CVE-2024-38578
- EPSS 0.01%
- Veröffentlicht 19.06.2024 14:15:17
- Zuletzt bearbeitet 12.05.2026 12:16:53
In the Linux kernel, the following vulnerability has been resolved: ecryptfs: Fix buffer size for tag 66 packet The 'TAG 66 Packet Format' description is missing the cipher code and checksum fields that are packed into the message packet. As a resu...
CVE-2024-38579
- EPSS 0.01%
- Veröffentlicht 19.06.2024 14:15:17
- Zuletzt bearbeitet 12.05.2026 12:16:53
In the Linux kernel, the following vulnerability has been resolved: crypto: bcm - Fix pointer arithmetic In spu2_dump_omd() value of ptr is increased by ciph_key_len instead of hash_iv_len which could lead to going beyond the buffer boundaries. Fix...
CVE-2024-38559
- EPSS 0.01%
- Veröffentlicht 19.06.2024 14:15:16
- Zuletzt bearbeitet 12.05.2026 12:16:52
In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on thi...
CVE-2024-38560
- EPSS 0.01%
- Veröffentlicht 19.06.2024 14:15:16
- Zuletzt bearbeitet 12.05.2026 12:16:53
In the Linux kernel, the following vulnerability has been resolved: scsi: bfa: Ensure the copied buf is NUL terminated Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from userspace to that buffer. Later, we use sscanf on this b...
- EPSS 0.05%
- Veröffentlicht 19.06.2024 14:15:16
- Zuletzt bearbeitet 21.11.2024 09:26:21
In the Linux kernel, the following vulnerability has been resolved: kunit: Fix kthread reference There is a race condition when a kthread finishes after the deadline and before the call to kthread_stop(), which may lead to use after free.
CVE-2024-38564
- EPSS 0.01%
- Veröffentlicht 19.06.2024 14:15:16
- Zuletzt bearbeitet 20.10.2025 22:04:02
In the Linux kernel, the following vulnerability has been resolved: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE bpf_prog_attach uses attach_type_to_prog_type to enforce proper attach type for BPF_PROG_TYPE_CGROUP_SK...
CVE-2024-38565
- EPSS 0.02%
- Veröffentlicht 19.06.2024 14:15:16
- Zuletzt bearbeitet 12.05.2026 12:16:53
In the Linux kernel, the following vulnerability has been resolved: wifi: ar5523: enable proper endpoint verification Syzkaller reports [1] hitting a warning about an endpoint in use not having an expected type to it. Fix the issue by checking for...
CVE-2024-38567
- EPSS 0.02%
- Veröffentlicht 19.06.2024 14:15:16
- Zuletzt bearbeitet 12.05.2026 12:16:53
In the Linux kernel, the following vulnerability has been resolved: wifi: carl9170: add a proper sanity check for endpoints Syzkaller reports [1] hitting a warning which is caused by presence of a wrong endpoint type at the URB sumbitting stage. Wh...
CVE-2024-38568
- EPSS 0.04%
- Veröffentlicht 19.06.2024 14:15:16
- Zuletzt bearbeitet 21.11.2024 09:26:22
In the Linux kernel, the following vulnerability has been resolved: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group The perf tool allows users to create event groups through following cmd [1], but the driver does not check ...
CVE-2024-38548
- EPSS 0.01%
- Veröffentlicht 19.06.2024 14:15:15
- Zuletzt bearbeitet 01.04.2025 18:36:59
In the Linux kernel, the following vulnerability has been resolved: drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference In cdns_mhdp_atomic_enable(), the return value of drm_mode_duplicate() is assigned to mhdp_state->current_mode, an...