CVE-2024-35896
- EPSS 0.02%
- Veröffentlicht 19.05.2024 09:15:10
- Zuletzt bearbeitet 12.05.2026 12:16:39
In the Linux kernel, the following vulnerability has been resolved: netfilter: validate user input for expected length I got multiple syzbot reports showing old bugs exposed by BPF after commit 20f2505fb436 ("bpf: Try to avoid kzalloc in cgroup/{s,...
CVE-2024-35878
- EPSS 0.04%
- Veröffentlicht 19.05.2024 09:15:09
- Zuletzt bearbeitet 07.04.2025 18:57:06
In the Linux kernel, the following vulnerability has been resolved: of: module: prevent NULL pointer dereference in vsnprintf() In of_modalias(), we can get passed the str and len parameters which would cause a kernel oops in vsnprintf() since it o...
CVE-2024-35886
- EPSS 0.01%
- Veröffentlicht 19.05.2024 09:15:09
- Zuletzt bearbeitet 12.05.2026 12:16:38
In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix infinite recursion in fib6_dump_done(). syzkaller reported infinite recursive calls of fib6_dump_done() during netlink socket destruction. [1] From the log, syzkaller s...
CVE-2024-35887
- EPSS 0.02%
- Veröffentlicht 19.05.2024 09:15:09
- Zuletzt bearbeitet 31.12.2024 18:48:10
In the Linux kernel, the following vulnerability has been resolved: ax25: fix use-after-free bugs caused by ax25_ds_del_timer When the ax25 device is detaching, the ax25_dev_device_down() calls ax25_ds_del_timer() to cleanup the slave_timer. When t...
CVE-2024-35865
- EPSS 0.01%
- Veröffentlicht 19.05.2024 09:15:08
- Zuletzt bearbeitet 07.04.2025 18:57:42
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_oplock_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
CVE-2024-35868
- EPSS 0.02%
- Veröffentlicht 19.05.2024 09:15:08
- Zuletzt bearbeitet 30.12.2024 17:37:00
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_stats_proc_write() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
CVE-2024-35875
- EPSS 0.01%
- Veröffentlicht 19.05.2024 09:15:08
- Zuletzt bearbeitet 24.09.2025 21:13:12
In the Linux kernel, the following vulnerability has been resolved: x86/coco: Require seeding RNG with RDRAND on CoCo systems There are few uses of CoCo that don't rely on working cryptography and hence a working RNG. Unfortunately, the CoCo threat...
CVE-2024-35877
- EPSS 0.01%
- Veröffentlicht 19.05.2024 09:15:08
- Zuletzt bearbeitet 12.05.2026 12:16:38
In the Linux kernel, the following vulnerability has been resolved: x86/mm/pat: fix VM_PAT handling in COW mappings PAT handling won't do the right thing in COW mappings: the first PTE (or, in fact, all PTEs) can be replaced during write faults to ...
CVE-2024-35864
- EPSS 0.02%
- Veröffentlicht 19.05.2024 09:15:07
- Zuletzt bearbeitet 30.12.2024 14:58:03
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
CVE-2024-35843
- EPSS 0.02%
- Veröffentlicht 17.05.2024 15:15:21
- Zuletzt bearbeitet 07.04.2025 19:05:09
In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Use device rbtree in iopf reporting path The existing I/O page fault handler currently locates the PCI device by calling pci_get_domain_bus_and_slot(). This function se...