CVE-2024-35924
- EPSS 0.02%
- Veröffentlicht 19.05.2024 11:15:48
- Zuletzt bearbeitet 24.09.2025 18:47:47
In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: Limit read size on v1.2 Between UCSI 1.2 and UCSI 2.0, the size of the MESSAGE_IN region was increased from 16 to 256. In order to avoid overflowing reads for old...
CVE-2024-35925
- EPSS 0.02%
- Veröffentlicht 19.05.2024 11:15:48
- Zuletzt bearbeitet 12.05.2026 12:16:41
In the Linux kernel, the following vulnerability has been resolved: block: prevent division by zero in blk_rq_stat_sum() The expression dst->nr_samples + src->nr_samples may have zero value on overflow. It is necessary to add a check to avoid divis...
CVE-2023-52699
- EPSS 0.12%
- Veröffentlicht 19.05.2024 11:15:47
- Zuletzt bearbeitet 04.04.2025 14:24:16
In the Linux kernel, the following vulnerability has been resolved: sysv: don't call sb_bread() with pointers_lock held syzbot is reporting sleep in atomic context in SysV filesystem [1], for sb_bread() is called with rw_spinlock held. A "write_lo...
CVE-2024-35916
- EPSS 0.13%
- Veröffentlicht 19.05.2024 09:15:12
- Zuletzt bearbeitet 04.04.2025 14:24:30
In the Linux kernel, the following vulnerability has been resolved: dma-buf: Fix NULL pointer dereference in sanitycheck() If due to a memory allocation failure mock_chain() returns NULL, it is passed to dma_fence_enable_sw_signaling() resulting in...
CVE-2024-35902
- EPSS 0.02%
- Veröffentlicht 19.05.2024 09:15:11
- Zuletzt bearbeitet 12.05.2026 12:16:40
In the Linux kernel, the following vulnerability has been resolved: net/rds: fix possible cp null dereference cp might be null, calling cp->cp_conn would produce null dereference [Simon Horman adds:] Analysis: * cp is a parameter of __rds_rdma_m...
CVE-2024-35904
- EPSS 0.03%
- Veröffentlicht 19.05.2024 09:15:11
- Zuletzt bearbeitet 03.02.2025 16:03:31
In the Linux kernel, the following vulnerability has been resolved: selinux: avoid dereference of garbage after mount failure In case kern_mount() fails and returns an error pointer return in the error branch instead of continuing and dereferencing...
CVE-2024-35905
- EPSS 0.03%
- Veröffentlicht 19.05.2024 09:15:11
- Zuletzt bearbeitet 12.05.2026 12:16:40
In the Linux kernel, the following vulnerability has been resolved: bpf: Protect against int overflow for stack access size This patch re-introduces protection against the size of access to stack memory being negative; the access size can appear ne...
CVE-2024-35907
- EPSS 0.03%
- Veröffentlicht 19.05.2024 09:15:11
- Zuletzt bearbeitet 30.12.2024 19:35:53
In the Linux kernel, the following vulnerability has been resolved: mlxbf_gige: call request_irq() after NAPI initialized The mlxbf_gige driver encounters a NULL pointer exception in mlxbf_gige_open() when kdump is enabled. The sequence to reprodu...
CVE-2024-35908
- EPSS 0.03%
- Veröffentlicht 19.05.2024 09:15:11
- Zuletzt bearbeitet 24.09.2025 18:52:20
In the Linux kernel, the following vulnerability has been resolved: tls: get psock ref after taking rxlock to avoid leak At the start of tls_sw_recvmsg, we take a reference on the psock, and then call tls_rx_reader_lock. If that fails, we return di...
CVE-2024-35909
- EPSS 0.03%
- Veröffentlicht 19.05.2024 09:15:11
- Zuletzt bearbeitet 24.09.2025 18:51:02
In the Linux kernel, the following vulnerability has been resolved: net: wwan: t7xx: Split 64bit accesses to fix alignment issues Some of the registers are aligned on a 32bit boundary, causing alignment faults on 64bit platforms. Unable to handle...