Latest CVE Feed
-
5.5
MEDIUMCVE-2024-26849
In the Linux kernel, the following vulnerability has been resolved: netlink: add nla be16/32 types to minlen array BUG: KMSAN: uninit-value in nla_validate_range_unsigned lib/nlattr.c:222 [inline] BUG: KMSAN: uninit-value in nla_validate_int_range lib/n... Read more
Affected Products : linux_kernel- Published: Apr. 17, 2024
- Modified: Feb. 03, 2025
-
5.5
MEDIUMCVE-2024-26840
In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix memory leak in cachefiles_add_cache() The following memory leak was reported after unbinding /dev/cachefiles: ==========================================================... Read more
Affected Products : linux_kernel- Published: Apr. 17, 2024
- Modified: Jan. 07, 2025
-
5.5
MEDIUMCVE-2024-26832
In the Linux kernel, the following vulnerability has been resolved: mm: zswap: fix missing folio cleanup in writeback race path In zswap_writeback_entry(), after we get a folio from __read_swap_cache_async(), we grab the tree lock again to check that th... Read more
Affected Products : linux_kernel- Published: Apr. 17, 2024
- Modified: Apr. 02, 2025
-
5.5
MEDIUMCVE-2024-26826
In the Linux kernel, the following vulnerability has been resolved: mptcp: fix data re-injection from stale subflow When the MPTCP PM detects that a subflow is stale, all the packet scheduler must re-inject all the mptcp-level unacked data. To avoid acq... Read more
Affected Products : linux_kernel- Published: Apr. 17, 2024
- Modified: Mar. 27, 2025
-
5.5
MEDIUMCVE-2024-26818
In the Linux kernel, the following vulnerability has been resolved: tools/rtla: Fix clang warning about mount_point var size clang is reporting this warning: $ make HOSTCC=clang CC=clang LLVM_IAS=1 [...] clang -O -g -DVERSION=\"6.8.0-rc3\" -flto=auto -... Read more
Affected Products : linux_kernel- Published: Apr. 17, 2024
- Modified: Mar. 27, 2025
-
5.5
MEDIUMCVE-2024-26808
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain Remove netdevice from inet/ingress basechain in case NETDEV_UNREGISTER event is reported, otherwise a st... Read more
- Published: Apr. 04, 2024
- Modified: Apr. 04, 2025
-
5.5
MEDIUMCVE-2024-26803
In the Linux kernel, the following vulnerability has been resolved: net: veth: clear GRO when clearing XDP even when down veth sets NETIF_F_GRO automatically when XDP is enabled, because both features use the same NAPI machinery. The logic to clear NET... Read more
Affected Products : linux_kernel- Published: Apr. 04, 2024
- Modified: Apr. 01, 2025
-
5.5
MEDIUMCVE-2024-26801
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Avoid potential use-after-free in hci_error_reset While handling the HCI_EV_HARDWARE_ERROR event, if the underlying BT controller is not responding, the GPIO reset mechanism ... Read more
Affected Products : linux_kernel- Published: Apr. 04, 2024
- Modified: Dec. 20, 2024
-
5.5
MEDIUMCVE-2024-26775
In the Linux kernel, the following vulnerability has been resolved: aoe: avoid potential deadlock at set_capacity Move set_capacity() outside of the section procected by (&d->lock). To avoid possible interrupt unsafe locking scenario: CPU0 ... Read more
Affected Products : linux_kernel- Published: Apr. 03, 2024
- Modified: Jul. 17, 2025
-
5.5
MEDIUMCVE-2024-26773
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() Determine if the group block bitmap is corrupted before using ac_b_ex in ext4_mb_try_best_found() to avoid... Read more
- Published: Apr. 03, 2024
- Modified: Mar. 18, 2025
-
5.5
MEDIUMCVE-2024-26772
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() Places the logic for checking if the group's block bitmap is corrupt under the protection of the group lock ... Read more
- Published: Apr. 03, 2024
- Modified: Apr. 04, 2025
-
5.5
MEDIUMCVE-2024-26766
In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error Unfortunately the commit `fd8958efe877` introduced another error causing the `descs` array to overflow. This reults in further crashes... Read more
- Published: Apr. 03, 2024
- Modified: Feb. 27, 2025
-
5.5
MEDIUMCVE-2024-26762
In the Linux kernel, the following vulnerability has been resolved: cxl/pci: Skip to handle RAS errors if CXL.mem device is detached The PCI AER model is an awkward fit for CXL error handling. While the expectation is that a PCI device can escalate to l... Read more
Affected Products : linux_kernel- Published: Apr. 03, 2024
- Modified: Mar. 18, 2025
-
5.5
MEDIUMCVE-2024-26758
In the Linux kernel, the following vulnerability has been resolved: md: Don't ignore suspended array in md_check_recovery() mddev_suspend() never stop sync_thread, hence it doesn't make sense to ignore suspended array in md_check_recovery(), which might... Read more
Affected Products : linux_kernel- Published: Apr. 03, 2024
- Modified: Apr. 04, 2025
-
5.5
MEDIUMCVE-2024-26756
In the Linux kernel, the following vulnerability has been resolved: md: Don't register sync_thread for reshape directly Currently, if reshape is interrupted, then reassemble the array will register sync_thread directly from pers->run(), in this case 'MD... Read more
Affected Products : linux_kernel- Published: Apr. 03, 2024
- Modified: Mar. 17, 2025
-
5.5
MEDIUMCVE-2024-26752
In the Linux kernel, the following vulnerability has been resolved: l2tp: pass correct message length to ip6_append_data l2tp_ip6_sendmsg needs to avoid accounting for the transport header twice when splicing more data into an already partially-occupied... Read more
- Published: Apr. 03, 2024
- Modified: Mar. 17, 2025
-
5.5
MEDIUMCVE-2024-26746
In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Ensure safe user copy of completion record If CONFIG_HARDENED_USERCOPY is enabled, copying completion record from event log cache to user triggers a kernel bug. [ 1987... Read more
Affected Products : linux_kernel- Published: Apr. 04, 2024
- Modified: Mar. 18, 2025
-
5.5
MEDIUMCVE-2024-26735
In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations structure for the subsystem must be registered before registering the generic netlink family.... Read more
Affected Products : linux_kernel debian_linux 8300_firmware 8700_firmware a400_firmware e-series_santricity_os_controller h615c_firmware h610s_firmware h610c_firmware c400_firmware +7 more products- Published: Apr. 03, 2024
- Modified: Mar. 17, 2025
-
5.5
MEDIUMCVE-2024-26716
In the Linux kernel, the following vulnerability has been resolved: usb: core: Prevent null pointer dereference in update_port_device_state Currently, the function update_port_device_state gets the usb_hub from udev->parent by calling usb_hub_to_struct_... Read more
Affected Products : linux_kernel- Published: Apr. 03, 2024
- Modified: Jan. 07, 2025
-
5.5
MEDIUM- EPSS Score: %0.11
- Published: Dec. 05, 2019
- Modified: Nov. 21, 2024