CVE-2024-35995
- EPSS 0.02%
- Veröffentlicht 20.05.2024 10:15:13
- Zuletzt bearbeitet 24.09.2025 18:21:27
In the Linux kernel, the following vulnerability has been resolved: ACPI: CPPC: Use access_width over bit_width for system memory accesses To align with ACPI 6.3+, since bit_width can be any 8-bit value, it cannot be depended on to be always on a c...
CVE-2024-35996
- EPSS 0.04%
- Veröffentlicht 20.05.2024 10:15:13
- Zuletzt bearbeitet 12.05.2026 12:16:46
In the Linux kernel, the following vulnerability has been resolved: cpu: Re-enable CPU mitigations by default for !X86 architectures Rename x86's to CPU_MITIGATIONS, define it in generic code, and force it on for all architectures exception x86. A...
CVE-2024-35997
- EPSS 0.02%
- Veröffentlicht 20.05.2024 10:15:13
- Zuletzt bearbeitet 12.05.2026 12:16:46
In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up The flag I2C_HID_READ_PENDING is used to serialize I2C operations. However, this is not necessary, because I2C cor...
CVE-2024-35973
- EPSS 0.01%
- Veröffentlicht 20.05.2024 10:15:12
- Zuletzt bearbeitet 12.05.2026 12:16:44
In the Linux kernel, the following vulnerability has been resolved: geneve: fix header validation in geneve[6]_xmit_skb syzbot is able to trigger an uninit-value in geneve_xmit() [1] Problem : While most ip tunnel helpers (like ip_tunnel_get_dsfie...
CVE-2024-35976
- EPSS 0.01%
- Veröffentlicht 20.05.2024 10:15:12
- Zuletzt bearbeitet 12.05.2026 12:16:44
In the Linux kernel, the following vulnerability has been resolved: xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING syzbot reported an illegal copy in xsk_setsockopt() [1] Make sure to validate setsockopt() @optlen parameter. [1] B...
CVE-2024-35978
- EPSS 0.01%
- Veröffentlicht 20.05.2024 10:15:12
- Zuletzt bearbeitet 12.05.2026 12:16:45
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix memory leak in hci_req_sync_complete() In 'hci_req_sync_complete()', always free the previous sync request state before assigning reference to a new one.
CVE-2024-35982
- EPSS 0.01%
- Veröffentlicht 20.05.2024 10:15:12
- Zuletzt bearbeitet 12.05.2026 12:16:45
In the Linux kernel, the following vulnerability has been resolved: batman-adv: Avoid infinite loop trying to resize local TT If the MTU of one of an attached interface becomes too small to transmit the local translation table then it must be resiz...
CVE-2024-35983
- EPSS 0.01%
- Veröffentlicht 20.05.2024 10:15:12
- Zuletzt bearbeitet 12.05.2026 12:16:45
In the Linux kernel, the following vulnerability has been resolved: bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS bits_per() rounds up to the next power of two when passed a power of two. This causes crashes on some machines...
CVE-2024-35984
- EPSS 0.01%
- Veröffentlicht 20.05.2024 10:15:12
- Zuletzt bearbeitet 12.05.2026 12:16:45
In the Linux kernel, the following vulnerability has been resolved: i2c: smbus: fix NULL function pointer dereference Baruch reported an OOPS when using the designware controller as target only. Target-only modes break the assumption of one transfe...
CVE-2024-35958
- EPSS 0.03%
- Veröffentlicht 20.05.2024 10:15:11
- Zuletzt bearbeitet 12.05.2026 12:16:43
In the Linux kernel, the following vulnerability has been resolved: net: ena: Fix incorrect descriptor free behavior ENA has two types of TX queues: - queues which only process TX packets arriving from the network stack - queues which only process ...