CVE-2024-35996
- EPSS 0.04%
- Veröffentlicht 20.05.2024 10:15:13
- Zuletzt bearbeitet 17.12.2025 03:35:26
In the Linux kernel, the following vulnerability has been resolved: cpu: Re-enable CPU mitigations by default for !X86 architectures Rename x86's to CPU_MITIGATIONS, define it in generic code, and force it on for all architectures exception x86. A...
CVE-2024-35973
- EPSS 0.01%
- Veröffentlicht 20.05.2024 10:15:12
- Zuletzt bearbeitet 04.04.2025 14:33:42
In the Linux kernel, the following vulnerability has been resolved: geneve: fix header validation in geneve[6]_xmit_skb syzbot is able to trigger an uninit-value in geneve_xmit() [1] Problem : While most ip tunnel helpers (like ip_tunnel_get_dsfie...
CVE-2024-35958
- EPSS 0.03%
- Veröffentlicht 20.05.2024 10:15:11
- Zuletzt bearbeitet 17.12.2025 03:37:36
In the Linux kernel, the following vulnerability has been resolved: net: ena: Fix incorrect descriptor free behavior ENA has two types of TX queues: - queues which only process TX packets arriving from the network stack - queues which only process ...
CVE-2024-35960
- EPSS 1.75%
- Veröffentlicht 20.05.2024 10:15:11
- Zuletzt bearbeitet 04.04.2025 14:22:45
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Properly link new fs rules into the tree Previously, add_rule_fg would only add newly created rules from the handle into the tree when they had a refcount of 1. On the ot...
CVE-2024-35962
- EPSS 0.01%
- Veröffentlicht 20.05.2024 10:15:11
- Zuletzt bearbeitet 17.12.2025 03:37:16
In the Linux kernel, the following vulnerability has been resolved: netfilter: complete validation of user input In my recent commit, I missed that do_replace() handlers use copy_from_sockptr() (which I fixed), followed by unsafe copy_from_sockptr_...
CVE-2024-35969
- EPSS 0.01%
- Veröffentlicht 20.05.2024 10:15:11
- Zuletzt bearbeitet 04.04.2025 14:45:29
In the Linux kernel, the following vulnerability has been resolved: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr Although ipv6_get_ifaddr walks inet6_addr_lst under the RCU lock, it still means hlist_for_each_entry_rcu can ret...
CVE-2024-35950
- EPSS 0.01%
- Veröffentlicht 20.05.2024 10:15:10
- Zuletzt bearbeitet 17.12.2025 03:38:06
In the Linux kernel, the following vulnerability has been resolved: drm/client: Fully protect modes[] with dev->mode_config.mutex The modes[] array contains pointers to modes on the connectors' mode lists, which are protected by dev->mode_config.mu...
CVE-2024-35955
- EPSS 0.27%
- Veröffentlicht 20.05.2024 10:15:10
- Zuletzt bearbeitet 04.04.2025 14:23:00
In the Linux kernel, the following vulnerability has been resolved: kprobes: Fix possible use-after-free issue on kprobe registration When unloading a module, its state is changing MODULE_STATE_LIVE -> MODULE_STATE_GOING -> MODULE_STATE_UNFORMED. ...
CVE-2024-35947
- EPSS 0.02%
- Veröffentlicht 19.05.2024 12:15:08
- Zuletzt bearbeitet 04.04.2025 14:23:31
In the Linux kernel, the following vulnerability has been resolved: dyndbg: fix old BUG_ON in >control parser Fix a BUG_ON from 2009. Even if it looks "unreachable" (I didn't really look), lets make sure by removing it, doing pr_err and return -EI...
CVE-2024-35944
- EPSS 0.01%
- Veröffentlicht 19.05.2024 11:15:50
- Zuletzt bearbeitet 17.12.2025 03:38:40
In the Linux kernel, the following vulnerability has been resolved: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() Syzkaller hit 'WARNING in dg_dispatch_as_host' bug. memcpy: detected field-spanning write (size 56) of single field "&...