CVE-2024-35960
- EPSS 1.75%
- Veröffentlicht 20.05.2024 10:15:11
- Zuletzt bearbeitet 04.04.2025 14:22:45
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Properly link new fs rules into the tree Previously, add_rule_fg would only add newly created rules from the handle into the tree when they had a refcount of 1. On the ot...
CVE-2024-35962
- EPSS 0.01%
- Veröffentlicht 20.05.2024 10:15:11
- Zuletzt bearbeitet 17.12.2025 03:37:16
In the Linux kernel, the following vulnerability has been resolved: netfilter: complete validation of user input In my recent commit, I missed that do_replace() handlers use copy_from_sockptr() (which I fixed), followed by unsafe copy_from_sockptr_...
CVE-2024-35967
- EPSS 0.01%
- Veröffentlicht 20.05.2024 10:15:11
- Zuletzt bearbeitet 23.12.2025 19:17:20
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix not validating setsockopt user input syzbot reported sco_sock_setsockopt() is copying data without checking user input length. BUG: KASAN: slab-out-of-bounds i...
CVE-2024-35969
- EPSS 0.01%
- Veröffentlicht 20.05.2024 10:15:11
- Zuletzt bearbeitet 04.04.2025 14:45:29
In the Linux kernel, the following vulnerability has been resolved: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr Although ipv6_get_ifaddr walks inet6_addr_lst under the RCU lock, it still means hlist_for_each_entry_rcu can ret...
CVE-2024-35950
- EPSS 0.01%
- Veröffentlicht 20.05.2024 10:15:10
- Zuletzt bearbeitet 17.12.2025 03:38:06
In the Linux kernel, the following vulnerability has been resolved: drm/client: Fully protect modes[] with dev->mode_config.mutex The modes[] array contains pointers to modes on the connectors' mode lists, which are protected by dev->mode_config.mu...
CVE-2024-35955
- EPSS 0.34%
- Veröffentlicht 20.05.2024 10:15:10
- Zuletzt bearbeitet 04.04.2025 14:23:00
In the Linux kernel, the following vulnerability has been resolved: kprobes: Fix possible use-after-free issue on kprobe registration When unloading a module, its state is changing MODULE_STATE_LIVE -> MODULE_STATE_GOING -> MODULE_STATE_UNFORMED. ...
CVE-2024-35947
- EPSS 0.02%
- Veröffentlicht 19.05.2024 12:15:08
- Zuletzt bearbeitet 04.04.2025 14:23:31
In the Linux kernel, the following vulnerability has been resolved: dyndbg: fix old BUG_ON in >control parser Fix a BUG_ON from 2009. Even if it looks "unreachable" (I didn't really look), lets make sure by removing it, doing pr_err and return -EI...
CVE-2024-35944
- EPSS 0.01%
- Veröffentlicht 19.05.2024 11:15:50
- Zuletzt bearbeitet 17.12.2025 03:38:40
In the Linux kernel, the following vulnerability has been resolved: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() Syzkaller hit 'WARNING in dg_dispatch_as_host' bug. memcpy: detected field-spanning write (size 56) of single field "&...
CVE-2024-35930
- EPSS 0.01%
- Veröffentlicht 19.05.2024 11:15:49
- Zuletzt bearbeitet 30.12.2024 19:52:55
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() The call to lpfc_sli4_resume_rpi() in lpfc_rcv_padisc() may return an unsuccessful status. In such cases, the elsiocb is ...
CVE-2024-35933
- EPSS 0.02%
- Veröffentlicht 19.05.2024 11:15:49
- Zuletzt bearbeitet 05.01.2026 11:16:35
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btintel: Fix null ptr deref in btintel_read_version If hci_cmd_sync_complete() is triggered and skb is NULL, then hdev->req_skb is NULL, which will cause this issue.