INFSA-2025:6966: kernel security update

Information about definition

Identificator: INFSA-2025:6966

Type: security

Release date: 2025-07-31 16:13:14 UTC

Information about package

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Vulnerabilities description

  • CVE-2024-43871

    In the Linux kernel, the following vulnerability has been resolved: devres: Fix memory leakage caused by driver API devm_free_percpu().

  • CVE-2024-42265

    In the Linux kernel, the following vulnerability has been resolved: protect the fetch of ->fd[fd] in do_dup2() from mispredictions.

  • CVE-2024-38541

    A buffer overflow flaw was found in of_modalias() in the Linux kernel, occurring after the first snprintf() call. This issue could result in loss of availability of the system.

  • CVE-2024-43889

    A denial of service vulnerability exists in the Linux kernel. A possible divide-by-0 is in the padata_mt_helper() function when the ps->chunk_size is 0. This vulnerability could result in a loss of system availability.

  • CVE-2024-44989

    In the Linux kernel, the following vulnerability has been resolved: bonding: fix xfrm real_dev null pointer dereference.

  • CVE-2024-50256

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6().

  • CVE-2022-48969

    In the Linux kernel, the following vulnerability has been resolved: xen-netfront: Fix NULL sring after live migration.

  • CVE-2022-48989

    In the Linux kernel, the following vulnerability has been resolved: fscache: Fix oops due to race with cookie_lru and use_cookie.

  • CVE-2022-49006

    In the Linux kernel, the following vulnerability has been resolved: tracing: Free buffers when a used dynamic event is removed.

  • CVE-2022-49014

    In the Linux kernel, the following vulnerability has been resolved: net: tun: Fix use-after-free in tun_detach().

  • CVE-2022-49029

    In the Linux kernel, the following vulnerability has been resolved: hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails.

  • CVE-2023-52672

    In the Linux kernel, the following vulnerability has been resolved: pipe: wakeup wr_wait after setting max_usage.

  • CVE-2023-52917

    In the Linux kernel, the following vulnerability has been resolved: ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir().

  • CVE-2024-27008

    In the Linux kernel, the following vulnerability has been resolved: drm: nv04: Fix out of bounds access.

  • CVE-2024-27398

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout.

  • CVE-2024-35891

    In the Linux kernel, the following vulnerability has been resolved: net: phy: micrel: Fix potential null pointer dereference.

  • CVE-2024-35933

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btintel: Fix null ptr deref in btintel_read_version.

  • CVE-2024-35934

    Linux Kernel is vulnerable to a denial of service, caused by a flaw related to rtnl pressure in smc_pnet_create_pnetids_list(). By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.

  • CVE-2024-35963

    Linux Kernel is vulnerable to a denial of service, caused by improper validation of setsockopt user input. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.

  • CVE-2024-35964

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Fix not validating setsockopt user input Check user input length before copying data.

  • CVE-2024-35965

  • CVE-2024-35966

    Linux Kernel is vulnerable to a denial of service, caused by not validating setsockopt user input by the Bluetooth: RFCOMM module. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.

  • CVE-2024-35967

    This CVE pertains to a vulnerability in the Linux kernel's Bluetooth subsystem, specifically within the SCO (Synchronous Connection-Oriented) protocol. The issue arises from the sco_sock_setsockopt() function, which copies data without properly validating the length of user input. This oversight can lead to a slab-out-of-bounds read, potentially causing system instability or crashes.

  • CVE-2024-35978

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix memory leak in hci_req_sync_complete().

  • CVE-2024-36011

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: HCI: Fix potential null-ptr-deref.

  • CVE-2024-36012

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: msft: fix slab-use-after-free in msft_do_close().

  • CVE-2024-36013

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect().

  • CVE-2024-36880

    Linux Kernel is vulnerable to a denial of service, caused by missing firmware sanity checks. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service.

  • CVE-2024-36968

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init().

  • CVE-2024-39500

    In the Linux kernel, the following vulnerability has been resolved: sock_map: avoid race between sock_map_close and sk_psock_put.

  • CVE-2024-40956

    In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list.

  • CVE-2024-41010

    In the Linux kernel, the following vulnerability has been resolved: bpf: Fix too early release of tcx_entry.

  • CVE-2024-41062

    In the Linux kernel, the following vulnerability has been resolved: bluetooth/l2cap: sync sock recv cb and release.

  • CVE-2024-42133

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Ignore too large handle values in BIG.

  • CVE-2024-42253

    In the Linux kernel, the following vulnerability has been resolved: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race.

  • CVE-2024-42278

    In the Linux kernel, the following vulnerability has been resolved: ASoC: TAS2781: Fix tasdev_load_calibrated_data().

  • CVE-2024-42291

    Linux Kernel is vulnerable to a denial of service, caused by a resource exhaustion in ice/ice_ethtool_fdir.c. By sending a specially crafted request, a local attacker could exploit this vulnerability to cause a denial of service.

  • CVE-2024-42294

    In the Linux kernel, the following vulnerability has been resolved: block: fix deadlock between sd_remove & sd_release.

  • CVE-2024-42302

    In the Linux kernel, the following vulnerability has been resolved: PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal.

  • CVE-2024-42304

    Linux Kernel is vulnerable to a denial of service, caused by a flaw related to the first directory block is a hole. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.

  • CVE-2024-42305

    Linux Kernel is vulnerable to a denial of service, caused by not checking dot and dotdot of dx_root before making dir indexed. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.

  • CVE-2024-42312

    Linux Kernel is vulnerable to a denial of service, caused by improper initialization in i_uid/i_gid. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.

  • CVE-2024-42315

    In the Linux kernel, the following vulnerability has been resolved: exfat: fix potential deadlock on __exfat_get_dentry_set.

  • CVE-2024-42316

    In the Linux kernel, the following vulnerability has been resolved: mm/mglru: fix div-by-zero in vmpressure_calc_level().

  • CVE-2024-42321

    Linux Kernel is vulnerable to a denial of service, caused by a flaw in flow_dissector.c. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service.

  • CVE-2024-43820

    Linux Kernel is vulnerable to a denial of service, caused by a flaw in dm-raid.c. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service.

  • CVE-2024-43821

    In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix a possible null pointer dereference.

  • CVE-2024-43823

    In the Linux kernel, the following vulnerability has been resolved: PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs().

  • CVE-2024-43828

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix infinite loop when replaying fast_commit.

  • CVE-2024-43834

    In the Linux kernel, the following vulnerability has been resolved: xdp: fix invalid wait context of page_pool_destroy().

  • CVE-2024-43846

    In the Linux kernel, the following vulnerability has been resolved: lib: objagg: Fix general protection fault.

  • CVE-2024-43853

    In the Linux kernel, the following vulnerability has been resolved: cgroup/cpuset: Prevent UAF in proc_cpuset_show().

  • CVE-2024-43873

    In the Linux kernel, the following vulnerability has been resolved: vhost/vsock: always initialize seqpacket_allow.

  • CVE-2024-43882

    In the Linux kernel, the following vulnerability has been resolved: exec: Fix ToCToU between perm check and set-uid/gid usage.

  • CVE-2024-43884

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Add error handling to pair_device().

  • CVE-2024-43898

    Linux Kernel is vulnerable to a denial of service, caused by a Null pointer dereference in ext4_force_shutdown of 'ext4: sanity'. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.

  • CVE-2024-43910

    In the Linux kernel, the following vulnerability has been resolved: bpf: add missing check_func_arg_reg_off() to prevent out-of-bounds memory accesses.

  • CVE-2024-43914

    In the Linux kernel, the following vulnerability has been resolved: md/raid5: avoid BUG_ON() while continue reshape after reassembling.

  • CVE-2024-44931

    In the Linux kernel, the following vulnerability has been resolved: gpio: prevent potential speculation leaks in gpio_device_get_desc().

  • CVE-2024-44932

    In the Linux kernel, the following vulnerability has been resolved: idpf: fix UAFs when destroying the queues.

  • CVE-2024-44934

    In the Linux kernel, the following vulnerability has been resolved: net: bridge: mcast: wait for previous gc cycles when removing port.

  • CVE-2024-44952

    A vulnerability in the Linux kernel's driver core related to uevent_show() and driver detach has been identified. The issue involved a race condition where uevent_show() attempted to dereference dev->driver->name, leading to a potential deadlock due to improper locking. While this could cause system instability, an attacker would need the ability to manipulate device attributes and timing precisely, making exploitation impractical.

  • CVE-2024-44958

    In the Linux kernel, the following vulnerability has been resolved: sched/smt: Fix unbalance sched_smt_present dec/inc.

  • CVE-2024-44964

    In the Linux kernel, the following vulnerability has been resolved: idpf: fix memory leaks and crashes while performing a soft reset.

  • CVE-2024-44975

    In the Linux kernel, the following vulnerability has been resolved: cgroup/cpuset: fix panic caused by partcmd_update.

  • CVE-2024-44987

    In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent UAF in ip6_send_skb().

  • CVE-2024-45000

    In the Linux kernel, the following vulnerability has been resolved: fs/netfs/fscache_cookie: add missing "n_accesses" check.

  • CVE-2024-45009

    In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: only decrement add_addr_accepted for MPJ req.

  • CVE-2024-45010

    In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: only mark 'subflow' endp as available.

  • CVE-2024-45016

    In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails.

  • CVE-2024-45022

    In the Linux kernel, the following vulnerability has been resolved: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0.

  • CVE-2024-46673

    In the Linux kernel, the following vulnerability has been resolved: scsi: aacraid: Fix double-free on probe failure.

  • CVE-2024-46675

    In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: core: Prevent USB core invalid event buffer address access.

  • CVE-2024-46711

    In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: fix ID 0 endp usage after multiple re-creations.

  • CVE-2024-46722

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix mc_data out-of-bounds read warning.

  • CVE-2024-46723

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix ucode out-of-bounds read warning.

  • CVE-2024-46724

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number.

  • CVE-2024-46725

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix out-of-bounds write warning.

  • CVE-2024-46743

    In the Linux kernel, the following vulnerability has been resolved: of/irq: Prevent device address out-of-bounds read in interrupt map walk.

  • CVE-2024-46745

    In the Linux kernel, the following vulnerability has been resolved: Input: uinput - reject requests with unreasonable number of slots.

  • CVE-2024-46747

    In the Linux kernel, the following vulnerability has been resolved: HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup.

  • CVE-2024-46750

    In the Linux kernel, the following vulnerability has been resolved: PCI: Add missing bridge lock to pci_bus_lock().

  • CVE-2024-46754

    In the Linux kernel, the following vulnerability has been resolved: bpf: Remove tst_run from lwt_seg6local_prog_ops.

  • CVE-2024-46756

    A vulnerability in the Linux kernel's hwmon subsystem (w83627ehf driver) has been identified, where writing large negative values (e.g., -9223372036854775808) to limit attributes caused an underflow due to improper ordering of operations in DIV_ROUND_CLOSEST(). An attacker with write access to these attributes could potentially trigger unexpected behavior or system instability.

  • CVE-2024-46758

    A buffer underrun vulnerability was found in the Linux kernel. DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large negative number, such as -9223372036854775808, is provided by the user, resulting in loss of availability of the system.

  • CVE-2024-46759

    In the Linux kernel, the following vulnerability has been resolved: hwmon: (adc128d818) Fix underflows seen when writing limit attributes.

  • CVE-2024-46761

    In the Linux kernel, the following vulnerability has been resolved: pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv.

  • CVE-2024-46783

    In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: fix return value of tcp_bpf_sendmsg().

  • CVE-2024-46786

    In the Linux kernel, the following vulnerability has been resolved: fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF.

  • CVE-2024-46787

    In the Linux kernel, the following vulnerability has been resolved: userfaultfd: fix checks for huge PMDs.

  • CVE-2024-46800

    In the Linux kernel, the following vulnerability has been resolved: sch/netem: fix use after free in netem_dequeue.

  • CVE-2024-46805

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix the waring dereferencing hive.

  • CVE-2024-46806

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix the warning division or modulo by zero.

  • CVE-2024-46807

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/amdgpu: Check tbo resource pointer.

  • CVE-2024-46819

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: the warning dereferencing obj for nbio_v7_4.

  • CVE-2024-46820

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/vcn: remove irq disabling in vcn 5 suspend.

  • CVE-2024-46822

    In the Linux kernel, the following vulnerability has been resolved: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry.

  • CVE-2024-46828

    In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: fix bulk flow accounting logic for host fairness.

  • CVE-2024-46835

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix smatch static checker warning.

  • CVE-2024-46839

    A performance issue in the Linux Kernel's workqueue subsystem can cause hard lockups on high-CPU systems during operations like CPU hotplugging. The issue arises from contention when multiple CPUs update the global wq_watchdog_touched variable, leading to degraded performance and lockups in workqueue management routines.

  • CVE-2024-46853

    In the Linux kernel, the following vulnerability has been resolved: spi: nxp-fspi: fix the KASAN report out-of-bounds bug.

  • CVE-2024-46864

    In the Linux kernel, the following vulnerability has been resolved: x86/hyperv: fix kexec crash due to VP assist page corruption.

  • CVE-2024-46871

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX.

  • CVE-2024-47141

    In the Linux kernel, the following vulnerability has been resolved: pinmux: Use sequential access to access desc->pinmux data.

  • CVE-2024-47660

    In the Linux kernel, the following vulnerability has been resolved: fsnotify: clear PARENT_WATCHED flags lazily.

  • CVE-2024-47668

    In the Linux kernel, the following vulnerability has been resolved: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc().

  • CVE-2024-47678

    In the Linux kernel, the following vulnerability has been resolved: icmp: change the order of rate limits.

  • CVE-2024-47685

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put().

  • CVE-2024-47687

    In the Linux kernel, the following vulnerability has been resolved: vdpa/mlx5: Fix invalid mr resource destroy.

  • CVE-2024-47692

    In the Linux kernel, the following vulnerability has been resolved: nfsd: return -EINVAL when namelen is 0.

  • CVE-2024-47700

    In the Linux kernel, the following vulnerability has been resolved: ext4: check stripe size compatibility on remount as well.

  • CVE-2024-47703

    In the Linux kernel, the following vulnerability has been resolved: bpf, lsm: Add check for BPF LSM return value.

  • CVE-2024-47705

    In the Linux kernel, the following vulnerability has been resolved: block: fix potential invalid pointer dereference in blk_add_partition.

  • CVE-2024-47706

    In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix possible UAF for bfqq->bic with merge chain.

  • CVE-2024-47710

    In the Linux kernel, the following vulnerability has been resolved: sock_map: Add a cond_resched() in sock_hash_free().

  • CVE-2024-47713

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop().

  • CVE-2024-47715

    In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7915: fix oops on non-dbdc mt7986.

  • CVE-2024-47718

    In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: always wait for both firmware loading attempts.

  • CVE-2024-47719

    In the Linux kernel, the following vulnerability has been resolved: iommufd: Protect against overflow of ALIGN() during iova allocation.

  • CVE-2024-47737

    In the Linux kernel, the following vulnerability has been resolved: nfsd: call cache_put if xdr_reserve_space returns NULL.

  • CVE-2024-47738

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't use rate mask for offchannel TX either.

  • CVE-2024-47739

    In the Linux kernel, the following vulnerability has been resolved: padata: use integer wrap around to prevent deadlock on seq_nr overflow.

  • CVE-2024-47745

    In the Linux kernel, the following vulnerability has been resolved: mm: call the security_mmap_file() LSM hook in remap_file_pages().

  • CVE-2024-47748

    In the Linux kernel, the following vulnerability has been resolved: vhost_vdpa: assign irq bypass producer token correctly.

  • CVE-2024-48873

    In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: check return value of ieee80211_probereq_get() for RNR.

  • CVE-2024-49569

    Linux Kernel is vulnerable to a denial of service, caused by a flaw in nvme-rdma.

  • CVE-2024-49851

    In the Linux kernel, the following vulnerability has been resolved: tpm: Clean up TPM space after command failure.

  • CVE-2024-49856

    In the Linux kernel, the following vulnerability has been resolved: x86/sgx: Fix deadlock in SGX NUMA node search.

  • CVE-2024-49860

    In the Linux kernel, the following vulnerability has been resolved: ACPI: sysfs: validate return type of _STR method.

  • CVE-2024-49862

    In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi().

  • CVE-2024-49870

    In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix dentry leak in cachefiles_open_file().

  • CVE-2024-49875

    In the Linux kernel, the following vulnerability has been resolved: nfsd: map the EBADMSG to nfserr_io to avoid warning.

  • CVE-2024-49878

    In the Linux kernel, the following vulnerability has been resolved: resource: fix region_intersects() vs add_memory_driver_managed().

  • CVE-2024-49881

    In the Linux kernel, the following vulnerability has been resolved: ext4: update orig_path in ext4_find_extent().

  • CVE-2024-49882

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix double brelse() the buffer of the extents path.

  • CVE-2024-49883

    In the Linux kernel, the following vulnerability has been resolved: ext4: aovid use-after-free in ext4_ext_insert_extent().

  • CVE-2024-49884

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix slab-use-after-free in ext4_split_extent_at().

  • CVE-2024-49885

    In the Linux kernel, the following vulnerability has been resolved: mm, slub: avoid zeroing kmalloc redzone.

  • CVE-2024-49886

    In the Linux kernel, the following vulnerability has been resolved: platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug.

  • CVE-2024-49889

    In the Linux kernel, the following vulnerability has been resolved: ext4: avoid use-after-free in ext4_ext_show_leaf().

  • CVE-2024-49904

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add list empty check to avoid null pointer issue.

  • CVE-2024-49927

    In the Linux kernel, the following vulnerability has been resolved: x86/ioapic: Handle allocation failures gracefully.

  • CVE-2024-49928

    In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: avoid reading out of bounds when loading TX power FW elements.

  • CVE-2024-49929

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: avoid NULL pointer dereference.

  • CVE-2024-49930

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix array out-of-bound access in SoC stats.

  • CVE-2024-49933

    In the Linux kernel, the following vulnerability has been resolved: blk_iocost: fix more out of bound shifts.

  • CVE-2024-49934

    In the Linux kernel, the following vulnerability has been resolved: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name.

  • CVE-2024-49935

    In the Linux kernel, the following vulnerability has been resolved: ACPI: PAD: fix crash in exit_round_robin().

  • CVE-2024-49937

    In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Set correct chandef when starting CAC.

  • CVE-2024-49938

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit.

  • CVE-2024-49939

    In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: avoid to add interface to list twice when SER.

  • CVE-2024-49946

    In the Linux kernel, the following vulnerability has been resolved: ppp: do not assume bh is held in ppp_channel_bridge_input().

  • CVE-2024-49948

    In the Linux kernel, the following vulnerability has been resolved: net: add more sanity checks to qdisc_pkt_len_init().

  • CVE-2024-49950

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2cap_connect.

  • CVE-2024-49951

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed.

  • CVE-2024-49954

    In the Linux kernel, the following vulnerability has been resolved: static_call: Replace pointless WARN_ON() in static_call_module_notify().

  • CVE-2024-49959

    In the Linux kernel, the following vulnerability has been resolved: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error.

  • CVE-2024-49960

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix timer use-after-free on failed mount.

  • CVE-2024-49962

    In the Linux kernel, the following vulnerability has been resolved: ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package().

  • CVE-2024-49967

    In the Linux kernel, the following vulnerability has been resolved: ext4: no need to continue when the number of entries is 1.

  • CVE-2024-49968

    In the Linux kernel, the following vulnerability has been resolved: ext4: filesystems without casefold feature cannot be mounted with siphash.

  • CVE-2024-49971

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Increase array size of dummy_boolean.

  • CVE-2024-49973

    In the Linux kernel, the following vulnerability has been resolved: r8169: add tally counter fields added with RTL8125.

  • CVE-2024-49974

    In the Linux kernel, the following vulnerability has been resolved: NFSD: Limit the number of concurrent async COPY operations.

  • CVE-2024-49975

    In the Linux kernel, the following vulnerability has been resolved: uprobes: fix kernel info leak via "[uprobes]" vma.

  • CVE-2024-49977

    In the Linux kernel, the following vulnerability has been resolved: net: stmmac: Fix zero-division error when disabling tc cbs.

  • CVE-2024-49983

    In the Linux kernel, the following vulnerability has been resolved: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free.

  • CVE-2024-49991

    In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer.

  • CVE-2024-49993

    A vulnerability has been identified in the Linux kernel's IOMMU (iommu/vt-d) subsystem, where calling qi_submit_sync() with zero invalidation descriptors could lead to a soft lockup due to misinterpreted descriptor statuses. An attacker with control over IOMMU operations could potentially trigger a deadlock, causing system instability.

  • CVE-2024-49994

    In the Linux kernel, the following vulnerability has been resolved: block: fix integer overflow in BLKSECDISCARD.

  • CVE-2024-49995

    A string buffer over-run was found in the Linux kernel. Copying media_name and if_name to name_parts may overwrite the destination, resulting in a software crash.

  • CVE-2024-49999

    In the Linux kernel, the following vulnerability has been resolved: afs: Fix the setting of the server responding flag.

  • CVE-2024-50002

    In the Linux kernel, the following vulnerability has been resolved: static_call: Handle module init failure correctly in static_call_del_module().

  • CVE-2024-50006

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix i_data_sem unlock order in ext4_ind_migrate().

  • CVE-2024-50008

    In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext().

  • CVE-2024-50009

    In the Linux kernel, the following vulnerability has been resolved: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value.

  • CVE-2024-50013

    In the Linux kernel, the following vulnerability has been resolved: exfat: fix memory leak in exfat_load_bitmap().

  • CVE-2024-50014

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix access to uninitialised lock in fc replay path.

  • CVE-2024-50015

    In the Linux kernel, the following vulnerability has been resolved: ext4: dax: fix overflowing extents beyond inode size when partially writing.

  • CVE-2024-50018

    A vulnerability has been identified in the Linux kernel's networking (net: napi) subsystem, where an integer overflow in napi_defer_hard_irqs allowed writing values exceeding S32_MAX, causing unintended negative values. This could lead to unexpected behavior in NAPI IRQ deferral, potentially impacting network performance. An attacker with sysfs write access could exploit this to manipulate IRQ handling inconsistently.

  • CVE-2024-50019

    In the Linux kernel, the following vulnerability has been resolved: kthread: unpark only parked kthread.

  • CVE-2024-50022

    In the Linux kernel, the following vulnerability has been resolved: device-dax: correct pgoff align in dax_set_mapping().

  • CVE-2024-50023

    In the Linux kernel, the following vulnerability has been resolved: net: phy: Remove LED entry from LEDs list on unregister.

  • CVE-2024-50024

    In the Linux kernel, the following vulnerability has been resolved: net: Fix an unsafe loop on the list.

  • CVE-2024-50027

    In the Linux kernel, the following vulnerability has been resolved: thermal: core: Free tzp copy along with the thermal zone.

  • CVE-2024-50028

    In the Linux kernel, the following vulnerability has been resolved: thermal: core: Reference count the zone in thermal_zone_get_by_id().

  • CVE-2024-50029

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync.

  • CVE-2024-50033

    In the Linux kernel, the following vulnerability has been resolved: slip: make slhc_remember() more robust against malicious packets.

  • CVE-2024-50035

    In the Linux kernel, the following vulnerability has been resolved: ppp: fix ppp_async_encode() illegal access.

  • CVE-2024-50038

    In the Linux kernel, the following vulnerability has been resolved: netfilter: xtables: avoid NFPROTO_UNSPEC where needed.

  • CVE-2024-50039

    In the Linux kernel, the following vulnerability has been resolved: net/sched: accept TCA_STAB only for root qdisc.

  • CVE-2024-50044

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change.

  • CVE-2024-50046

    In the Linux kernel, the following vulnerability has been resolved: NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies().

  • CVE-2024-50047

    In the Linux kernel, the following vulnerability has been resolved: smb: client: fix UAF in async decryption.

  • CVE-2024-50055

    In the Linux kernel, the following vulnerability has been resolved: driver core: bus: Fix double free in driver API bus_register().

  • CVE-2024-50057

    In the Linux kernel, the following vulnerability has been resolved: usb: typec: tipd: Free IRQ only if it was requested before.

  • CVE-2024-50058

    In the Linux kernel, the following vulnerability has been resolved: serial: protect uart_port_dtr_rts() in uart_shutdown() too.

  • CVE-2024-50064

    In the Linux kernel, the following vulnerability has been resolved: zram: free secondary algorithms names.

  • CVE-2024-50067

    In the Linux kernel, the following vulnerability has been resolved: uprobe: avoid out-of-bounds memory access of fetching args.

  • CVE-2024-50073

    In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux.

  • CVE-2024-50074

    In the Linux kernel, the following vulnerability has been resolved: parport: Proper fix for array out-of-bounds access.

  • CVE-2024-50075

    In the Linux kernel, the following vulnerability has been resolved: xhci: tegra: fix checked USB2 port number.

  • CVE-2024-50077

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Fix multiple init when debugfs is disabled.

  • CVE-2024-50078

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Call iso_exit() on module unload.

  • CVE-2024-50081

    In the Linux kernel, the following vulnerability has been resolved: blk-mq: setup queue ->tag_set before initializing hctx.

  • CVE-2024-50082

    In the Linux kernel, the following vulnerability has been resolved: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race.

  • CVE-2024-50093

    In the Linux kernel, the following vulnerability has been resolved: thermal: intel: int340x: processor: Fix warning during module unload.

  • CVE-2024-50101

    In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices.

  • CVE-2024-50102

    In the Linux kernel, the following vulnerability has been resolved: x86: fix user address masking non-canonical speculation issue.

  • CVE-2024-50106

    In the Linux kernel, the following vulnerability has been resolved: nfsd: fix race between laundromat and free_stateid.

  • CVE-2024-50107

    In the Linux kernel, the following vulnerability has been resolved: platform/x86/intel/pmc: Fix pmc_core_iounmap to call iounmap for valid addresses.

  • CVE-2024-50109

    In the Linux kernel, the following vulnerability has been resolved: md/raid10: fix null ptr dereference in raid10_size().

  • CVE-2024-50117

    In the Linux kernel, the following vulnerability has been resolved: drm/amd: Guard against bad data for ATIF ACPI method.

  • CVE-2024-50120

    In the Linux kernel, the following vulnerability has been resolved: smb: client: Handle kstrdup failures for passwords.

  • CVE-2024-50121

    In the Linux kernel, the following vulnerability has been resolved: nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net.

  • CVE-2024-50126

    In the Linux kernel, the following vulnerability has been resolved: net: sched: use RCU read-side critical section in taprio_dump().

  • CVE-2024-50127

    In the Linux kernel, the following vulnerability has been resolved: net: sched: fix use-after-free in taprio_change().

  • CVE-2024-50128

    In the Linux kernel, the following vulnerability has been resolved: net: wwan: fix global oob in wwan_rtnl_policy.

  • CVE-2024-50130

    In the Linux kernel, the following vulnerability has been resolved: netfilter: bpf: must hold reference on net namespace.

  • CVE-2024-50141

    In the Linux kernel, the following vulnerability has been resolved: ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context.

  • CVE-2024-50143

    In the Linux kernel, the following vulnerability has been resolved: udf: fix uninit-value use in udf_get_fileshortad.

  • CVE-2024-50150

    In the Linux kernel, the following vulnerability has been resolved: usb: typec: altmode should keep reference to parent.

  • CVE-2024-50151

    In the Linux kernel, the following vulnerability has been resolved: smb: client: fix OOBs when building SMB2_IOCTL request.

  • CVE-2024-50152

    In the Linux kernel, the following vulnerability has been resolved: smb: client: fix possible double free in smb2_set_ea().

  • CVE-2024-50153

    In the Linux kernel, the following vulnerability has been resolved: scsi: target: core: Fix null-ptr-deref in target_alloc_device().

  • CVE-2024-50162

    In the Linux kernel, the following vulnerability has been resolved: bpf: devmap: provide rxq after redirect.

  • CVE-2024-50163

    In the Linux kernel, the following vulnerability has been resolved: bpf: Make sure internal and UAPI bpf_redirect flags don't overlap.

  • CVE-2024-50169

    In the Linux kernel, the following vulnerability has been resolved: vsock: Update rx_bytes on read_skb().

  • CVE-2024-50182

    In the Linux kernel, the following vulnerability has been resolved: secretmem: disable memfd_secret() if arch cannot set direct map.

  • CVE-2024-50186

    In the Linux kernel, the following vulnerability has been resolved: net: explicitly clear the sk pointer, when pf->create fails.

  • CVE-2024-50189

    In the Linux kernel, the following vulnerability has been resolved: HID: amd_sfh: Switch to device-managed dmam_alloc_coherent().

  • CVE-2024-50191

    In the Linux kernel, the following vulnerability has been resolved: ext4: don't set SB_RDONLY after filesystem errors.

  • CVE-2024-50197

    In the Linux kernel, the following vulnerability has been resolved: pinctrl: intel: platform: fix error path in device_for_each_child_node().

  • CVE-2024-50199

    Linux Kernel is vulnerable to a denial of service, caused by a flaw in mm/swapfile. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service.

  • CVE-2024-50200

    Linux Kernel is vulnerable to a denial of service, caused by a flaw in maple_tree. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service.

  • CVE-2024-50201

    In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Fix encoder->possible_clones.

  • CVE-2024-50215

    In the Linux kernel, the following vulnerability has been resolved: nvmet-auth: assign dh_key to NULL after kfree_sensitive.

  • CVE-2024-50216

    In the Linux kernel, the following vulnerability has been resolved: xfs: fix finding a last resort AG in xfs_filestream_pick_ag.

  • CVE-2024-50219

    A vulnerability in the Linux kernel's memory management (mm/page_alloc) has been identified, where GFP_ATOMIC order-0 allocations could fail under memory pressure, despite available highatomic reserves. This issue caused packet loss in high-performance networking environments, as observed on Cloudflare's fleet. An attacker could theoretically exploit this by inducing high memory contention, potentially impacting real-time operations. However, since the fix ensures proper fallback behavior without introducing a security risk, the issue has been rejected as a CVE.

  • CVE-2024-50228

    A vulnerability was identified in the Linux kernel’s shmem subsystem, where a data race in shmem_getattr() could cause inconsistent inode timestamps due to concurrent access by generic_fillattr() and operations like shmem_unlink() or shmem_mknod(). This issue, detected by Kernel Concurrency Sanitizer (KCSAN), could lead to unexpected behavior when retrieving file attributes. An attacker could potentially exploit this by triggering rapid file operations to induce race conditions, causing unpredictable system responses.

  • CVE-2024-50235

    In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: clear wdev->cqm_config pointer on free.

  • CVE-2024-50236

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: Fix memory leak in management tx.

  • CVE-2024-50237

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower.

  • CVE-2024-50261

    In the Linux kernel, the following vulnerability has been resolved: macsec: Fix use-after-free while sending the offloading packet.

  • CVE-2024-50271

    In the Linux kernel, the following vulnerability has been resolved: signal: restore the override_rlimit logic.

  • CVE-2024-50272

    In the Linux kernel, the following vulnerability has been resolved: filemap: Fix bounds checking in filemap_read().

  • CVE-2024-50278

    In the Linux kernel, the following vulnerability has been resolved: dm cache: fix potential out-of-bounds access on the first resume.

  • CVE-2024-50282

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read().

  • CVE-2024-50299

    In the Linux kernel, the following vulnerability has been resolved: sctp: properly validate chunk size in sctp_sf_ootb().

  • CVE-2024-50304

    In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find().

  • CVE-2024-53042

    In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow().

  • CVE-2024-53044

    In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_api: fix xa_insert() error path in tcf_block_get_ext().

  • CVE-2024-53047

    In the Linux kernel, the following vulnerability has been resolved: mptcp: init: protect sched with rcu_read_lock.

  • CVE-2024-53050

    In the Linux kernel, the following vulnerability has been resolved: drm/i915/hdcp: Add encoder check in hdcp2_get_capability.

  • CVE-2024-53051

    In the Linux kernel, the following vulnerability has been resolved: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability.

  • CVE-2024-53055

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix 6 GHz scan construction.

  • CVE-2024-53057

    In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT.

  • CVE-2024-53059

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd().

  • CVE-2024-53060

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported.

  • CVE-2024-53070

    In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: fix fault at system suspend if device was already runtime suspended.

  • CVE-2024-53072

    In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd/pmc: Detect when STB is not available.

  • CVE-2024-53074

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't leak a link on AP removal.

  • CVE-2024-53082

    In the Linux kernel, the following vulnerability has been resolved: virtio_net: Add hash_key_length check.

  • CVE-2024-53085

    In the Linux kernel, the following vulnerability has been resolved: tpm: Lock TPM chip in tpm_pm_suspend() first.

  • CVE-2024-53091

    In the Linux kernel, the following vulnerability has been resolved: bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx.

  • CVE-2024-53093

    In the Linux kernel, the following vulnerability has been resolved: nvme-multipath: defer partition scanning.

  • CVE-2024-53095

    In the Linux kernel, the following vulnerability has been resolved: smb: client: Fix use-after-free of network namespace.

  • CVE-2024-53096

    In the Linux kernel, the following vulnerability has been resolved: mm: resolve faulty mmap_region() error path behaviour.

  • CVE-2024-53097

    In the Linux kernel, the following vulnerability has been resolved: mm: krealloc: Fix MTE false alarm in __do_krealloc.

  • CVE-2024-53103

    In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer.

  • CVE-2024-53105

    In the Linux kernel, the following vulnerability has been resolved: mm: page_alloc: move mlocked flag clearance into free_pages_prepare().

  • CVE-2024-53110

    In the Linux kernel, the following vulnerability has been resolved: vp_vdpa: fix id_table array not null terminated error.

  • CVE-2024-53117

    In the Linux kernel, the following vulnerability has been resolved: virtio/vsock: Improve MSG_ZEROCOPY error handling.

  • CVE-2024-53118

    In the Linux kernel, the following vulnerability has been resolved: vsock: Fix sk_error_queue memory leak.

  • CVE-2024-53120

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: CT: Fix null-ptr-deref in add rule err flow.

  • CVE-2024-53121

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5: fs, lock FTE when checking if active.

  • CVE-2024-53123

    In the Linux kernel, the following vulnerability has been resolved: mptcp: error out earlier on disconnect.

  • CVE-2024-53124

    In the Linux kernel, the following vulnerability has been resolved: net: fix data-races around sk->sk_forward_alloc.

  • CVE-2024-53134

    In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx93-blk-ctrl: correct remove path.

  • CVE-2024-53136

    In the Linux kernel, the following vulnerability has been resolved: mm: revert "mm: shmem: fix data-race in shmem_getattr()".

  • CVE-2024-53142

    In the Linux kernel, the following vulnerability has been resolved: initramfs: avoid filename buffer overrun.

  • CVE-2024-53146

    In the Linux kernel, the following vulnerability has been resolved: NFSD: Prevent a potential integer overflow.

  • CVE-2024-53152

    In the Linux kernel, the following vulnerability has been resolved: PCI: tegra194: Move controller cleanups to pex_ep_event_pex_rst_deassert().

  • CVE-2024-53156

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service().

  • CVE-2024-53160

    In the Linux kernel, the following vulnerability has been resolved: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu.

  • CVE-2024-53161

    In the Linux kernel, the following vulnerability has been resolved: EDAC/bluefield: Fix potential integer overflow.

  • CVE-2024-53164

    In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ordering of qlen adjustment.

  • CVE-2024-53166

    In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix bfqq uaf in bfq_limit_depth().

  • CVE-2024-53173

    In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open().

  • CVE-2024-53174

    In the Linux kernel, the following vulnerability has been resolved: SUNRPC: make sure cache entry active before cache_show.

  • CVE-2024-53190

    A deadlock condition exists in the Linux kernel. During the probe of rtl8192cu, the driver ends-up performing an refuse read procedure and the read_efuse() function calls read_efuse_byte() based on the efuse size.

  • CVE-2024-53194

    In the Linux kernel, the following vulnerability has been resolved: PCI: Fix use-after-free of slot->bus on hot remove.

  • CVE-2024-53203

    In the Linux kernel, the following vulnerability has been resolved: usb: typec: fix potential array underflow in ucsi_ccg_sync_control().

  • CVE-2024-53208

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync.

  • CVE-2024-53213

    In the Linux kernel, the following vulnerability has been resolved: net: usb: lan78xx: Fix double free issue with interrupt buffer allocation.

  • CVE-2024-53222

    In the Linux kernel, the following vulnerability has been resolved: zram: fix NULL pointer in comp_algorithm_show().

  • CVE-2024-53224

    In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Move events notifier registration to be after device registration.

  • CVE-2024-53237

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: fix use-after-free in device_for_each_child().

  • CVE-2024-53681

    In the Linux kernel, the following vulnerability has been resolved: nvmet: Don't overflow subsysnqn.

  • CVE-2024-54460

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: iso: Fix circular lock in iso_listen_bis.

  • CVE-2024-54680

    A vulnerability was suspected in the Linux kernel's SMB client module related to TCP timers and potential deadlocks after module removal (rmmod cifs). The issue stemmed from incorrect manual manipulation of sk->sk_net_refcnt, which led to TCP timers not being properly cleared, causing lockdep warnings and deadlocks. However, this was an internal kernel misconfiguration affecting cleanup behavior rather than a security flaw exploitable by an attacker. Since no privilege escalation or data exposure was possible, this does not qualify as a security vulnerability.

  • CVE-2024-56535

    In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: coex: check NULL return of kmalloc in btc_fw_set_monreg().

  • CVE-2024-56544

    In the Linux kernel, the following vulnerability has been resolved: udmabuf: change folios array from kmalloc to kvmalloc.

  • CVE-2024-56551

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix usage slab after free.

  • CVE-2024-56558

    In the Linux kernel, the following vulnerability has been resolved: nfsd: make sure exp active before svc_export_show.

  • CVE-2024-56562

    A vulnerability was found in the i3c_master_put_i3c_addrs() function in the Linux kernel's i3c driver. A memory management issue can occur due to a copy-paste error between "dyn_addr" and "init_dyn_addr", which leads to incorrect handling of memory, potentially causing resource mismanagement and instability within the system.

  • CVE-2024-56566

    A use-after-free list corruption vulnerability was found in the Linux kernel. If an allocated object fails in alloc_consistency_checks, all objects of the slab will be marked as used and the slab will be removed from the partial list. When an object belonging to the slab gets freed later, the remove_full() function is called. Since the slab is neither on the partial list nor on the full list, it eventually leads to a list corruption.

  • CVE-2024-56570

    In the Linux kernel, the following vulnerability has been resolved: ovl: Filter invalid inodes with missing lookup function.

  • CVE-2024-56590

    A use-after-free vulnerability was found in the Linux kernel. The Bluetooth firmware isn't checked if skb contains an ACL header, otherwise the code may attempt to access some uninitialized or invalid memory past the valid skb->data.

  • CVE-2024-56591

    A flaw was found in the Bluetooth subsystem of the Linux kernel, in the handling of delayed work within the hci_conn (Host Controller Interface connection) structure. The kernel used cancel_delayed_work_sync() when shutting down a connection, which cancels ongoing work but allows rescheduling. This could result in use-after-free conditions if the work is resubmitted after the associated object has been freed. Replacing it with disable_delayed_work_sync() prevents further scheduling, ensuring proper cleanup. A local attacker could potentially exploit this to trigger a use-after-free, leading to a denial of service or possible code execution.

  • CVE-2024-56600

    In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create().

  • CVE-2024-56601

    In the Linux kernel, the following vulnerability has been resolved: net: inet: do not leave a dangling sk pointer in inet_create().

  • CVE-2024-56602

    In the Linux kernel, the following vulnerability has been resolved: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create().

  • CVE-2024-56604

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc().

  • CVE-2024-56605

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create().

  • CVE-2024-56611

    In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM.

  • CVE-2024-56614

    In the Linux kernel, the following vulnerability has been resolved: xsk: fix OOB map writes when deleting elements.

  • CVE-2024-56616

    In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Fix MST sideband message body length check.

  • CVE-2024-56623

    In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix use after free on unload.

  • CVE-2024-56631

    In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Fix slab-use-after-free read in sg_release().

  • CVE-2024-56642

    In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free of kernel socket in cleanup_bearer().

  • CVE-2024-56644

    Linux Kernel is vulnerable to a denial of service, caused by a dst objects leak in ip6_negative_advice() when executed for an expired IPv6 route located in the exception table.

  • CVE-2024-56647

    In the Linux kernel, the following vulnerability has been resolved: net: Fix icmp host relookup triggering ip_rt_bug.

  • CVE-2024-56653

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btmtk: avoid UAF in btmtk_process_coredump.

  • CVE-2024-56654

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating.

  • CVE-2024-56663

    In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one.

  • CVE-2024-56664

    In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix race between element replace and close().

  • CVE-2024-56667

    In the Linux kernel, the following vulnerability has been resolved: drm/i915: Fix NULL pointer dereference in capture_engine.

  • CVE-2024-56688

    In the Linux kernel, the following vulnerability has been resolved: sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport.

  • CVE-2024-56693

    In the Linux kernel, the following vulnerability has been resolved: brd: defer automatic disk creation until module initialization succeeds.

  • CVE-2024-56729

    In the Linux kernel, the following vulnerability has been resolved: smb: Initialize cfid->tcon before performing network ops.

  • CVE-2024-56757

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: mediatek: add intf release flow when usb disconnect.

  • CVE-2024-56760

    In the Linux kernel, the following vulnerability has been resolved: PCI/MSI: Handle lack of irqdomain gracefully.

  • CVE-2024-56779

    In the Linux kernel, the following vulnerability has been resolved: nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur.

  • CVE-2024-56783

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_socket: remove WARN_ON_ONCE on maximum cgroup level.

  • CVE-2024-57798

    In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req().

  • CVE-2024-57809

    A flaw was found in the PCI-imx6 module in the Linux kernel. The suspend/resume support is missing in the i.MX6QDL platforms, allowing certain drivers, such as ath10k and iwlwifi, to crash after resuming, causing a kernel hang and a denial of service.

  • CVE-2024-57843

    In the Linux kernel, the following vulnerability has been resolved: virtio-net: fix overflow inside virtnet_rq_alloc.

  • CVE-2024-57879

    Linux Kernel is vulnerable to a denial of service, caused by a flaw related to hci_get_route holds the device before returning in Bluetooth.

  • CVE-2024-57884

    In the Linux kernel, the following vulnerability has been resolved: mm: vmscan: account for free pages to prevent infinite.

  • CVE-2024-57888

    In the Linux kernel, the following vulnerability has been resolved: workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker.

  • CVE-2024-57890

    In the Linux kernel, the following vulnerability has been resolved: RDMA/uverbs: Prevent integer overflow issue.

  • CVE-2024-57894

    A vulnerability was identified in the Linux kernel's Bluetooth: hci_core package, where a sleeping function (mutex_lock) was improperly invoked from an invalid context within the HCI event handling workqueue, potentially leading to kernel warnings or deadlocks. An attacker exploiting this flaw could trigger crafted Bluetooth events or malformed packets to indirectly cause system instability or denial of service through workqueue execution paths.

  • CVE-2024-57898

    In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: clear link ID from bitmap during link delete after clean up.

  • CVE-2024-57929

    In the Linux kernel, the following vulnerability has been resolved: dm array: fix releasing a faulty array block twice in dm_array_cursor_end.

  • CVE-2024-57931

    In the Linux kernel, the following vulnerability has been resolved: selinux: ignore unknown extended permissions.

  • CVE-2024-57940

    In the Linux kernel, the following vulnerability has been resolved: exfat: fix the infinite loop in exfat_readdir().

  • CVE-2024-58009

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc.

  • CVE-2024-58064

    In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: tests: Fix potential NULL dereference in test_cfg80211_parse_colocated_ap().

  • CVE-2024-58099

    In the Linux kernel, the following vulnerability has been resolved: vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame.

  • CVE-2025-1272

    The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. Additionally unsigned modules can be loaded, leading to execution of untrusted code breaking breaking any Secure Boot protection. This vulnerability affects only Fedora Linux.

  • CVE-2025-21646

    In the Linux kernel, the following vulnerability has been resolved: afs: Fix the maximum cell name length.

  • CVE-2025-21663

    In the Linux kernel, the following vulnerability has been resolved: net: stmmac: dwmac-tegra: Read iommu stream id from device tree.

  • CVE-2025-21666

    In the Linux kernel, the following vulnerability has been resolved: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space].

  • CVE-2025-21668

    In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8mp-blk-ctrl: add missing loop break condition.

  • CVE-2025-21669

    In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: discard packets if the transport changes.

  • CVE-2025-21689

    In the Linux kernel, the following vulnerability has been resolved: USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb().

  • CVE-2025-21694

    In the Linux kernel, the following vulnerability has been resolved: fs/proc: fix softlockup in __read_vmcore.

Severity level

CVE Score CVSS 2.0 Score CVSS 3.x Score CVSS 4.0
no information 5.5 no information
no information 4.7 no information
no information 6.7 no information
no information 6.7 no information
no information 6.7 no information
no information 5.5 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.7 no information
no information 4.7 no information
no information 7.1 no information
no information 4.8 no information
no information 5.5 no information
no information 4.4 no information
no information 5.5 no information
no information 7.8 no information
no information 5.5 no information
no information 5.5 no information
no information 5.2 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 5.5 no information
no information 7.1 no information
no information 5.5 no information
no information 7.1 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 6.1 no information
no information 4.7 no information
no information 5.5 no information
no information 7.1 no information
no information 7.0 no information
no information 5.7 no information
no information 5.5 no information
no information 0.0 no information
no information 7.1 no information
no information 5.5 no information
no information 5.5 no information
no information 6.7 no information
no information 6.6 no information
no information 5.5 no information
no information 5.5 no information
no information 6.7 no information
no information 4.4 no information
no information 6.6 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 7.0 no information
no information 5.5 no information
no information 6.7 no information
no information 5.5 no information
no information 4.7 no information
no information 7.1 no information
no information 7.1 no information
no information 7.1 no information
no information 6.7 no information
no information 7.1 no information
no information 5.5 no information
no information 7.1 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 5.5 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 6.7 no information
no information 4.7 no information
no information 6.6 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 7.1 no information
no information 5.5 no information
no information 5.5 no information
no information 6.7 no information
no information 4.4 no information
no information 4.7 no information
no information 4.7 no information
no information 4.7 no information
no information 4.7 no information
no information 5.5 no information
no information 6.5 no information
no information 5.5 no information
no information 6.5 no information
no information 5.5 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 7.1 no information
no information 5.5 no information
no information 3.3 no information
no information 5.5 no information
no information 4.7 no information
no information 6.7 no information
no information 5.5 no information
no information 5.7 no information
no information 7.1 no information
no information 5.5 no information
no information 7.1 no information
no information 7.1 no information
no information 6.1 no information
no information 3.3 no information
no information 5.5 no information
no information 5.5 no information
no information 6.7 no information
no information 5.5 no information
no information 6.7 no information
no information 5.5 no information
no information 7.1 no information
no information 6.7 no information
no information 4.4 no information
no information 5.5 no information
no information 7.1 no information
no information 5.5 no information
no information 6.4 no information
no information 5.5 no information
no information 4.3 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 6.4 no information
no information 5.5 no information
no information 5.5 no information
no information 6.8 no information
no information 4.7 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 7.1 no information
no information 5.5 no information
no information 4.4 no information
no information 4.1 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 5.5 no information
no information 6.0 no information
no information 5.5 no information
no information 4.4 no information
no information 7.1 no information
no information 5.5 no information
no information 5.5 no information
no information 4.7 no information
no information 5.5 no information
no information 5.5 no information
no information 6.1 no information
no information 5.5 no information
no information 4.4 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.7 no information
no information 5.5 no information
no information 4.4 no information
no information 7.1 no information
no information 5.5 no information
no information 7.1 no information
no information 5.5 no information
no information 5.5 no information
no information 4.7 no information
no information 5.5 no information
no information 6.7 no information
no information 6.7 no information
no information 0.0 no information
no information 5.5 no information
no information 5.5 no information
no information 7.3 no information
no information 5.5 no information
no information 5.5 no information
no information 6.0 no information
no information 5.5 no information
no information 4.4 no information
no information 4.4 no information
no information 4.1 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 7.0 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.7 no information
no information 5.7 no information
no information 7.8 no information
no information 7.0 no information
no information 7.1 no information
no information 4.7 no information
no information 5.5 no information
no information 7.0 no information
no information 5.5 no information
no information 7.8 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 6.7 no information
no information 4.4 no information
no information 5.5 no information
no information 4.4 no information
no information 5.5 no information
no information 7.1 no information
no information 4.4 no information
no information 6.7 no information
no information 4.4 no information
no information 5.5 no information
no information 7.0 no information
no information 6.7 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 6.1 no information
no information 5.5 no information
no information 5.5 no information
no information 7.1 no information
no information 6.7 no information
no information 5.5 no information
no information 5.5 no information
no information 3.3 no information
no information 5.5 no information
no information 3.3 no information
no information 5.5 no information
no information 4.4 no information
no information 4.4 no information
no information 6.7 no information
no information 7.0 no information
no information 5.5 no information
no information 4.4 no information
no information 4.4 no information
no information 4.4 no information
no information 7.1 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 6.7 no information
no information 6.1 no information
no information 3.3 no information
no information 6.3 no information
no information 5.5 no information
no information 5.5 no information
no information 6.1 no information
no information 6.1 no information
no information 4.4 no information
no information 4.4 no information
no information 5.5 no information
no information 4.7 no information
no information 5.5 no information
no information 4.7 no information
no information 6.0 no information
no information 5.5 no information
no information 6.4 no information
no information 7.1 no information
no information 6.3 no information
no information 3.8 no information
no information 4.1 no information
no information 6.7 no information
no information 7.0 no information
no information 7.1 no information
no information 5.5 no information
no information 5.5 no information
no information 6.7 no information
no information 6.8 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 6.7 no information
no information 6.7 no information
no information 5.7 no information
no information 4.4 no information
no information 5.5 no information
no information 4.4 no information
no information 6.7 no information
no information 7.1 no information
no information 4.4 no information
no information 5.5 no information
no information 6.7 no information
no information 4.4 no information
no information 5.5 no information
no information 7.3 no information
no information 7.3 no information
no information 5.5 no information
no information 6.8 no information
no information 7.0 no information
no information 5.5 no information
no information 6.7 no information
no information 6.7 no information
no information 6.0 no information
no information 6.7 no information
no information 7.1 no information
no information 4.7 no information
no information 5.5 no information
no information 6.7 no information
no information 5.5 no information
no information 7.1 no information
no information 6.4 no information
no information 5.5 no information
no information 5.5 no information
no information 6.7 no information
no information 4.7 no information
no information 5.5 no information
no information 5.5 no information
no information 6.3 no information
no information 5.5 no information
no information 6.7 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 6.0 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 7.0 no information
NIST — CVE-2025-1272
no information 7.7 no information
no information 5.5 no information
no information 4.4 no information
no information 5.5 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 4.1 no information
Critical, important, moderate, low

Updated packages