CVE-2024-38573
- EPSS 0.07%
- Veröffentlicht 19.06.2024 14:15:17
- Zuletzt bearbeitet 01.04.2025 18:24:49
In the Linux kernel, the following vulnerability has been resolved: cppc_cpufreq: Fix possible null pointer dereference cppc_cpufreq_get_rate() and hisi_cppc_cpufreq_get_rate() can be called from different places with various parameters. So cpufreq...
CVE-2024-38577
- EPSS 0.01%
- Veröffentlicht 19.06.2024 14:15:17
- Zuletzt bearbeitet 03.11.2025 22:17:02
In the Linux kernel, the following vulnerability has been resolved: rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow There is a possibility of buffer overflow in show_rcu_tasks_trace_gp_kthread() if counters, passed to sprintf() are h...
CVE-2024-38578
- EPSS 0.02%
- Veröffentlicht 19.06.2024 14:15:17
- Zuletzt bearbeitet 12.05.2026 12:16:53
In the Linux kernel, the following vulnerability has been resolved: ecryptfs: Fix buffer size for tag 66 packet The 'TAG 66 Packet Format' description is missing the cipher code and checksum fields that are packed into the message packet. As a resu...
CVE-2024-38579
- EPSS 0.01%
- Veröffentlicht 19.06.2024 14:15:17
- Zuletzt bearbeitet 12.05.2026 12:16:53
In the Linux kernel, the following vulnerability has been resolved: crypto: bcm - Fix pointer arithmetic In spu2_dump_omd() value of ptr is increased by ciph_key_len instead of hash_iv_len which could lead to going beyond the buffer boundaries. Fix...
CVE-2024-38559
- EPSS 0.01%
- Veröffentlicht 19.06.2024 14:15:16
- Zuletzt bearbeitet 12.05.2026 12:16:52
In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on thi...
CVE-2024-38560
- EPSS 0.01%
- Veröffentlicht 19.06.2024 14:15:16
- Zuletzt bearbeitet 12.05.2026 12:16:53
In the Linux kernel, the following vulnerability has been resolved: scsi: bfa: Ensure the copied buf is NUL terminated Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from userspace to that buffer. Later, we use sscanf on this b...
CVE-2024-38564
- EPSS 0.01%
- Veröffentlicht 19.06.2024 14:15:16
- Zuletzt bearbeitet 20.10.2025 22:04:02
In the Linux kernel, the following vulnerability has been resolved: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE bpf_prog_attach uses attach_type_to_prog_type to enforce proper attach type for BPF_PROG_TYPE_CGROUP_SK...
CVE-2024-38565
- EPSS 0.02%
- Veröffentlicht 19.06.2024 14:15:16
- Zuletzt bearbeitet 12.05.2026 12:16:53
In the Linux kernel, the following vulnerability has been resolved: wifi: ar5523: enable proper endpoint verification Syzkaller reports [1] hitting a warning about an endpoint in use not having an expected type to it. Fix the issue by checking for...
CVE-2024-38567
- EPSS 0.02%
- Veröffentlicht 19.06.2024 14:15:16
- Zuletzt bearbeitet 12.05.2026 12:16:53
In the Linux kernel, the following vulnerability has been resolved: wifi: carl9170: add a proper sanity check for endpoints Syzkaller reports [1] hitting a warning which is caused by presence of a wrong endpoint type at the URB sumbitting stage. Wh...
CVE-2024-38548
- EPSS 0.01%
- Veröffentlicht 19.06.2024 14:15:15
- Zuletzt bearbeitet 01.04.2025 18:36:59
In the Linux kernel, the following vulnerability has been resolved: drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference In cdns_mhdp_atomic_enable(), the return value of drm_mode_duplicate() is assigned to mhdp_state->current_mode, an...