cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-53054,https://securityvulnerability.io/vulnerability/CVE-2024-53054,,Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.,Linux,Linux Kernel,5.5,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-11-19T18:15:00.000Z,0 CVE-2023-4134,https://securityvulnerability.io/vulnerability/CVE-2023-4134,Use-After-Free Vulnerability in Linux Kernel's cyttsp4_core Driver Could Lead to Denial of Service,"A use-after-free vulnerability has been identified within the cyttsp4_core driver in the Linux kernel. This vulnerability arises during the device cleanup routine, specifically linked to the potential rearming of the watchdog timer from the workqueue. Exploiting this flaw may allow a local user to trigger a system crash, resulting in a denial of service situation that can significantly affect system performance and availability.",Linux,Linux Kernel,5.5,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-11-14T11:15:00.000Z,0 CVE-2023-52340,https://securityvulnerability.io/vulnerability/CVE-2023-52340,Linux kernel IPv6 implementation vulnerable to denial of service attack via raw sockets,"A vulnerability exists within the IPv6 implementation of the Linux kernel prior to version 6.3, specifically related to the max_size threshold in net/ipv6/route.c. This issue can be exploited to induce a denial of service condition, resulting in persistent unreachable network errors when IPv6 packets are sent in a loop using a raw socket. Proper mitigation efforts are required to prevent potential service disruptions for affected systems.",Linux,Linux Kernel,7.5,HIGH,0.0004600000102072954,false,false,false,false,,false,false,2024-07-05T00:00:00.000Z,0 CVE-2023-52429,https://securityvulnerability.io/vulnerability/CVE-2023-52429,Kernel Vulnerability in dm_table_create Could Lead to Memory Corruption and Crash,"dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count.",Linux,Linux Kernel,5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-02-12T03:15:00.000Z,0 CVE-2024-25740,https://securityvulnerability.io/vulnerability/CVE-2024-25740,Memory Leak Flaw Discovered in Linux Kernel's UBI Driver,"A memory leak flaw was found in the UBI driver in drivers/mtd/ubi/attach.c in the Linux kernel through 6.7.4 for UBI_IOCATT, because kobj->name is not released.",Linux,Linux Kernel,5.5,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-02-12T03:15:00.000Z,0 CVE-2024-25741,https://securityvulnerability.io/vulnerability/CVE-2024-25741,Linux Kernel Vulnerability Affects Printer Functionality,"printer_write in drivers/usb/gadget/function/f_printer.c in the Linux kernel through 6.7.4 does not properly call usb_ep_queue, which might allow attackers to cause a denial of service or have unspecified other impact.",Linux,Linux Kernel,5.5,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-02-12T03:15:00.000Z,0 CVE-2024-25739,https://securityvulnerability.io/vulnerability/CVE-2024-25739,Zero-Byte Allocation Vulnerability in Linux Kernel Could Lead to Crash,"create_empty_lvol in drivers/mtd/ubi/vtbl.c in the Linux kernel through 6.7.4 can attempt to allocate zero bytes, and crash, because of a missing check for ubi->leb_size.",Linux,Linux Kernel,5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-02-12T03:15:00.000Z,0 CVE-2024-25744,https://securityvulnerability.io/vulnerability/CVE-2024-25744,Untrusted VMM can trigger int80 syscall handling in Linux kernel before 6.6.7,"The identified vulnerability in the Linux kernel allows an untrusted Virtual Machine Monitor (VMM) to invoke int80 syscall handling at any moment, potentially leading to security breaches and exploitation of the affected system. The issue is related to specific components within the kernel, particularly in files arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c, and affects versions prior to 6.6.7.",Linux,Linux Kernel,8.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-02-12T00:00:00.000Z,0 CVE-2024-24864,https://securityvulnerability.io/vulnerability/CVE-2024-24864,"Race Condition in Linux Kernel's media/dvb-core Could Lead to Null Pointer Dereference, Kernel Panic or Denial of Service","A race condition was found in the Linux kernel's media/dvb-core in dvbdmx_write() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue. ",Linux,Linux kernel,4.7,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-02-05T07:36:04.281Z,0 CVE-2024-24857,https://securityvulnerability.io/vulnerability/CVE-2024-24857,Integrity Overflow Issue in Linux Kernel's Net/Bluetooth Device Driver Could Lead to Bluetooth Connection Abnormality or Denial of Service,"A race condition was found in the Linux kernel's net/bluetooth device driver in conn_info_{min,max}_age_set() function. This can result in integrity overflow issue, possibly leading to bluetooth connection abnormality or denial of service. ",Linux,Linux kernel,6.8,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-02-05T07:31:31.308Z,0 CVE-2024-24858,https://securityvulnerability.io/vulnerability/CVE-2024-24858,Race Condition in Linux Kernel's net/bluetooth Could Lead to Denial of Service,"A race condition was found in the Linux kernel's net/bluetooth in {conn,adv}_{min,max}_interval_set() function. This can result in I2cap connection or broadcast abnormality issue, possibly leading to denial of service. ",Linux,Linux kernel,5.3,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-02-05T07:30:55.483Z,0 CVE-2024-24859,https://securityvulnerability.io/vulnerability/CVE-2024-24859,Race Condition in Linux Kernel's Net/Bluetooth Could Lead to Denial of Service,"A race condition was found in the Linux kernel's net/bluetooth in sniff_{min,max}_interval_set() function. This can result in a bluetooth sniffing exception issue, possibly leading denial of service. ",Linux,Linux kernel,4.8,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-02-05T07:28:06.115Z,0 CVE-2024-24860,https://securityvulnerability.io/vulnerability/CVE-2024-24860,Race Condition in Linux Kernel's Bluetooth Device Driver Could Lead to Kernel Panic or Denial of Service,"A race condition was found in the Linux kernel's bluetooth device driver in {min,max}_key_size_set() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue. ",Linux,Linux kernel,5.3,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-02-05T07:27:31.042Z,0 CVE-2024-24861,https://securityvulnerability.io/vulnerability/CVE-2024-24861,Race Condition in Linux Kernel's media/xc4000 Device Driver Could Lead to Return Value Overflow and Malfunction/Denial of Service,"A race condition was found in the Linux kernel's media/xc4000 device driver in xc4000 xc4000_get_frequency() function. This can result in return value overflow issue, possibly leading to malfunction or denial of service issue. ",Linux,Linux kernel,6.3,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-02-05T07:26:43.824Z,0 CVE-2024-24855,https://securityvulnerability.io/vulnerability/CVE-2024-24855,Race Condition in Linux Kernel's SCSI Device Driver Could Lead to Kernel Panic or Denial of Service,"A race condition was found in the Linux kernel's scsi device driver in lpfc_unregister_fcf_rescan() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue. ",Linux,Linux kernel,4.7,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-02-05T07:25:41.568Z,0 CVE-2024-23196,https://securityvulnerability.io/vulnerability/CVE-2024-23196,Race Condition in Linux Kernel's Sound/HDA Device Driver Could Lead to Null Pointer Dereference or Kernel Panic,"A race condition was found in the Linux kernel's sound/hda device driver in snd_hdac_regmap_sync() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue. ",Linux,Linux kernel,4.7,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-02-05T07:22:39.907Z,0 CVE-2024-22386,https://securityvulnerability.io/vulnerability/CVE-2024-22386,"Race Condition in Linux Kernel's drm/exynos Device Driver Could Lead to Null Pointer Dereference, Kernel Panic or Denial of Service","A race condition was found in the Linux kernel's drm/exynos device driver in exynos_drm_crtc_atomic_disable() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue. ",Linux,Linux Kernel,5.3,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-02-05T07:21:20.819Z,0 CVE-2024-21803,https://securityvulnerability.io/vulnerability/CVE-2024-21803,Possible UAF in bt_accept_poll in Linux kernel,"A Use After Free vulnerability resides within the Bluetooth modules of the Linux kernel, impacting both x86 and ARM architectures. This vulnerability permits an attacker to execute arbitrary code locally. The flaw exists in the handling of memory resources within the Bluetooth framework, specifically within the code found in the file related to Bluetooth address families. Affected versions range from v2.6.12-rc2 through to versions prior to v6.8-rc1, underscoring the necessity for users to remain vigilant and apply necessary updates or mitigations to protect their systems.",Linux,Linux kernel,7.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2024-01-30T07:15:33.276Z,0 CVE-2024-22099,https://securityvulnerability.io/vulnerability/CVE-2024-22099,NULL pointer deference in rfcomm_check_security in Linux kernel,"NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C. This issue affects Linux kernel: v2.6.12-rc2. ",Linux,Linux Kernel,5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-01-25T07:02:59.928Z,0 CVE-2024-23307,https://securityvulnerability.io/vulnerability/CVE-2024-23307,Integer overflow in raid5_cache_count in Linux kernel,"The vulnerability identified in the Linux kernel is categorized as an integer overflow or wraparound issue, specifically affecting the system's functionality in handling various operations. This flaw occurs in the md, raid, and raid5 modules, leading to forced integer overflow scenarios on systems operating with the Linux kernel on both x86 and ARM architectures. Exploitation of this vulnerability can lead to undesirable behavior in the affected systems, potentially compromising the integrity and reliability of the operations performed. System administrators and users are advised to review the security implications and apply necessary mitigations.",Linux,Linux kernel,7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-01-25T06:59:37.190Z,0 CVE-2024-22705,https://securityvulnerability.io/vulnerability/CVE-2024-22705,Out-of-Bounds Access Vulnerability in Linux Kernel ksmbd Affecting Various Distributions,"A vulnerability in the ksmbd component of the Linux kernel, found in versions prior to 6.6.10, results in out-of-bounds access during the processing of SMB2 messages. Specifically, the handling of Name data and CreateContexts can lead to errors in memory allocation, potentially allowing malicious actors to exploit these weaknesses. The function smb2_get_data_area_len located in fs/smb/server/smb2misc.c is directly impacted, presenting risks to user data integrity and system stability. It is essential for system administrators and developers to be aware of this vulnerability and apply the necessary updates to safeguard against potential threats.",Linux,Linux Kernel,7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-01-23T00:00:00.000Z,0 CVE-2023-51043,https://securityvulnerability.io/vulnerability/CVE-2023-51043,Use-After-Free Vulnerability in Linux Kernel GPU Drivers,"A use-after-free vulnerability exists in the Linux kernel's GPU drivers due to a race condition occurring between nonblocking atomic commits and driver unloads. This flaw allows attackers to exploit the timing of operations between these two actions, leading to potential data corruption or system instability. The issue affects versions of the Linux kernel prior to 6.4.5, necessitating immediate patching to mitigate associated risks. Implementing the recommended updates will help secure affected systems against possible exploitation.",Linux,Linux Kernel,7,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-01-23T00:00:00.000Z,0 CVE-2023-46343,https://securityvulnerability.io/vulnerability/CVE-2023-46343,,"In the Linux kernel before 6.5.9, there is a NULL pointer dereference in send_acknowledge in net/nfc/nci/spi.c.",Linux,Linux Kernel,5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-01-23T00:00:00.000Z,0 CVE-2024-23850,https://securityvulnerability.io/vulnerability/CVE-2024-23850,,"In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation.",Linux,Linux Kernel,5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-01-23T00:00:00.000Z,0 CVE-2024-23849,https://securityvulnerability.io/vulnerability/CVE-2024-23849,,"In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access.",Linux,Linux Kernel,5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-01-23T00:00:00.000Z,0