Логотип exploitDog
bind:"CVE-2024-50302" OR bind:"CVE-2024-53197" OR bind:"CVE-2024-57807" OR bind:"CVE-2024-57979"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-50302" OR bind:"CVE-2024-53197" OR bind:"CVE-2024-57807" OR bind:"CVE-2024-57979"

Количество 91

Количество 91

suse-cvrf логотип

SUSE-SU-2025:0908-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0906-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0903-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0892-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0886-1

5 месяцев назад

Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0943-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0898-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)

EPSS: Низкий
ubuntu логотип

CVE-2024-57979

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: pps: Fix a use-after-free On a board running ntpd and gpsd, I'm seeing a consistent use-after-free in sys_exit() from gpsd when rebooting: pps pps1: removed ------------[ cut here ]------------ kobject: '(null)' (00000000db4bec24): is not initialized, yet kobject_put() is being called. WARNING: CPU: 2 PID: 440 at lib/kobject.c:734 kobject_put+0x120/0x150 CPU: 2 UID: 299 PID: 440 Comm: gpsd Not tainted 6.11.0-rc6-00308-gb31c44928842 #1 Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT) pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : kobject_put+0x120/0x150 lr : kobject_put+0x120/0x150 sp : ffffffc0803d3ae0 x29: ffffffc0803d3ae0 x28: ffffff8042dc9738 x27: 0000000000000001 x26: 0000000000000000 x25: ffffff8042dc9040 x24: ffffff8042dc9440 x23: ffffff80402a4620 x22: ffffff8042ef4bd0 x21: ffffff80405cb600 x20: 000000000008001b x19: ffffff8040b3b6e0 x18: 0000000000000000 x17: 0000000000000000 x16: 0000...

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2024-57979

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: pps: Fix a use-after-free On a board running ntpd and gpsd, I'm seeing a consistent use-after-free in sys_exit() from gpsd when rebooting: pps pps1: removed ------------[ cut here ]------------ kobject: '(null)' (00000000db4bec24): is not initialized, yet kobject_put() is being called. WARNING: CPU: 2 PID: 440 at lib/kobject.c:734 kobject_put+0x120/0x150 CPU: 2 UID: 299 PID: 440 Comm: gpsd Not tainted 6.11.0-rc6-00308-gb31c44928842 #1 Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT) pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : kobject_put+0x120/0x150 lr : kobject_put+0x120/0x150 sp : ffffffc0803d3ae0 x29: ffffffc0803d3ae0 x28: ffffff8042dc9738 x27: 0000000000000001 x26: 0000000000000000 x25: ffffff8042dc9040 x24: ffffff8042dc9440 x23: ffffff80402a4620 x22: ffffff8042ef4bd0 x21: ffffff80405cb600 x20: 000000000008001b x19: ffffff8040b3b6e0 x18: 0000000000000000 x17: 0000000000000000 x16: 0000...

CVSS3: 6.4
EPSS: Низкий
nvd логотип

CVE-2024-57979

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: pps: Fix a use-after-free On a board running ntpd and gpsd, I'm seeing a consistent use-after-free in sys_exit() from gpsd when rebooting: pps pps1: removed ------------[ cut here ]------------ kobject: '(null)' (00000000db4bec24): is not initialized, yet kobject_put() is being called. WARNING: CPU: 2 PID: 440 at lib/kobject.c:734 kobject_put+0x120/0x150 CPU: 2 UID: 299 PID: 440 Comm: gpsd Not tainted 6.11.0-rc6-00308-gb31c44928842 #1 Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT) pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : kobject_put+0x120/0x150 lr : kobject_put+0x120/0x150 sp : ffffffc0803d3ae0 x29: ffffffc0803d3ae0 x28: ffffff8042dc9738 x27: 0000000000000001 x26: 0000000000000000 x25: ffffff8042dc9040 x24: ffffff8042dc9440 x23: ffffff80402a4620 x22: ffffff8042ef4bd0 x21: ffffff80405cb600 x20: 000000000008001b x19: ffffff8040b3b6

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2024-57979

3 месяца назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2024-57979

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: p ...

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2024-57807

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: megaraid_sas: Fix for a potential deadlock This fixes a 'possible circular locking dependency detected' warning CPU0 CPU1 ---- ---- lock(&instance->reset_mutex); lock(&shost->scan_mutex); lock(&instance->reset_mutex); lock(&shost->scan_mutex); Fix this by temporarily releasing the reset_mutex.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2024-57807

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: megaraid_sas: Fix for a potential deadlock This fixes a 'possible circular locking dependency detected' warning CPU0 CPU1 ---- ---- lock(&instance->reset_mutex); lock(&shost->scan_mutex); lock(&instance->reset_mutex); lock(&shost->scan_mutex); Fix this by temporarily releasing the reset_mutex.

CVSS3: 4.1
EPSS: Низкий
nvd логотип

CVE-2024-57807

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: megaraid_sas: Fix for a potential deadlock This fixes a 'possible circular locking dependency detected' warning CPU0 CPU1 ---- ---- lock(&instance->reset_mutex); lock(&shost->scan_mutex); lock(&instance->reset_mutex); lock(&shost->scan_mutex); Fix this by temporarily releasing the reset_mutex.

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2024-57807

5 месяцев назад

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2024-57807

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: s ...

CVSS3: 5.5
EPSS: Низкий
oracle-oval логотип

ELSA-2025-20100

6 месяцев назад

ELSA-2025-20100: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20095

6 месяцев назад

ELSA-2025-20095: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4388-1

8 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2025:0908-1

Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0906-1

Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0903-1

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0892-1

Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0886-1

Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0943-1

Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0898-1

Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)

5 месяцев назад
ubuntu логотип
CVE-2024-57979

In the Linux kernel, the following vulnerability has been resolved: pps: Fix a use-after-free On a board running ntpd and gpsd, I'm seeing a consistent use-after-free in sys_exit() from gpsd when rebooting: pps pps1: removed ------------[ cut here ]------------ kobject: '(null)' (00000000db4bec24): is not initialized, yet kobject_put() is being called. WARNING: CPU: 2 PID: 440 at lib/kobject.c:734 kobject_put+0x120/0x150 CPU: 2 UID: 299 PID: 440 Comm: gpsd Not tainted 6.11.0-rc6-00308-gb31c44928842 #1 Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT) pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : kobject_put+0x120/0x150 lr : kobject_put+0x120/0x150 sp : ffffffc0803d3ae0 x29: ffffffc0803d3ae0 x28: ffffff8042dc9738 x27: 0000000000000001 x26: 0000000000000000 x25: ffffff8042dc9040 x24: ffffff8042dc9440 x23: ffffff80402a4620 x22: ffffff8042ef4bd0 x21: ffffff80405cb600 x20: 000000000008001b x19: ffffff8040b3b6e0 x18: 0000000000000000 x17: 0000000000000000 x16: 0000...

CVSS3: 7.8
0%
Низкий
5 месяцев назад
redhat логотип
CVE-2024-57979

In the Linux kernel, the following vulnerability has been resolved: pps: Fix a use-after-free On a board running ntpd and gpsd, I'm seeing a consistent use-after-free in sys_exit() from gpsd when rebooting: pps pps1: removed ------------[ cut here ]------------ kobject: '(null)' (00000000db4bec24): is not initialized, yet kobject_put() is being called. WARNING: CPU: 2 PID: 440 at lib/kobject.c:734 kobject_put+0x120/0x150 CPU: 2 UID: 299 PID: 440 Comm: gpsd Not tainted 6.11.0-rc6-00308-gb31c44928842 #1 Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT) pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : kobject_put+0x120/0x150 lr : kobject_put+0x120/0x150 sp : ffffffc0803d3ae0 x29: ffffffc0803d3ae0 x28: ffffff8042dc9738 x27: 0000000000000001 x26: 0000000000000000 x25: ffffff8042dc9040 x24: ffffff8042dc9440 x23: ffffff80402a4620 x22: ffffff8042ef4bd0 x21: ffffff80405cb600 x20: 000000000008001b x19: ffffff8040b3b6e0 x18: 0000000000000000 x17: 0000000000000000 x16: 0000...

CVSS3: 6.4
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2024-57979

In the Linux kernel, the following vulnerability has been resolved: pps: Fix a use-after-free On a board running ntpd and gpsd, I'm seeing a consistent use-after-free in sys_exit() from gpsd when rebooting: pps pps1: removed ------------[ cut here ]------------ kobject: '(null)' (00000000db4bec24): is not initialized, yet kobject_put() is being called. WARNING: CPU: 2 PID: 440 at lib/kobject.c:734 kobject_put+0x120/0x150 CPU: 2 UID: 299 PID: 440 Comm: gpsd Not tainted 6.11.0-rc6-00308-gb31c44928842 #1 Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT) pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : kobject_put+0x120/0x150 lr : kobject_put+0x120/0x150 sp : ffffffc0803d3ae0 x29: ffffffc0803d3ae0 x28: ffffff8042dc9738 x27: 0000000000000001 x26: 0000000000000000 x25: ffffff8042dc9040 x24: ffffff8042dc9440 x23: ffffff80402a4620 x22: ffffff8042ef4bd0 x21: ffffff80405cb600 x20: 000000000008001b x19: ffffff8040b3b6

CVSS3: 7.8
0%
Низкий
5 месяцев назад
msrc логотип
CVSS3: 7.8
0%
Низкий
3 месяца назад
debian логотип
CVE-2024-57979

In the Linux kernel, the following vulnerability has been resolved: p ...

CVSS3: 7.8
0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2024-57807

In the Linux kernel, the following vulnerability has been resolved: scsi: megaraid_sas: Fix for a potential deadlock This fixes a 'possible circular locking dependency detected' warning CPU0 CPU1 ---- ---- lock(&instance->reset_mutex); lock(&shost->scan_mutex); lock(&instance->reset_mutex); lock(&shost->scan_mutex); Fix this by temporarily releasing the reset_mutex.

CVSS3: 5.5
0%
Низкий
7 месяцев назад
redhat логотип
CVE-2024-57807

In the Linux kernel, the following vulnerability has been resolved: scsi: megaraid_sas: Fix for a potential deadlock This fixes a 'possible circular locking dependency detected' warning CPU0 CPU1 ---- ---- lock(&instance->reset_mutex); lock(&shost->scan_mutex); lock(&instance->reset_mutex); lock(&shost->scan_mutex); Fix this by temporarily releasing the reset_mutex.

CVSS3: 4.1
0%
Низкий
7 месяцев назад
nvd логотип
CVE-2024-57807

In the Linux kernel, the following vulnerability has been resolved: scsi: megaraid_sas: Fix for a potential deadlock This fixes a 'possible circular locking dependency detected' warning CPU0 CPU1 ---- ---- lock(&instance->reset_mutex); lock(&shost->scan_mutex); lock(&instance->reset_mutex); lock(&shost->scan_mutex); Fix this by temporarily releasing the reset_mutex.

CVSS3: 5.5
0%
Низкий
7 месяцев назад
msrc логотип
CVSS3: 5.5
0%
Низкий
5 месяцев назад
debian логотип
CVE-2024-57807

In the Linux kernel, the following vulnerability has been resolved: s ...

CVSS3: 5.5
0%
Низкий
7 месяцев назад
oracle-oval логотип
ELSA-2025-20100

ELSA-2025-20100: Unbreakable Enterprise kernel security update (IMPORTANT)

6 месяцев назад
oracle-oval логотип
ELSA-2025-20095

ELSA-2025-20095: Unbreakable Enterprise kernel security update (IMPORTANT)

6 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4388-1

Security update for the Linux Kernel

8 месяцев назад

Уязвимостей на страницу