CVE-2024-35815
- EPSS 0.01%
- Veröffentlicht 17.05.2024 14:15:16
- Zuletzt bearbeitet 12.05.2026 12:16:37
In the Linux kernel, the following vulnerability has been resolved: fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion The first kiocb_set_cancel_fn() argument may point at a struct kiocb that is not embedded inside struct aio_kiocb. ...
CVE-2024-35817
- EPSS 0.01%
- Veröffentlicht 17.05.2024 14:15:16
- Zuletzt bearbeitet 26.09.2025 14:55:27
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag Otherwise after the GTT bo is released, the GTT and gart space is freed but amdgpu_ttm_backend_unbind will not clear the gart pa...
CVE-2024-35819
- EPSS 0.02%
- Veröffentlicht 17.05.2024 14:15:16
- Zuletzt bearbeitet 17.12.2025 19:26:38
In the Linux kernel, the following vulnerability has been resolved: soc: fsl: qbman: Use raw spinlock for cgr_lock smp_call_function always runs its callback in hard IRQ context, even on PREEMPT_RT, where spinlocks can sleep. So we need to use a ra...
CVE-2024-35811
- EPSS 0.01%
- Veröffentlicht 17.05.2024 14:15:15
- Zuletzt bearbeitet 12.05.2026 12:16:36
In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach This is the candidate patch of CVE-2023-47233 : https://nvd.nist.gov/vuln/detail/CVE-2023-47233 In brcm80211 driver...
CVE-2024-35813
- EPSS 0.01%
- Veröffentlicht 17.05.2024 14:15:15
- Zuletzt bearbeitet 12.05.2026 12:16:36
In the Linux kernel, the following vulnerability has been resolved: mmc: core: Avoid negative index with array access Commit 4d0c8d0aef63 ("mmc: core: Use mrq.sbc in close-ended ffu") assigns prev_idata = idatas[i - 1], but doesn't check that the i...
CVE-2024-35806
- EPSS 0.01%
- Veröffentlicht 17.05.2024 14:15:14
- Zuletzt bearbeitet 10.01.2025 18:11:39
In the Linux kernel, the following vulnerability has been resolved: soc: fsl: qbman: Always disable interrupts when taking cgr_lock smp_call_function_single disables IRQs when executing the callback. To prevent deadlocks, we must disable IRQs when ...
CVE-2024-35807
- EPSS 0.01%
- Veröffentlicht 17.05.2024 14:15:14
- Zuletzt bearbeitet 12.05.2026 12:16:36
In the Linux kernel, the following vulnerability has been resolved: ext4: fix corruption during on-line resize We observed a corruption during on-line resize of a file system that is larger than 16 TiB with 4k block size. With having more then 2^32...
CVE-2024-35808
- EPSS 0.01%
- Veröffentlicht 17.05.2024 14:15:14
- Zuletzt bearbeitet 19.09.2025 16:02:27
In the Linux kernel, the following vulnerability has been resolved: md/dm-raid: don't call md_reap_sync_thread() directly Currently md_reap_sync_thread() is called from raid_message() directly without holding 'reconfig_mutex', this is definitely un...
CVE-2024-35809
- EPSS 0.01%
- Veröffentlicht 17.05.2024 14:15:14
- Zuletzt bearbeitet 23.12.2025 18:29:25
In the Linux kernel, the following vulnerability has been resolved: PCI/PM: Drain runtime-idle callbacks before driver removal A race condition between the .runtime_idle() callback and the .remove() callback in the rtsx_pcr PCI driver leads to a ke...
CVE-2024-35803
- EPSS 0.01%
- Veröffentlicht 17.05.2024 14:15:13
- Zuletzt bearbeitet 26.09.2025 15:57:45
In the Linux kernel, the following vulnerability has been resolved: x86/efistub: Call mixed mode boot services on the firmware's stack Normally, the EFI stub calls into the EFI boot services using the stack that was live when the stub was entered. ...