CVE-2024-55639 – Renesas Linux net Use After Free
The following table lists the changes that have been made to the CVE-2024-55639 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Jan. 11, 2025 Action […]
CVE-2024-54683 – Linux Kernel netfilter IDLETIMER Locking Dependency Vulnerability
The following table lists the changes that have been made to the CVE-2024-54683 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Jan. 11, 2025 Action […]
CVE-2024-54680 – Linux Kernel Samba SMB Client NetNS Reference Counting Vulnerability
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix TCP timers deadlock after rmmod Commit ef7134c7fc48 (“smb: client: Fix use-after-free of network namespace.”) fixed a netns UAF by manually enabled socket refcounting (sk->sk_net_refcnt=1 and sock_inuse_add(net, 1)). The reason the patch worked for that bug was because we now hold references to […]
CVE-2024-54460 – BlueZ Bluetooth Circular Lock
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: iso: Fix circular lock in iso_listen_bis This fixes the circular locking dependency warning below, by releasing the socket lock before enterning iso_listen_bis, to avoid any potential deadlock with hdev lock. [ 75.307983] ====================================================== [ 75.307984] WARNING: possible circular locking dependency detected [ 75.307985] 6.12.0-rc6+ […]
CVE-2024-54455 – Linux Kernel IVPU General Protection Fault
The following table lists the changes that have been made to the CVE-2024-54455 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Jan. 11, 2025 Action […]
CVE-2024-54193 – Intel IVPU Linux Kernel Runtime Information Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2024-54193 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Jan. 11, 2025 Action […]
CVE-2024-54191 – Linux Bluetooth Circular Locking Dependence Vulnerability
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: iso: Fix circular lock in iso_conn_big_sync This fixes the circular locking dependency warning below, by reworking iso_sock_recvmsg, to ensure that the socket lock is always released before calling a function that locks hdev. [ 561.670344] ====================================================== [ 561.670346] WARNING: possible circular locking dependency detected […]
CVE-2024-53704 impacts SonicWall
CVE-2024-53704 impacts SonicWall CVE-2024-53704 is a high-severity vulnerability impacting SonicWall’s SSLVPN authentication mechanism. This flaw, with a CVSS score of 8.2, allows remote attackers to bypass authentication and gain un … Read more Published Date: Jan 11, 2025 (2 hours, 10 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-12847 CVE-2024-53704 CVE-2024-51741 CVE-2024-46981 CVE-2024-54677 CVE-2024-50379 CVE-2024-38193
CVE-2025-0392 – Guangzhou Huayi Intelligent Technology Jeewms SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-0392 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 11, 2025 Action […]
CVE-2025-0391 – Guangzhou Huayi Intelligent Technology Jeewms SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-0391 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 11, 2025 Action […]