CVE-2024-40902
- EPSS 0.01%
- Veröffentlicht 12.07.2024 13:15:13
- Zuletzt bearbeitet 03.11.2025 22:17:11
In the Linux kernel, the following vulnerability has been resolved: jfs: xattr: fix buffer overflow for invalid xattr When an xattr size is not what is expected, it is printed out to the kernel log in hex format as a form of debugging. But when th...
CVE-2024-40904
- EPSS 0.01%
- Veröffentlicht 12.07.2024 13:15:13
- Zuletzt bearbeitet 03.11.2025 22:17:12
In the Linux kernel, the following vulnerability has been resolved: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages The syzbot fuzzer found that the interrupt-URB completion callback in the cdc-wdm driver was taking too long, a...
CVE-2024-39499
- EPSS 0.01%
- Veröffentlicht 12.07.2024 13:15:12
- Zuletzt bearbeitet 03.11.2025 22:17:05
In the Linux kernel, the following vulnerability has been resolved: vmci: prevent speculation leaks by sanitizing event in event_deliver() Coverity spotted that event_msg is controlled by user-space, event_msg->event_data.event is passed to event_d...
CVE-2024-39500
- EPSS 0%
- Veröffentlicht 12.07.2024 13:15:12
- Zuletzt bearbeitet 03.11.2025 22:17:05
In the Linux kernel, the following vulnerability has been resolved: sock_map: avoid race between sock_map_close and sk_psock_put sk_psock_get will return NULL if the refcount of psock has gone to 0, which will happen when the last call of sk_psock_...
- EPSS 0.2%
- Veröffentlicht 12.07.2024 13:15:12
- Zuletzt bearbeitet 10.05.2025 15:15:58
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-39487
- EPSS 0.01%
- Veröffentlicht 09.07.2024 10:15:04
- Zuletzt bearbeitet 03.11.2025 22:17:04
In the Linux kernel, the following vulnerability has been resolved: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() In function bond_option_arp_ip_targets_set(), if newval->string is an empty string, newval->string+1 will point ...
CVE-2024-39480
- EPSS 0.02%
- Veröffentlicht 05.07.2024 07:15:10
- Zuletzt bearbeitet 21.11.2024 09:27:46
In the Linux kernel, the following vulnerability has been resolved: kdb: Fix buffer overflow during tab-complete Currently, when the user attempts symbol completion with the Tab key, kdb will use strncpy() to insert the completed symbol into the co...
CVE-2024-39484
- EPSS 0.03%
- Veröffentlicht 05.07.2024 07:15:10
- Zuletzt bearbeitet 03.11.2025 22:17:04
In the Linux kernel, the following vulnerability has been resolved: mmc: davinci: Don't strip remove function when driver is builtin Using __exit for the remove function results in the remove callback being discarded with CONFIG_MMC_DAVINCI=y. When...
CVE-2023-52340
- EPSS 0.08%
- Veröffentlicht 05.07.2024 02:15:09
- Zuletzt bearbeitet 04.11.2025 18:15:49
The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
CVE-2016-20022
- EPSS 0.11%
- Veröffentlicht 27.06.2024 23:15:50
- Zuletzt bearbeitet 15.04.2026 00:35:42
In the Linux kernel before 4.8, usb_parse_endpoint in drivers/usb/core/config.c does not validate the wMaxPacketSize field of an endpoint descriptor. NOTE: This vulnerability only affects products that are no longer supported by the supplier.