CVE-2024-35813
- EPSS 0.01%
- Veröffentlicht 17.05.2024 14:15:15
- Zuletzt bearbeitet 12.05.2026 12:16:36
In the Linux kernel, the following vulnerability has been resolved: mmc: core: Avoid negative index with array access Commit 4d0c8d0aef63 ("mmc: core: Use mrq.sbc in close-ended ffu") assigns prev_idata = idatas[i - 1], but doesn't check that the i...
CVE-2024-35814
- EPSS 0.02%
- Veröffentlicht 17.05.2024 14:15:15
- Zuletzt bearbeitet 19.09.2025 16:16:45
In the Linux kernel, the following vulnerability has been resolved: swiotlb: Fix double-allocation of slots due to broken alignment handling Commit bbb73a103fbb ("swiotlb: fix a braino in the alignment check fix"), which was a fix for commit 0eee5a...
CVE-2024-35807
- EPSS 0.01%
- Veröffentlicht 17.05.2024 14:15:14
- Zuletzt bearbeitet 12.05.2026 12:16:36
In the Linux kernel, the following vulnerability has been resolved: ext4: fix corruption during on-line resize We observed a corruption during on-line resize of a file system that is larger than 16 TiB with 4k block size. With having more then 2^32...
CVE-2024-35808
- EPSS 0.01%
- Veröffentlicht 17.05.2024 14:15:14
- Zuletzt bearbeitet 19.09.2025 16:02:27
In the Linux kernel, the following vulnerability has been resolved: md/dm-raid: don't call md_reap_sync_thread() directly Currently md_reap_sync_thread() is called from raid_message() directly without holding 'reconfig_mutex', this is definitely un...
CVE-2024-35809
- EPSS 0.01%
- Veröffentlicht 17.05.2024 14:15:14
- Zuletzt bearbeitet 23.12.2025 18:29:25
In the Linux kernel, the following vulnerability has been resolved: PCI/PM: Drain runtime-idle callbacks before driver removal A race condition between the .runtime_idle() callback and the .remove() callback in the rtsx_pcr PCI driver leads to a ke...
CVE-2024-35810
- EPSS 0.01%
- Veröffentlicht 17.05.2024 14:15:14
- Zuletzt bearbeitet 26.09.2025 15:56:44
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix the lifetime of the bo cursor memory The cleanup can be dispatched while the atomic update is still active, which means that the memory acquired in the atomic updat...
CVE-2024-35803
- EPSS 0.01%
- Veröffentlicht 17.05.2024 14:15:13
- Zuletzt bearbeitet 26.09.2025 15:57:45
In the Linux kernel, the following vulnerability has been resolved: x86/efistub: Call mixed mode boot services on the firmware's stack Normally, the EFI stub calls into the EFI boot services using the stack that was live when the stub was entered. ...
CVE-2024-35804
- EPSS 0.02%
- Veröffentlicht 17.05.2024 14:15:13
- Zuletzt bearbeitet 19.09.2025 15:58:56
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Mark target gfn of emulated atomic instruction as dirty When emulating an atomic access on behalf of the guest, mark the target gfn dirty if the CMPXCHG by KVM is attempt...
CVE-2024-35805
- EPSS 0.01%
- Veröffentlicht 17.05.2024 14:15:13
- Zuletzt bearbeitet 12.05.2026 12:16:36
In the Linux kernel, the following vulnerability has been resolved: dm snapshot: fix lockup in dm_exception_table_exit There was reported lockup when we exit a snapshot with many exceptions. Fix this by adding "cond_resched" to the loop that frees ...
CVE-2024-35798
- EPSS 0.01%
- Veröffentlicht 17.05.2024 14:15:12
- Zuletzt bearbeitet 19.09.2025 15:13:44
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix race in read_extent_buffer_pages() There are reports from tree-checker that detects corrupted nodes, without any obvious pattern so possibly an overwrite in memory. Afte...