Vulnerabilities > Linux > Linux Kernel > 2.6.31.5

DATE CVE VULNERABILITY TITLE RISK
2024-04-03 CVE-2024-26767 Infinite Loop vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fixed integer types and null check locations [why]: issues fixed: - comparison with wider integer type in loop condition which can cause infinite loops - pointer dereference before null check
local
low complexity
linux CWE-835
5.5
2024-04-03 CVE-2024-26770 NULL Pointer Dereference vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: HID: nvidia-shield: Add missing null pointer checks to LED initialization devm_kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure.
local
low complexity
linux CWE-476
5.5
2024-04-03 CVE-2024-26771 NULL Pointer Dereference vulnerability in multiple products
In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: edma: Add some null pointer checks to the edma_probe devm_kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure.
local
low complexity
linux debian CWE-476
5.5
2024-04-03 CVE-2024-26774 Divide By Zero vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt Determine if bb_fragments is 0 instead of determining bb_free to eliminate the risk of dividing by zero when the block bitmap is corrupted.
local
low complexity
linux CWE-369
5.5
2024-04-03 CVE-2024-26775 Improper Locking vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: aoe: avoid potential deadlock at set_capacity Move set_capacity() outside of the section procected by (&d->lock). To avoid possible interrupt unsafe locking scenario: CPU0 CPU1 ---- ---- [1] lock(&bdev->bd_size_lock); local_irq_disable(); [2] lock(&d->lock); [3] lock(&bdev->bd_size_lock); <Interrupt> [4] lock(&d->lock); *** DEADLOCK *** Where [1](&bdev->bd_size_lock) hold by zram_add()->set_capacity(). [2]lock(&d->lock) hold by aoeblk_gdalloc().
local
low complexity
linux CWE-667
5.5
2024-04-03 CVE-2024-26776 NULL Pointer Dereference vulnerability in multiple products
In the Linux kernel, the following vulnerability has been resolved: spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected Return IRQ_NONE from the interrupt handler when no interrupt was detected.
local
low complexity
linux debian CWE-476
5.5
2024-04-03 CVE-2024-26777 Divide By Zero vulnerability in multiple products
In the Linux kernel, the following vulnerability has been resolved: fbdev: sis: Error out if pixclock equals zero The userspace program could pass any values to the driver through ioctl() interface.
local
low complexity
linux debian CWE-369
5.5
2024-04-03 CVE-2024-26778 Divide By Zero vulnerability in multiple products
In the Linux kernel, the following vulnerability has been resolved: fbdev: savage: Error out if pixclock equals zero The userspace program could pass any values to the driver through ioctl() interface.
local
low complexity
linux debian CWE-369
5.5
2024-04-03 CVE-2023-52638 Improper Locking vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock The following 3 locks would race against each other, causing the deadlock situation in the Syzbot bug report: - j1939_socks_lock - active_session_list_lock - sk_session_queue_lock A reasonable fix is to change j1939_socks_lock to an rwlock, since in the rare situations where a write lock is required for the linked list that j1939_socks_lock is protecting, the code does not attempt to acquire any more locks.
local
low complexity
linux CWE-667
5.5
2024-04-03 CVE-2024-26689 Use After Free vulnerability in multiple products
In the Linux kernel, the following vulnerability has been resolved: ceph: prevent use-after-free in encode_cap_msg() In fs/ceph/caps.c, in encode_cap_msg(), "use after free" error was caught by KASAN at this line - 'ceph_buffer_get(arg->xattr_buf);'.
local
low complexity
linux debian CWE-416
7.8