CVE-2024-26812
- EPSS 0.01%
- Published 05.04.2024 09:15:09
- Last modified 18.03.2025 17:04:12
In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Create persistent INTx handler A vulnerability exists where the eventfd for INTx signaling can be deconfigured, which unregisters the IRQ handler but still allows eventfd...
CVE-2024-26814
- EPSS 0.01%
- Published 05.04.2024 09:15:09
- Last modified 27.03.2025 21:36:57
In the Linux kernel, the following vulnerability has been resolved: vfio/fsl-mc: Block calling interrupt handler without trigger The eventfd_ctx trigger pointer of the vfio_fsl_mc_irq object is initially NULL and may become NULL if the user sets th...
CVE-2024-27437
- EPSS 0.01%
- Published 05.04.2024 09:15:09
- Last modified 27.03.2025 21:37:24
In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Disable auto-enable of exclusive INTx IRQ Currently for devices requiring masking at the irqchip for INTx, ie. devices without DisINTx support, the IRQ is enabled in requ...
CVE-2023-38709
- EPSS 5.8%
- Published 04.04.2024 20:15:08
- Last modified 30.06.2025 12:59:08
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
CVE-2024-24795
- EPSS 1.22%
- Published 04.04.2024 20:15:08
- Last modified 30.06.2025 12:55:47
HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, ...
CVE-2024-28182
- EPSS 24.97%
- Published 04.04.2024 15:15:38
- Last modified 02.09.2025 15:49:02
nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. ...
CVE-2024-26809
- EPSS 0.01%
- Published 04.04.2024 10:15:09
- Last modified 19.03.2025 16:19:56
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: release elements in clone only from destroy path Clone already always provides a current view of the lookup table, use it to destroy the set, otherwise i...
CVE-2024-26808
- EPSS 0.01%
- Published 04.04.2024 10:15:08
- Last modified 04.04.2025 14:21:16
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain Remove netdevice from inet/ingress basechain in case NETDEV_UNREGISTER event is reported, otherwise...
CVE-2024-26804
- EPSS 0.35%
- Published 04.04.2024 09:15:09
- Last modified 21.03.2025 14:58:15
In the Linux kernel, the following vulnerability has been resolved: net: ip_tunnel: prevent perpetual headroom growth syzkaller triggered following kasan splat: BUG: KASAN: use-after-free in __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector....
CVE-2024-26805
- EPSS 0.01%
- Published 04.04.2024 09:15:09
- Last modified 27.02.2025 14:35:09
In the Linux kernel, the following vulnerability has been resolved: netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter syzbot reported the following uninit-value access issue [1]: netlink_to_full_skb() creates a new `skb` and puts the ...