CVE-2023-52699
- EPSS 0.1%
- Published 19.05.2024 11:15:47
- Last modified 04.04.2025 14:24:16
In the Linux kernel, the following vulnerability has been resolved: sysv: don't call sb_bread() with pointers_lock held syzbot is reporting sleep in atomic context in SysV filesystem [1], for sb_bread() is called with rw_spinlock held. A "write_lo...
CVE-2024-35916
- EPSS 0.13%
- Published 19.05.2024 09:15:12
- Last modified 04.04.2025 14:24:30
In the Linux kernel, the following vulnerability has been resolved: dma-buf: Fix NULL pointer dereference in sanitycheck() If due to a memory allocation failure mock_chain() returns NULL, it is passed to dma_fence_enable_sw_signaling() resulting in...
CVE-2024-35917
- EPSS 0.03%
- Published 19.05.2024 09:15:12
- Last modified 23.09.2025 15:26:14
In the Linux kernel, the following vulnerability has been resolved: s390/bpf: Fix bpf_plt pointer arithmetic Kui-Feng Lee reported a crash on s390x triggered by the dummy_st_ops/dummy_init_ptr_arg test [1]: [<0000000000000002>] 0x2 [<000000000...
CVE-2024-35902
- EPSS 0.02%
- Published 19.05.2024 09:15:11
- Last modified 30.12.2024 19:47:46
In the Linux kernel, the following vulnerability has been resolved: net/rds: fix possible cp null dereference cp might be null, calling cp->cp_conn would produce null dereference [Simon Horman adds:] Analysis: * cp is a parameter of __rds_rdma_m...
CVE-2024-35903
- EPSS 0.03%
- Published 19.05.2024 09:15:11
- Last modified 24.09.2025 21:06:54
In the Linux kernel, the following vulnerability has been resolved: x86/bpf: Fix IP after emitting call depth accounting Adjust the IP passed to `emit_patch` so it calculates the correct offset for the CALL instruction if `x86_call_depth_emit_accou...
CVE-2024-35904
- EPSS 0.02%
- Published 19.05.2024 09:15:11
- Last modified 03.02.2025 16:03:31
In the Linux kernel, the following vulnerability has been resolved: selinux: avoid dereference of garbage after mount failure In case kern_mount() fails and returns an error pointer return in the error branch instead of continuing and dereferencing...
CVE-2024-35905
- EPSS 0.02%
- Published 19.05.2024 09:15:11
- Last modified 30.12.2024 19:47:30
In the Linux kernel, the following vulnerability has been resolved: bpf: Protect against int overflow for stack access size This patch re-introduces protection against the size of access to stack memory being negative; the access size can appear ne...
CVE-2024-35907
- EPSS 0.03%
- Published 19.05.2024 09:15:11
- Last modified 30.12.2024 19:35:53
In the Linux kernel, the following vulnerability has been resolved: mlxbf_gige: call request_irq() after NAPI initialized The mlxbf_gige driver encounters a NULL pointer exception in mlxbf_gige_open() when kdump is enabled. The sequence to reprodu...
CVE-2024-35908
- EPSS 0.03%
- Published 19.05.2024 09:15:11
- Last modified 24.09.2025 18:52:20
In the Linux kernel, the following vulnerability has been resolved: tls: get psock ref after taking rxlock to avoid leak At the start of tls_sw_recvmsg, we take a reference on the psock, and then call tls_rx_reader_lock. If that fails, we return di...
CVE-2024-35909
- EPSS 0.03%
- Published 19.05.2024 09:15:11
- Last modified 24.09.2025 18:51:02
In the Linux kernel, the following vulnerability has been resolved: net: wwan: t7xx: Split 64bit accesses to fix alignment issues Some of the registers are aligned on a 32bit boundary, causing alignment faults on 64bit platforms. Unable to handle...