Andy Nguyen discovered that the Bluetooth L2CAP implementation in the Linux
kernel contained a type-confusion error. A physically proximate remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2020-12351)
Andy Nguyen discovered that the Bluetooth A2MP implementation in the Linux
kernel did not properly initialize memory in some situations. A physically
proximate remote attacker could use this to expose sensitive information
(kernel memory). (CVE-2020-12352)
Andy Nguyen discovered that the Bluetooth HCI event packet parser in the
Linux kernel did not properly handle event advertisements of certain sizes,
leading to a heap-based buffer overflow. A physically proximate remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2020-24490)
Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an integer overflow vulnerability. A local attacker could
use this to cause a denial of service (system crash). (CVE-2022-36402)
Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver
in the Linux kernel during device removal. A privileged attacker could use
this to cause a denial of service (system crash). (CVE-2023-35827)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– GPU drivers;
– I2C subsystem;
– Network drivers;
– Pin controllers subsystem;
– TTY drivers;
– USB Mass Storage drivers;
– Framebuffer layer;
– Ext4 file system;
– File systems infrastructure;
– Bluetooth subsystem;
– Kernel init infrastructure;
– DMA mapping infrastructure;
– Memory management;
– 9P file system network protocol;
– IPv4 networking;
– IPv6 networking;
– Logical Link layer;
– MAC80211 subsystem;
– Netfilter;
– NFC subsystem;
– Phonet protocol;
– Network traffic control;
– Wireless networking;
(CVE-2024-44947, CVE-2023-52594, CVE-2024-35886, CVE-2024-38633,
CVE-2023-52509, CVE-2024-26625, CVE-2024-36946, CVE-2024-45021,
CVE-2024-36270, CVE-2021-47118, CVE-2024-43884, CVE-2024-36941,
CVE-2024-38619, CVE-2021-47501, CVE-2024-49967, CVE-2024-42090,
CVE-2024-40912, CVE-2024-36968, CVE-2024-53057, CVE-2023-52507,
CVE-2024-42101, CVE-2021-47086, CVE-2024-42153, CVE-2024-40959,
CVE-2024-26777, CVE-2024-44944, CVE-2024-43856, CVE-2024-39301)
More Stories
mingw-python-jinja2-3.1.5-1.fc40
FEDORA-2025-5f04326f4f Packages in this update: mingw-python-jinja2-3.1.5-1.fc40 Update description: Update to jinja2-3.1.5. Read More
mingw-python-jinja2-3.1.5-1.fc41
FEDORA-2025-dbe19a2b1f Packages in this update: mingw-python-jinja2-3.1.5-1.fc41 Update description: Update to jinja2-3.1.5. Read More
seamonkey-2.53.20-2.el8
FEDORA-EPEL-2025-ef6b6c8d41 Packages in this update: seamonkey-2.53.20-2.el8 Update description: Fix bookmarks restoring from file. Update to 2.53.20 Read More
seamonkey-2.53.20-2.fc40
FEDORA-2025-4945eb6eeb Packages in this update: seamonkey-2.53.20-2.fc40 Update description: Fix bookmarks restoring from file. Update to 2.53.20 Read More
seamonkey-2.53.20-2.fc41
FEDORA-2025-135cf1b7f3 Packages in this update: seamonkey-2.53.20-2.fc41 Update description: Fix bookmarks restoring from file. Update to 2.53.20 Read More
USN-7190-1: Tinyproxy vulnerability
It was discovered that Tinyproxy did not properly manage memory during the parsing of HTTP connection headers. An attacker could...