CVE-2024-38587
- EPSS 0.17%
- Veröffentlicht 19.06.2024 14:15:18
- Zuletzt bearbeitet 04.11.2025 18:16:27
In the Linux kernel, the following vulnerability has been resolved: speakup: Fix sizeof() vs ARRAY_SIZE() bug The "buf" pointer is an array of u16 values. This code should be using ARRAY_SIZE() (which is 256) instead of sizeof() (which is 512), ot...
CVE-2024-38572
- EPSS 0.04%
- Veröffentlicht 19.06.2024 14:15:17
- Zuletzt bearbeitet 17.09.2025 21:05:01
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix out-of-bound access of qmi_invoke_handler() Currently, there is no terminator entry for ath12k_qmi_msg_handlers hence facing below KASAN warning, ==============...
CVE-2024-38573
- EPSS 0.07%
- Veröffentlicht 19.06.2024 14:15:17
- Zuletzt bearbeitet 01.04.2025 18:24:49
In the Linux kernel, the following vulnerability has been resolved: cppc_cpufreq: Fix possible null pointer dereference cppc_cpufreq_get_rate() and hisi_cppc_cpufreq_get_rate() can be called from different places with various parameters. So cpufreq...
CVE-2024-38576
- EPSS 0.12%
- Veröffentlicht 19.06.2024 14:15:17
- Zuletzt bearbeitet 01.04.2025 18:25:12
In the Linux kernel, the following vulnerability has been resolved: rcu: Fix buffer overflow in print_cpu_stall_info() The rcuc-starvation output from print_cpu_stall_info() might overflow the buffer if there is a huge difference in jiffies differe...
CVE-2024-38578
- EPSS 0.02%
- Veröffentlicht 19.06.2024 14:15:17
- Zuletzt bearbeitet 04.11.2025 18:16:26
In the Linux kernel, the following vulnerability has been resolved: ecryptfs: Fix buffer size for tag 66 packet The 'TAG 66 Packet Format' description is missing the cipher code and checksum fields that are packed into the message packet. As a resu...
CVE-2024-38579
- EPSS 0.01%
- Veröffentlicht 19.06.2024 14:15:17
- Zuletzt bearbeitet 04.11.2025 18:16:27
In the Linux kernel, the following vulnerability has been resolved: crypto: bcm - Fix pointer arithmetic In spu2_dump_omd() value of ptr is increased by ciph_key_len instead of hash_iv_len which could lead to going beyond the buffer boundaries. Fix...
CVE-2024-38559
- EPSS 0.01%
- Veröffentlicht 19.06.2024 14:15:16
- Zuletzt bearbeitet 04.11.2025 18:16:26
In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on thi...
CVE-2024-38564
- EPSS 0.01%
- Veröffentlicht 19.06.2024 14:15:16
- Zuletzt bearbeitet 20.10.2025 22:04:02
In the Linux kernel, the following vulnerability has been resolved: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE bpf_prog_attach uses attach_type_to_prog_type to enforce proper attach type for BPF_PROG_TYPE_CGROUP_SK...
CVE-2024-38565
- EPSS 0.03%
- Veröffentlicht 19.06.2024 14:15:16
- Zuletzt bearbeitet 04.11.2025 18:16:26
In the Linux kernel, the following vulnerability has been resolved: wifi: ar5523: enable proper endpoint verification Syzkaller reports [1] hitting a warning about an endpoint in use not having an expected type to it. Fix the issue by checking for...
CVE-2024-38566
- EPSS 0.02%
- Veröffentlicht 19.06.2024 14:15:16
- Zuletzt bearbeitet 17.09.2025 21:04:44
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix verifier assumptions about socket->sk The verifier assumes that 'sk' field in 'struct socket' is valid and non-NULL when 'socket' pointer itself is trusted and non-NULL. T...