Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2024-10-29 CVE-2024-50071 Double Free vulnerability in Linux Kernel 6.11/6.12
In the Linux kernel, the following vulnerability has been resolved: pinctrl: nuvoton: fix a double free in ma35_pinctrl_dt_node_to_map_func() 'new_map' is allocated using devm_* which takes care of freeing the allocated data on device removal, call to .dt_free_map = pinconf_generic_dt_free_map double frees the map as pinconf_generic_dt_free_map() calls pinctrl_utils_free_map(). Fix this by using kcalloc() instead of auto-managed devm_kcalloc().
local
low complexity
linux CWE-415
7.8
2024-10-29 CVE-2024-50072 Unspecified vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: x86/bugs: Use code segment selector for VERW operand Robert Gill reported below #GP in 32-bit mode when dosemu software was executing vm86() system call: general protection fault: 0000 [#1] PREEMPT SMP CPU: 4 PID: 4610 Comm: dosemu.bin Not tainted 6.6.21-gentoo-x86 #1 Hardware name: Dell Inc.
local
low complexity
linux
5.5
2024-10-29 CVE-2024-50073 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux BUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] Read of size 8 at addr ffff88815fe99c00 by task poc/3379 CPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56 Hardware name: VMware, Inc.
local
low complexity
linux CWE-416
7.8
2024-10-29 CVE-2024-50074 Out-of-bounds Read vulnerability in multiple products
In the Linux kernel, the following vulnerability has been resolved: parport: Proper fix for array out-of-bounds access The recent fix for array out-of-bounds accesses replaced sprintf() calls blindly with snprintf().
local
low complexity
linux redhat CWE-125
7.8
2024-10-29 CVE-2024-50075 Unspecified vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: xhci: tegra: fix checked USB2 port number If USB virtualizatoin is enabled, USB2 ports are shared between all Virtual Functions.
local
low complexity
linux
5.5
2024-10-29 CVE-2024-50076 Missing Initialization of Resource vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: vt: prevent kernel-infoleak in con_font_get() font.data may not initialize all memory spaces depending on the implementation of vc->vc_sw->con_font_get.
network
low complexity
linux CWE-909
6.5
2024-10-29 CVE-2024-50077 Unspecified vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Fix multiple init when debugfs is disabled If bt_debugfs is not created successfully, which happens if either CONFIG_DEBUG_FS or CONFIG_DEBUG_FS_ALLOW_ALL is unset, then iso_init() returns early and does not set iso_inited to true.
local
low complexity
linux
5.5
2024-10-29 CVE-2024-50078 Unspecified vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Call iso_exit() on module unload If iso_init() has been called, iso_exit() must be called on module unload.
local
low complexity
linux
5.5
2024-10-29 CVE-2024-50079 Unspecified vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: io_uring/sqpoll: ensure task state is TASK_RUNNING when running task_work When the sqpoll is exiting and cancels pending work items, it may need to run task_work.
local
low complexity
linux
5.5
2024-10-29 CVE-2024-50080 Unspecified vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: ublk: don't allow user copy for unprivileged device UBLK_F_USER_COPY requires userspace to call write() on ublk char device for filling request buffer, and unprivileged device can't be trusted. So don't allow user copy for unprivileged device.
local
low complexity
linux
5.5