Vulnerabilities > Linux > Linux Kernel > 4.19.149

DATE CVE VULNERABILITY TITLE RISK
2024-04-03 CVE-2024-26775 Improper Locking vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: aoe: avoid potential deadlock at set_capacity Move set_capacity() outside of the section procected by (&d->lock). To avoid possible interrupt unsafe locking scenario: CPU0 CPU1 ---- ---- [1] lock(&bdev->bd_size_lock); local_irq_disable(); [2] lock(&d->lock); [3] lock(&bdev->bd_size_lock); <Interrupt> [4] lock(&d->lock); *** DEADLOCK *** Where [1](&bdev->bd_size_lock) hold by zram_add()->set_capacity(). [2]lock(&d->lock) hold by aoeblk_gdalloc().
local
low complexity
linux CWE-667
5.5
2024-04-03 CVE-2024-26776 NULL Pointer Dereference vulnerability in multiple products
In the Linux kernel, the following vulnerability has been resolved: spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected Return IRQ_NONE from the interrupt handler when no interrupt was detected.
local
low complexity
linux debian CWE-476
5.5
2024-04-03 CVE-2024-26777 Divide By Zero vulnerability in multiple products
In the Linux kernel, the following vulnerability has been resolved: fbdev: sis: Error out if pixclock equals zero The userspace program could pass any values to the driver through ioctl() interface.
local
low complexity
linux debian CWE-369
5.5
2024-04-03 CVE-2024-26778 Divide By Zero vulnerability in multiple products
In the Linux kernel, the following vulnerability has been resolved: fbdev: savage: Error out if pixclock equals zero The userspace program could pass any values to the driver through ioctl() interface.
local
low complexity
linux debian CWE-369
5.5
2024-04-03 CVE-2023-52638 Improper Locking vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock The following 3 locks would race against each other, causing the deadlock situation in the Syzbot bug report: - j1939_socks_lock - active_session_list_lock - sk_session_queue_lock A reasonable fix is to change j1939_socks_lock to an rwlock, since in the rare situations where a write lock is required for the linked list that j1939_socks_lock is protecting, the code does not attempt to acquire any more locks.
local
low complexity
linux CWE-667
5.5
2024-04-03 CVE-2023-52639 Race Condition vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: KVM: s390: vsie: fix race during shadow creation Right now it is possible to see gmap->private being zero in kvm_s390_vsie_gmap_notifier resulting in a crash.
local
high complexity
linux CWE-362
4.7
2024-04-03 CVE-2024-26686 Improper Locking vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats lock_task_sighand() can trigger a hard lockup.
local
low complexity
linux CWE-667
5.5
2024-04-03 CVE-2024-26687 Incomplete Cleanup vulnerability in multiple products
In the Linux kernel, the following vulnerability has been resolved: xen/events: close evtchn after mapping cleanup shutdown_pirq and startup_pirq are not taking the irq_mapping_update_lock because they can't due to lock inversion.
local
low complexity
linux debian CWE-459
5.5
2024-04-03 CVE-2024-26689 Use After Free vulnerability in multiple products
In the Linux kernel, the following vulnerability has been resolved: ceph: prevent use-after-free in encode_cap_msg() In fs/ceph/caps.c, in encode_cap_msg(), "use after free" error was caught by KASAN at this line - 'ceph_buffer_get(arg->xattr_buf);'.
local
low complexity
linux debian CWE-416
7.8
2024-04-03 CVE-2024-26691 Unspecified vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Fix circular locking dependency The rule inside kvm enforces that the vcpu->mutex is taken *inside* kvm->lock.
local
low complexity
linux
5.5