Количество 21
Количество 21
CVE-2024-41069
In the Linux kernel, the following vulnerability has been resolved: ASoC: topology: Fix references to freed memory Most users after parsing a topology file, release memory used by it, so having pointer references directly into topology file contents is wrong. Use devm_kmemdup(), to allocate memory as needed.
CVE-2024-41069
In the Linux kernel, the following vulnerability has been resolved: ASoC: topology: Fix references to freed memory Most users after parsing a topology file, release memory used by it, so having pointer references directly into topology file contents is wrong. Use devm_kmemdup(), to allocate memory as needed.
CVE-2024-41069
In the Linux kernel, the following vulnerability has been resolved: ASoC: topology: Fix references to freed memory Most users after parsing a topology file, release memory used by it, so having pointer references directly into topology file contents is wrong. Use devm_kmemdup(), to allocate memory as needed.
CVE-2024-41069
ASoC: topology: Fix references to freed memory
CVE-2024-41069
In the Linux kernel, the following vulnerability has been resolved: A ...
GHSA-298c-rvvp-xh7q
In the Linux kernel, the following vulnerability has been resolved: ASoC: topology: Fix references to freed memory Most users after parsing a topology file, release memory used by it, so having pointer references directly into topology file contents is wrong. Use devm_kmemdup(), to allocate memory as needed.
BDU:2025-08041
Уязвимость компонента soc-topology.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
ROS-20260112-7347
Уязвимость kernel-lt
SUSE-SU-2025:02627-1
Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3)
SUSE-SU-2025:02636-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)
SUSE-SU-2025:02691-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)
SUSE-SU-2025:02601-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)
SUSE-SU-2024:2923-1
Security update for the Linux Kernel
SUSE-SU-2024:2948-1
Security update for the Linux Kernel
SUSE-SU-2024:2929-1
Security update for the Linux Kernel
SUSE-SU-2024:2947-1
Security update for the Linux Kernel
SUSE-SU-2024:2894-1
Security update for the Linux Kernel
SUSE-SU-2024:3195-1
Security update for the Linux Kernel
SUSE-SU-2024:3383-1
Security update for the Linux Kernel
SUSE-SU-2024:3194-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-41069 In the Linux kernel, the following vulnerability has been resolved: ASoC: topology: Fix references to freed memory Most users after parsing a topology file, release memory used by it, so having pointer references directly into topology file contents is wrong. Use devm_kmemdup(), to allocate memory as needed. | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
CVE-2024-41069 In the Linux kernel, the following vulnerability has been resolved: ASoC: topology: Fix references to freed memory Most users after parsing a topology file, release memory used by it, so having pointer references directly into topology file contents is wrong. Use devm_kmemdup(), to allocate memory as needed. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
CVE-2024-41069 In the Linux kernel, the following vulnerability has been resolved: ASoC: topology: Fix references to freed memory Most users after parsing a topology file, release memory used by it, so having pointer references directly into topology file contents is wrong. Use devm_kmemdup(), to allocate memory as needed. | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
CVE-2024-41069 ASoC: topology: Fix references to freed memory | 0% Низкий | 4 месяца назад | ||
CVE-2024-41069 In the Linux kernel, the following vulnerability has been resolved: A ... | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
GHSA-298c-rvvp-xh7q In the Linux kernel, the following vulnerability has been resolved: ASoC: topology: Fix references to freed memory Most users after parsing a topology file, release memory used by it, so having pointer references directly into topology file contents is wrong. Use devm_kmemdup(), to allocate memory as needed. | CVSS3: 7.1 | 0% Низкий | больше 1 года назад | |
BDU:2025-08041 Уязвимость компонента soc-topology.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
ROS-20260112-7347 Уязвимость kernel-lt | CVSS3: 7.8 | 0% Низкий | 4 дня назад | |
SUSE-SU-2025:02627-1 Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3) | 5 месяцев назад | |||
SUSE-SU-2025:02636-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) | 5 месяцев назад | |||
SUSE-SU-2025:02691-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) | 5 месяцев назад | |||
SUSE-SU-2025:02601-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 6 месяцев назад | |||
SUSE-SU-2024:2923-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:2948-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:2929-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:2947-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:2894-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:3195-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:3383-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:3194-1 Security update for the Linux Kernel | больше 1 года назад |
Уязвимостей на страницу