Latest CVE Feed
-
7.8
HIGHCVE-2024-50051
In the Linux kernel, the following vulnerability has been resolved: spi: mpc52xx: Add cancel_work_sync before module remove If we remove the module which will call mpc52xx_spi_remove it will free 'ms' through spi_unregister_controller. while the work ms... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Feb. 10, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2024-49573
In the Linux kernel, the following vulnerability has been resolved: sched/fair: Fix NEXT_BUDDY Adam reports that enabling NEXT_BUDDY insta triggers a WARN in pick_next_entity(). Moving clear_buddies() up before the delayed dequeue bits ensures no ->nex... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Jan. 11, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2024-49571
In the Linux kernel, the following vulnerability has been resolved: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg When receiving proposal msg in server, the field iparea_offset and the field ipv6_prefixes_cnt in proposal... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Jan. 11, 2025
- Vuln Type: Denial of Service
-
0.0
NACVE-2024-49569
In the Linux kernel, the following vulnerability has been resolved: nvme-rdma: unquiesce admin_q before destroy it Kernel will hang on destroy admin_q while we create ctrl failed, such as following calltrace: PID: 23644 TASK: ff2d52b40f439fc0 CPU: ... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Apr. 25, 2025
- Vuln Type: Denial of Service
-
0.0
NACVE-2024-49568
In the Linux kernel, the following vulnerability has been resolved: net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg When receiving proposal msg in server, the fields v2_ext_offset/ eid_cnt/ism_gid_cnt in proposal msg are fro... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Jan. 11, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2024-48881
In the Linux kernel, the following vulnerability has been resolved: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again Commit 028ddcac477b ("bcache: Remove unnecessary NULL point check in node allocations") leads a NULL pointer deference in cache... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Jan. 31, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2024-48876
In the Linux kernel, the following vulnerability has been resolved: stackdepot: fix stack_depot_save_flags() in NMI context Per documentation, stack_depot_save_flags() was meant to be usable from NMI context if STACK_DEPOT_FLAG_CAN_ALLOC is unset. Howe... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Jan. 11, 2025
- Vuln Type: Race Condition
-
5.5
MEDIUMCVE-2024-48875
In the Linux kernel, the following vulnerability has been resolved: btrfs: don't take dev_replace rwsem on task already holding it Running fstests btrfs/011 with MKFS_OPTIONS="-O rst" to force the usage of the RAID stripe-tree, we get the following spla... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Feb. 03, 2025
- Vuln Type: Race Condition
-
5.5
MEDIUMCVE-2024-48873
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: check return value of ieee80211_probereq_get() for RNR The return value of ieee80211_probereq_get() might be NULL, so check it before using to avoid NULL pointer access. A... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Jan. 31, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2024-47809
In the Linux kernel, the following vulnerability has been resolved: dlm: fix possible lkb_resource null dereference This patch fixes a possible null pointer dereference when this function is called from request_lock() as lkb->lkb_resource is not assigne... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Jan. 31, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2024-47794
In the Linux kernel, the following vulnerability has been resolved: bpf: Prevent tailcall infinite loop caused by freplace There is a potential infinite loop issue that can occur when using a combination of tail calls and freplace. In an upcoming selft... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Jan. 11, 2025
- Vuln Type: Denial of Service
-
0.0
NACVE-2024-47408
In the Linux kernel, the following vulnerability has been resolved: net/smc: check smcd_v2_ext_offset when receiving proposal msg When receiving proposal msg in server, the field smcd_v2_ext_offset in proposal msg is from the remote client and can not b... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Jan. 11, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2024-47143
In the Linux kernel, the following vulnerability has been resolved: dma-debug: fix a possible deadlock on radix_lock radix_lock() shouldn't be held while holding dma_hash_entry[idx].lock otherwise, there's a possible deadlock scenario when dma debug API... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Feb. 03, 2025
- Vuln Type: Race Condition
-
5.5
MEDIUMCVE-2024-47141
In the Linux kernel, the following vulnerability has been resolved: pinmux: Use sequential access to access desc->pinmux data When two client of the same gpio call pinctrl_select_state() for the same functionality, we are seeing NULL pointer issue while... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Jan. 31, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2024-46896
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: don't access invalid sched Since 2320c9e6a768 ("drm/sched: memset() 'job' in drm_sched_job_init()") accessing job->base.sched can produce unexpected results as the initialis... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Jan. 11, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2024-45828
In the Linux kernel, the following vulnerability has been resolved: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request Bus cleanup path in DMA mode may trigger a RING_OP_STAT interrupt when the ring is being stopped. Depending on timing be... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Jan. 31, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2024-43098
In the Linux kernel, the following vulnerability has been resolved: i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock A deadlock may happen since the i3c_master_register() acquires &i3cbus->lock twice. See the log be... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Feb. 03, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2024-41935
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to shrink read extent node in batches We use rwlock to protect core structure data of extent tree during its shrink, however, if there is a huge number of extent nodes in exte... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Jan. 11, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2024-41932
In the Linux kernel, the following vulnerability has been resolved: sched: fix warning in sched_setaffinity Commit 8f9ea86fdf99b added some logic to sched_setaffinity that included a WARN when a per-task affinity assignment races with a cpuset update. ... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Jan. 11, 2025
- Vuln Type: Race Condition
-
7.8
HIGHCVE-2024-41149
In the Linux kernel, the following vulnerability has been resolved: block: avoid to reuse `hctx` not removed from cpuhp callback list If the 'hctx' isn't removed from cpuhp callback list, we can't reuse it, otherwise use-after-free may be triggered.... Read more
Affected Products : linux_kernel- Published: Jan. 11, 2025
- Modified: Mar. 24, 2025
- Vuln Type: Memory Corruption