismanagement and instability within the system.
- CVE-2024-56566
A use-after-free list corruption vulnerability was found in the Linux kernel. If an allocated object fails in alloc_consistency_checks, all objects of the slab will be marked as used and the slab will be removed from the partial list. When an object belonging to the slab gets freed later, the remove_full() function is called. Since the slab is neither on the partial list nor on the full list, it eventually leads to a list corruption.
- CVE-2024-56570
In the Linux kernel, the following vulnerability has been resolved: ovl: Filter invalid inodes with missing lookup function.
- CVE-2024-56590
A use-after-free vulnerability was found in the Linux kernel. The Bluetooth firmware isn't checked if skb contains an ACL header, otherwise the code may attempt to access some uninitialized or invalid memory past the valid skb->data.
- CVE-2024-56591
A flaw was found in the Bluetooth subsystem of the Linux kernel, in the handling of delayed work within the hci_conn (Host Controller Interface connection) structure. The kernel used cancel_delayed_work_sync() when shutting down a connection, which cancels ongoing work but allows rescheduling. This could result in use-after-free conditions if the work is resubmitted after the associated object has been freed. Replacing it with disable_delayed_work_sync() prevents further scheduling, ensuring proper cleanup. A local attacker could potentially exploit this to trigger a use-after-free, leading to a denial of service or possible code execution.
- CVE-2024-56600
In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create().
- CVE-2024-56601
In the Linux kernel, the following vulnerability has been resolved: net: inet: do not leave a dangling sk pointer in inet_create().
- CVE-2024-56602
In the Linux kernel, the following vulnerability has been resolved: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create().
- CVE-2024-56604
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc().
- CVE-2024-56605
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create().
- CVE-2024-56611
In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM.
- CVE-2024-56614
In the Linux kernel, the following vulnerability has been resolved: xsk: fix OOB map writes when deleting elements.
- CVE-2024-56616
In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Fix MST sideband message body length check.
- CVE-2024-56623
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix use after free on unload.
- CVE-2024-56631
In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Fix slab-use-after-free read in sg_release().
- CVE-2024-56642
In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE-2024-56644
Linux Kernel is vulnerable to a denial of service, caused by a dst objects leak in ip6_negative_advice() when executed for an expired IPv6 route located in the exception table.
- CVE-2024-56647
In the Linux kernel, the following vulnerability has been resolved: net: Fix icmp host relookup triggering ip_rt_bug.
- CVE-2024-56653
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btmtk: avoid UAF in btmtk_process_coredump.
- CVE-2024-56654
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating.
- CVE-2024-56663
In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one.
- CVE-2024-56664
In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix race between element replace and close().
- CVE-2024-56667
In the Linux kernel, the following vulnerability has been resolved: drm/i915: Fix NULL pointer dereference in capture_engine.
- CVE-2024-56688
In the Linux kernel, the following vulnerability has been resolved: sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport.
- CVE-2024-56693
In the Linux kernel, the following vulnerability has been resolved: brd: defer automatic disk creation until module initialization succeeds.
- CVE-2024-56729
In the Linux kernel, the following vulnerability has been resolved: smb: Initialize cfid->tcon before performing network ops.
- CVE-2024-56757
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: mediatek: add intf release flow when usb disconnect.
- CVE-2024-56760
In the Linux kernel, the following vulnerability has been resolved: PCI/MSI: Handle lack of irqdomain gracefully.
- CVE-2024-56779
In the Linux kernel, the following vulnerability has been resolved: nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur.
- CVE-2024-56783
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_socket: remove WARN_ON_ONCE on maximum cgroup level.
- CVE-2024-57798
In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req().
- CVE-2024-57809
A flaw was found in the PCI-imx6 module in the Linux kernel. The suspend/resume support is missing in the i.MX6QDL platforms, allowing certain drivers, such as ath10k and iwlwifi, to crash after resuming, causing a kernel hang and a denial of service.
- CVE-2024-57843
In the Linux kernel, the following vulnerability has been resolved: virtio-net: fix overflow inside virtnet_rq_alloc.
- CVE-2024-57879
Linux Kernel is vulnerable to a denial of service, caused by a flaw related to hci_get_route holds the device before returning in Bluetooth.
- CVE-2024-57884
In the Linux kernel, the following vulnerability has been resolved: mm: vmscan: account for free pages to prevent infinite.
- CVE-2024-57888
In the Linux kernel, the following vulnerability has been resolved: workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker.
- CVE-2024-57890
In the Linux kernel, the following vulnerability has been resolved: RDMA/uverbs: Prevent integer overflow issue.
- CVE-2024-57894
A vulnerability was identified in the Linux kernel's Bluetooth: hci_core package, where a sleeping function (mutex_lock) was improperly invoked from an invalid context within the HCI event handling workqueue, potentially leading to kernel warnings or deadlocks. An attacker exploiting this flaw could trigger crafted Bluetooth events or malformed packets to indirectly cause system instability or denial of service through workqueue execution paths.
- CVE-2024-57898
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: clear link ID from bitmap during link delete after clean up.
- CVE-2024-57929
In the Linux kernel, the following vulnerability has been resolved: dm array: fix releasing a faulty array block twice in dm_array_cursor_end.
- CVE-2024-57931
In the Linux kernel, the following vulnerability has been resolved: selinux: ignore unknown extended permissions.
- CVE-2024-57940
In the Linux kernel, the following vulnerability has been resolved: exfat: fix the infinite loop in exfat_readdir().
- CVE-2024-58009
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc.
- CVE-2024-58064
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: tests: Fix potential NULL dereference in test_cfg80211_parse_colocated_ap().
- CVE-2024-58099
In the Linux kernel, the following vulnerability has been resolved: vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame.
- CVE-2025-1272
The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. Additionally unsigned modules can be loaded, leading to execution of untrusted code breaking breaking any Secure Boot protection. This vulnerability affects only Fedora Linux.
- CVE-2025-21646
In the Linux kernel, the following vulnerability has been resolved: afs: Fix the maximum cell name length.
- CVE-2025-21663
In the Linux kernel, the following vulnerability has been resolved: net: stmmac: dwmac-tegra: Read iommu stream id from device tree.
- CVE-2025-21666
In the Linux kernel, the following vulnerability has been resolved: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space].
- CVE-2025-21668
In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8mp-blk-ctrl: add missing loop break condition.
- CVE-2025-21669
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: discard packets if the transport changes.
- CVE-2025-21689
In the Linux kernel, the following vulnerability has been resolved: USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb().
- CVE-2025-21694
In the Linux kernel, the following vulnerability has been resolved: fs/proc: fix softlockup in __read_vmcore.
Severity level
CVE | Score CVSS 2.0 | Score CVSS 3.x | Score CVSS 4.0 |
---|---|---|---|
NIST — CVE-2022-48969
|
no information | 5.5 | no information |
NIST — CVE-2022-48989
|
no information | 4.7 | no information |
NIST — CVE-2022-49006
|
no information | 6.7 | no information |
NIST — CVE-2022-49014
|
no information | 6.7 | no information |
NIST — CVE-2022-49029
|
no information | 6.7 | no information |
NIST — CVE-2023-52672
|
no information | 5.5 | no information |
NIST — CVE-2023-52917
|
no information | 4.4 | no information |
NIST — CVE-2024-27008
|
no information | 5.5 | no information |
NIST — CVE-2024-27398
|
no information | 5.5 | no information |
NIST — CVE-2024-35891
|
no information | 5.5 | no information |
NIST — CVE-2024-35933
|
no information | 5.5 | no information |
NIST — CVE-2024-35934
|
no information | 5.5 | no information |
NIST — CVE-2024-35963
|
no information | 5.5 | no information |
NIST — CVE-2024-35964
|
no information | 5.5 | no information |
NIST — CVE-2024-35965
|
no information | 5.5 | no information |
NIST — CVE-2024-35966
|
no information | 5.5 | no information |
NIST — CVE-2024-35967
|
no information | 5.5 | no information |
NIST — CVE-2024-35978
|
no information | 5.5 | no information |
NIST — CVE-2024-36011
|
no information | 5.7 | no information |
NIST — CVE-2024-36012
|
no information | 4.7 | no information |
NIST — CVE-2024-36013
|
no information | 7.1 | no information |
NIST — CVE-2024-36880
|
no information | 4.8 | no information |
NIST — CVE-2024-36968
|
no information | 5.5 | no information |
NIST — CVE-2024-38541
|
no information | 4.4 | no information |
NIST — CVE-2024-39500
|
no information | 5.5 | no information |
NIST — CVE-2024-40956
|
no information | 7.8 | no information |
NIST — CVE-2024-41010
|
no information | 5.5 | no information |
NIST — CVE-2024-41062
|
no information | 5.5 | no information |
NIST — CVE-2024-42133
|
no information | 5.2 | no information |
NIST — CVE-2024-42253
|
no information | 4.4 | no information |
NIST — CVE-2024-42265
|
no information | 5.5 | no information |
NIST — CVE-2024-42278
|
no information | 5.5 | no information |
NIST — CVE-2024-42291
|
no information | 4.4 | no information |
NIST — CVE-2024-42294
|
no information | 5.5 | no information |
NIST — CVE-2024-42302
|
no information | 7.1 | no information |
NIST — CVE-2024-42304
|
no information | 5.5 | no information |
NIST — CVE-2024-42305
|
no information | 7.1 | no information |
NIST — CVE-2024-42312
|
no information | 5.5 | no information |
NIST — CVE-2024-42315
|
no information | 5.5 | no information |
NIST — CVE-2024-42316
|
no information | 5.5 | no information |
NIST — CVE-2024-42321
|
no information | 5.5 | no information |
NIST — CVE-2024-43820
|
no information | 4.4 | no information |
NIST — CVE-2024-43821
|
no information | 4.4 | no information |
NIST — CVE-2024-43823
|
no information | 5.5 | no information |
NIST — CVE-2024-43828
|
no information | 5.5 | no information |
NIST — CVE-2024-43834
|
no information | 5.5 | no information |
NIST — CVE-2024-43846
|
no information | 6.1 | no information |
NIST — CVE-2024-43853
|
no information | 4.7 | no information |
NIST — CVE-2024-43871
|
no information | 5.5 | no information |
NIST — CVE-2024-43873
|
no information | 7.1 | no information |
NIST — CVE-2024-43882
|
no information | 7.0 | no information |
NIST — CVE-2024-43884
|
no information | 5.7 | no information |
NIST — CVE-2024-43889
|
no information | 5.5 | no information |
NIST — CVE-2024-43898
|
no information | 0.0 | no information |
NIST — CVE-2024-43910
|
no information | 7.1 | no information |
NIST — CVE-2024-43914
|
no information | 5.5 | no information |
NIST — CVE-2024-44931
|
no information | 5.5 | no information |
NIST — CVE-2024-44932
|
no information | 6.7 | no information |
NIST — CVE-2024-44934
|
no information | 6.6 | no information |
NIST — CVE-2024-44952
|
no information | 5.5 | no information |
NIST — CVE-2024-44958
|
no information | 5.5 | no information |
NIST — CVE-2024-44964
|
no information | 6.7 | no information |
NIST — CVE-2024-44975
|
no information | 4.4 | no information |
NIST — CVE-2024-44987
|
no information | 6.6 | no information |
NIST — CVE-2024-44989
|
no information | 5.5 | no information |
NIST — CVE-2024-45000
|
no information | 5.5 | no information |
NIST — CVE-2024-45009
|
no information | 5.5 | no information |
NIST — CVE-2024-45010
|
no information | 5.5 | no information |
NIST — CVE-2024-45016
|
no information | 7.0 | no information |
NIST — CVE-2024-45022
|
no information | 5.5 | no information |
NIST — CVE-2024-46673
|
no information | 6.7 | no information |
NIST — CVE-2024-46675
|
no information | 5.5 | no information |
NIST — CVE-2024-46711
|
no information | 4.7 | no information |
NIST — CVE-2024-46722
|
no information | 7.1 | no information |
NIST — CVE-2024-46723
|
no information | 7.1 | no information |
NIST — CVE-2024-46724
|
no information | 7.1 | no information |
NIST — CVE-2024-46725
|
no information | 6.7 | no information |
NIST — CVE-2024-46743
|
no information | 7.1 | no information |
NIST — CVE-2024-46745
|
no information | 5.5 | no information |
NIST — CVE-2024-46747
|
no information | 7.1 | no information |
NIST — CVE-2024-46750
|
no information | 5.5 | no information |
NIST — CVE-2024-46754
|
no information | 5.5 | no information |
NIST — CVE-2024-46756
|
no information | 4.4 | no information |
NIST — CVE-2024-46758
|
no information | 5.5 | no information |
NIST — CVE-2024-46759
|
no information | 4.4 | no information |
NIST — CVE-2024-46761
|
no information | 5.5 | no information |
NIST — CVE-2024-46783
|
no information | 5.5 | no information |
NIST — CVE-2024-46786
|
no information | 6.7 | no information |
NIST — CVE-2024-46787
|
no information | 4.7 | no information |
NIST — CVE-2024-46800
|
no information | 6.6 | no information |
NIST — CVE-2024-46805
|
no information | 5.5 | no information |
NIST — CVE-2024-46806
|
no information | 5.5 | no information |
NIST — CVE-2024-46807
|
no information | 5.5 | no information |
NIST — CVE-2024-46819
|
no information | 5.5 | no information |
NIST — CVE-2024-46820
|
no information | 5.5 | no information |
NIST — CVE-2024-46822
|
no information | 5.5 | no information |
NIST — CVE-2024-46828
|
no information | 7.1 | no information |
NIST — CVE-2024-46835
|
no information | 5.5 | no information |
NIST — CVE-2024-46839
|
no information | 5.5 | no information |
NIST — CVE-2024-46853
|
no information | 6.7 | no information |
NIST — CVE-2024-46864
|
no information | 4.4 | no information |
NIST — CVE-2024-46871
|
no information | 4.7 | no information |
NIST — CVE-2024-47141
|
no information | 4.7 | no information |
NIST — CVE-2024-47660
|
no information | 4.7 | no information |
NIST — CVE-2024-47668
|
no information | 4.7 | no information |
NIST — CVE-2024-47678
|
no information | 5.5 | no information |
NIST — CVE-2024-47685
|
no information | 6.5 | no information |
NIST — CVE-2024-47687
|
no information | 5.5 | no information |
NIST — CVE-2024-47692
|
no information | 6.5 | no information |
NIST — CVE-2024-47700
|
no information | 5.5 | no information |
NIST — CVE-2024-47703
|
no information | 4.4 | no information |
NIST — CVE-2024-47705
|
no information | 5.5 | no information |
NIST — CVE-2024-47706
|
no information | 5.5 | no information |
NIST — CVE-2024-47710
|
no information | 5.5 | no information |
NIST — CVE-2024-47713
|
no information | 5.5 | no information |
NIST — CVE-2024-47715
|
no information | 5.5 | no information |
NIST — CVE-2024-47718
|
no information | 4.4 | no information |
NIST — CVE-2024-47719
|
no information | 7.1 | no information |
NIST — CVE-2024-47737
|
no information | 5.5 | no information |
NIST — CVE-2024-47738
|
no information | 3.3 | no information |
NIST — CVE-2024-47739
|
no information | 5.5 | no information |
NIST — CVE-2024-47745
|
no information | 4.7 | no information |
NIST — CVE-2024-47748
|
no information | 6.7 | no information |
NIST — CVE-2024-48873
|
no information | 5.5 | no information |
NIST — CVE-2024-49569
|
no information | 5.7 | no information |
NIST — CVE-2024-49851
|
no information | 7.1 | no information |
NIST — CVE-2024-49856
|
no information | 5.5 | no information |
NIST — CVE-2024-49860
|
no information | 7.1 | no information |
NIST — CVE-2024-49862
|
no information | 7.1 | no information |
NIST — CVE-2024-49870
|
no information | 6.1 | no information |
NIST — CVE-2024-49875
|
no information | 3.3 | no information |
NIST — CVE-2024-49878
|
no information | 5.5 | no information |
NIST — CVE-2024-49881
|
no information | 5.5 | no information |
NIST — CVE-2024-49882
|
no information | 6.7 | no information |
NIST — CVE-2024-49883
|
no information | 5.5 | no information |
NIST — CVE-2024-49884
|
no information | 6.7 | no information |
NIST — CVE-2024-49885
|
no information | 5.5 | no information |
NIST — CVE-2024-49886
|
no information | 7.1 | no information |
NIST — CVE-2024-49889
|
no information | 6.7 | no information |
NIST — CVE-2024-49904
|
no information | 4.4 | no information |
NIST — CVE-2024-49927
|
no information | 5.5 | no information |
NIST — CVE-2024-49928
|
no information | 7.1 | no information |
NIST — CVE-2024-49929
|
no information | 5.5 | no information |
NIST — CVE-2024-49930
|
no information | 6.4 | no information |
NIST — CVE-2024-49933
|
no information | 5.5 | no information |
NIST — CVE-2024-49934
|
no information | 4.3 | no information |
NIST — CVE-2024-49935
|
no information | 5.5 | no information |
NIST — CVE-2024-49937
|
no information | 5.5 | no information |
NIST — CVE-2024-49938
|
no information | 5.5 | no information |
NIST — CVE-2024-49939
|
no information | 6.4 | no information |
NIST — CVE-2024-49946
|
no information | 5.5 | no information |
NIST — CVE-2024-49948
|
no information | 5.5 | no information |
NIST — CVE-2024-49950
|
no information | 6.8 | no information |
NIST — CVE-2024-49951
|
no information | 4.7 | no information |
NIST — CVE-2024-49954
|
no information | 5.5 | no information |
NIST — CVE-2024-49959
|
no information | 5.5 | no information |
NIST — CVE-2024-49960
|
no information | 5.5 | no information |
NIST — CVE-2024-49962
|
no information | 5.5 | no information |
NIST — CVE-2024-49967
|
no information | 7.1 | no information |
NIST — CVE-2024-49968
|
no information | 5.5 | no information |
NIST — CVE-2024-49971
|
no information | 4.4 | no information |
NIST — CVE-2024-49973
|
no information | 4.1 | no information |
NIST — CVE-2024-49974
|
no information | 5.5 | no information |
NIST — CVE-2024-49975
|
no information | 5.5 | no information |
NIST — CVE-2024-49977
|
no information | 4.4 | no information |
NIST — CVE-2024-49983
|
no information | 5.5 | no information |
NIST — CVE-2024-49991
|
no information | 6.0 | no information |
NIST — CVE-2024-49993
|
no information | 5.5 | no information |
NIST — CVE-2024-49994
|
no information | 4.4 | no information |
NIST — CVE-2024-49995
|
no information | 7.1 | no information |
NIST — CVE-2024-49999
|
no information | 5.5 | no information |
NIST — CVE-2024-50002
|
no information | 5.5 | no information |
NIST — CVE-2024-50006
|
no information | 4.7 | no information |
NIST — CVE-2024-50008
|
no information | 5.5 | no information |
NIST — CVE-2024-50009
|
no information | 5.5 | no information |
NIST — CVE-2024-50013
|
no information | 6.1 | no information |
NIST — CVE-2024-50014
|
no information | 5.5 | no information |
NIST — CVE-2024-50015
|
no information | 4.4 | no information |
NIST — CVE-2024-50018
|
no information | 4.4 | no information |
NIST — CVE-2024-50019
|
no information | 5.5 | no information |
NIST — CVE-2024-50022
|
no information | 5.5 | no information |
NIST — CVE-2024-50023
|
no information | 5.5 | no information |
NIST — CVE-2024-50024
|
no information | 4.7 | no information |
NIST — CVE-2024-50027
|
no information | 5.5 | no information |
NIST — CVE-2024-50028
|
no information | 4.4 | no information |
NIST — CVE-2024-50029
|
no information | 7.1 | no information |
NIST — CVE-2024-50033
|
no information | 5.5 | no information |
NIST — CVE-2024-50035
|
no information | 7.1 | no information |
NIST — CVE-2024-50038
|
no information | 5.5 | no information |
NIST — CVE-2024-50039
|
no information | 5.5 | no information |
NIST — CVE-2024-50044
|
no information | 4.7 | no information |
NIST — CVE-2024-50046
|
no information | 5.5 | no information |
NIST — CVE-2024-50047
|
no information | 6.7 | no information |
NIST — CVE-2024-50055
|
no information | 6.7 | no information |
NIST — CVE-2024-50057
|
no information | 0.0 | no information |
NIST — CVE-2024-50058
|
no information | 5.5 | no information |
NIST — CVE-2024-50064
|
no information | 5.5 | no information |
NIST — CVE-2024-50067
|
no information | 7.3 | no information |
NIST — CVE-2024-50073
|
no information | 5.5 | no information |
NIST — CVE-2024-50074
|
no information | 5.5 | no information |
NIST — CVE-2024-50075
|
no information | 6.0 | no information |
NIST — CVE-2024-50077
|
no information | 5.5 | no information |
NIST — CVE-2024-50078
|
no information | 4.4 | no information |
NIST — CVE-2024-50081
|
no information | 4.4 | no information |
NIST — CVE-2024-50082
|
no information | 4.1 | no information |
NIST — CVE-2024-50093
|
no information | 4.4 | no information |
NIST — CVE-2024-50101
|
no information | 5.5 | no information |
NIST — CVE-2024-50102
|
no information | 5.5 | no information |
NIST — CVE-2024-50106
|
no information | 7.0 | no information |
NIST — CVE-2024-50107
|
no information | 5.5 | no information |
NIST — CVE-2024-50109
|
no information | 5.5 | no information |
NIST — CVE-2024-50117
|
no information | 5.5 | no information |
NIST — CVE-2024-50120
|
no information | 4.7 | no information |
NIST — CVE-2024-50121
|
no information | 5.7 | no information |
NIST — CVE-2024-50126
|
no information | 7.8 | no information |
NIST — CVE-2024-50127
|
no information | 7.0 | no information |
NIST — CVE-2024-50128
|
no information | 7.1 | no information |
NIST — CVE-2024-50130
|
no information | 4.7 | no information |
NIST — CVE-2024-50141
|
no information | 5.5 | no information |
NIST — CVE-2024-50143
|
no information | 7.0 | no information |
NIST — CVE-2024-50150
|
no information | 5.5 | no information |
NIST — CVE-2024-50151
|
no information | 7.8 | no information |
NIST — CVE-2024-50152
|
no information | 5.5 | no information |
NIST — CVE-2024-50153
|
no information | 5.5 | no information |
NIST — CVE-2024-50162
|
no information | 4.4 | no information |
NIST — CVE-2024-50163
|
no information | 4.4 | no information |
NIST — CVE-2024-50169
|
no information | 5.5 | no information |
NIST — CVE-2024-50182
|
no information | 5.5 | no information |
NIST — CVE-2024-50186
|
no information | 6.7 | no information |
NIST — CVE-2024-50189
|
no information | 4.4 | no information |
NIST — CVE-2024-50191
|
no information | 5.5 | no information |
NIST — CVE-2024-50197
|
no information | 4.4 | no information |
NIST — CVE-2024-50199
|
no information | 5.5 | no information |
NIST — CVE-2024-50200
|
no information | 7.1 | no information |
NIST — CVE-2024-50201
|
no information | 4.4 | no information |
NIST — CVE-2024-50215
|
no information | 6.7 | no information |
NIST — CVE-2024-50216
|
no information | 4.4 | no information |
NIST — CVE-2024-50219
|
no information | 5.5 | no information |
NIST — CVE-2024-50228
|
no information | 7.0 | no information |
NIST — CVE-2024-50235
|
no information | 6.7 | no information |
NIST — CVE-2024-50236
|
no information | 5.5 | no information |
NIST — CVE-2024-50237
|
no information | 5.5 | no information |
NIST — CVE-2024-50256
|
no information | 5.5 | no information |
NIST — CVE-2024-50261
|
no information | 6.1 | no information |
NIST — CVE-2024-50271
|
no information | 5.5 | no information |
NIST — CVE-2024-50272
|
no information | 5.5 | no information |
NIST — CVE-2024-50278
|
no information | 7.1 | no information |
NIST — CVE-2024-50282
|
no information | 6.7 | no information |
NIST — CVE-2024-50299
|
no information | 5.5 | no information |
NIST — CVE-2024-50304
|
no information | 5.5 | no information |
NIST — CVE-2024-53042
|
no information | 3.3 | no information |
NIST — CVE-2024-53044
|
no information | 5.5 | no information |
NIST — CVE-2024-53047
|
no information | 3.3 | no information |
NIST — CVE-2024-53050
|
no information | 5.5 | no information |
NIST — CVE-2024-53051
|
no information | 4.4 | no information |
NIST — CVE-2024-53055
|
no information | 4.4 | no information |
NIST — CVE-2024-53057
|
no information | 6.7 | no information |
NIST — CVE-2024-53059
|
no information | 7.0 | no information |
NIST — CVE-2024-53060
|
no information | 5.5 | no information |
NIST — CVE-2024-53070
|
no information | 4.4 | no information |
NIST — CVE-2024-53072
|
no information | 4.4 | no information |
NIST — CVE-2024-53074
|
no information | 4.4 | no information |
NIST — CVE-2024-53082
|
no information | 7.1 | no information |
NIST — CVE-2024-53085
|
no information | 4.4 | no information |
NIST — CVE-2024-53091
|
no information | 5.5 | no information |
NIST — CVE-2024-53093
|
no information | 5.5 | no information |
NIST — CVE-2024-53095
|
no information | 6.7 | no information |
NIST — CVE-2024-53096
|
no information | 6.1 | no information |
NIST — CVE-2024-53097
|
no information | 3.3 | no information |
NIST — CVE-2024-53103
|
no information | 6.3 | no information |
NIST — CVE-2024-53105
|
no information | 5.5 | no information |
NIST — CVE-2024-53110
|
no information | 5.5 | no information |
NIST — CVE-2024-53117
|
no information | 6.1 | no information |
NIST — CVE-2024-53118
|
no information | 6.1 | no information |
NIST — CVE-2024-53120
|
no information | 4.4 | no information |
NIST — CVE-2024-53121
|
no information | 4.4 | no information |
NIST — CVE-2024-53123
|
no information | 5.5 | no information |
NIST — CVE-2024-53124
|
no information | 4.7 | no information |
NIST — CVE-2024-53134
|
no information | 5.5 | no information |
NIST — CVE-2024-53136
|
no information | 4.7 | no information |
NIST — CVE-2024-53142
|
no information | 6.0 | no information |
NIST — CVE-2024-53146
|
no information | 5.5 | no information |
NIST — CVE-2024-53152
|
no information | 6.4 | no information |
NIST — CVE-2024-53156
|
no information | 7.1 | no information |
NIST — CVE-2024-53160
|
no information | 6.3 | no information |
NIST — CVE-2024-53161
|
no information | 3.8 | no information |
NIST — CVE-2024-53164
|
no information | 4.1 | no information |
NIST — CVE-2024-53166
|
no information | 6.7 | no information |
NIST — CVE-2024-53173
|
no information | 7.0 | no information |
NIST — CVE-2024-53174
|
no information | 7.1 | no information |
NIST — CVE-2024-53190
|
no information | 5.5 | no information |
NIST — CVE-2024-53194
|
no information | 5.5 | no information |
NIST — CVE-2024-53203
|
no information | 6.7 | no information |
NIST — CVE-2024-53208
|
no information | 6.8 | no information |
NIST — CVE-2024-53213
|
no information | 5.5 | no information |
NIST — CVE-2024-53222
|
no information | 5.5 | no information |
NIST — CVE-2024-53224
|
no information | 4.4 | no information |
NIST — CVE-2024-53237
|
no information | 6.7 | no information |
NIST — CVE-2024-53681
|
no information | 6.7 | no information |
NIST — CVE-2024-54460
|
no information | 5.7 | no information |
NIST — CVE-2024-54680
|
no information | 4.4 | no information |
NIST — CVE-2024-56535
|
no information | 5.5 | no information |
NIST — CVE-2024-56544
|
no information | 4.4 | no information |
NIST — CVE-2024-56551
|
no information | 6.7 | no information |
NIST — CVE-2024-56558
|
no information | 7.1 | no information |
NIST — CVE-2024-56562
|
no information | 4.4 | no information |
NIST — CVE-2024-56566
|
no information | 5.5 | no information |
NIST — CVE-2024-56570
|
no information | 6.7 | no information |
NIST — CVE-2024-56590
|
no information | 4.4 | no information |
NIST — CVE-2024-56591
|
no information | 5.5 | no information |
NIST — CVE-2024-56600
|
no information | 7.3 | no information |
NIST — CVE-2024-56601
|
no information | 7.3 | no information |
NIST — CVE-2024-56602
|
no information | 5.5 | no information |
NIST — CVE-2024-56604
|
no information | 6.8 | no information |
NIST — CVE-2024-56605
|
no information | 7.0 | no information |
NIST — CVE-2024-56611
|
no information | 5.5 | no information |
NIST — CVE-2024-56614
|
no information | 6.7 | no information |
NIST — CVE-2024-56616
|
no information | 6.7 | no information |
NIST — CVE-2024-56623
|
no information | 6.0 | no information |
NIST — CVE-2024-56631
|
no information | 6.7 | no information |
NIST — CVE-2024-56642
|
no information | 7.1 | no information |
NIST — CVE-2024-56644
|
no information | 4.7 | no information |
NIST — CVE-2024-56647
|
no information | 5.5 | no information |
NIST — CVE-2024-56653
|
no information | 6.7 | no information |
NIST — CVE-2024-56654
|
no information | 5.5 | no information |
NIST — CVE-2024-56663
|
no information | 7.1 | no information |
NIST — CVE-2024-56664
|
no information | 6.4 | no information |
NIST — CVE-2024-56667
|
no information | 5.5 | no information |
NIST — CVE-2024-56688
|
no information | 5.5 | no information |
NIST — CVE-2024-56693
|
no information | 6.7 | no information |
NIST — CVE-2024-56729
|
no information | 4.7 | no information |
NIST — CVE-2024-56757
|
no information | 5.5 | no information |
NIST — CVE-2024-56760
|
no information | 5.5 | no information |
NIST — CVE-2024-56779
|
no information | 6.3 | no information |
NIST — CVE-2024-56783
|
no information | 5.5 | no information |
NIST — CVE-2024-57798
|
no information | 6.7 | no information |
NIST — CVE-2024-57809
|
no information | 5.5 | no information |
NIST — CVE-2024-57843
|
no information | 5.5 | no information |
NIST — CVE-2024-57879
|
no information | 5.5 | no information |
NIST — CVE-2024-57884
|
no information | 5.5 | no information |
NIST — CVE-2024-57888
|
no information | 5.5 | no information |
NIST — CVE-2024-57890
|
no information | 5.5 | no information |
NIST — CVE-2024-57894
|
no information | 5.5 | no information |
NIST — CVE-2024-57898
|
no information | 5.5 | no information |
NIST — CVE-2024-57929
|
no information | 6.0 | no information |
NIST — CVE-2024-57931
|
no information | 5.5 | no information |
NIST — CVE-2024-57940
|
no information | 5.5 | no information |
NIST — CVE-2024-58009
|
no information | 5.5 | no information |
NIST — CVE-2024-58064
|
no information | 5.5 | no information |
NIST — CVE-2024-58099
|
no information | 7.0 | no information |
NIST — CVE-2025-1272
|
no information | 7.7 | no information |
NIST — CVE-2025-21646
|
no information | 5.5 | no information |
NIST — CVE-2025-21663
|
no information | 4.4 | no information |
NIST — CVE-2025-21666
|
no information | 5.5 | no information |
NIST — CVE-2025-21668
|
no information | 4.4 | no information |
NIST — CVE-2025-21669
|
no information | 5.5 | no information |
NIST — CVE-2025-21689
|
no information | 5.5 | no information |
NIST — CVE-2025-21694
|
no information | 4.1 | no information |
Updated packages