5.5

CVSS3.1

CVE-2024-35827 - io_uring/net: fix overflow check in io_recvmsg_mshot_prep()

In the Linux kernel, the following vulnerability has been resolved: io_uring/net: fix overflow check in io_recvmsg_mshot_prep() The "controllen" variable is type size_t (unsigned long). Casting it to int could lead to an integer underflow. The check_add_overflow() function considers the type of…

πŸ“… Published: May 17, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 9:06 a.m.

5.5

CVSS3.1

CVE-2024-27412 - power: supply: bq27xxx-i2c: Do not free non existing IRQ

In the Linux kernel, the following vulnerability has been resolved: power: supply: bq27xxx-i2c: Do not free non existing IRQ The bq27xxx i2c-client may not have an IRQ, in which case client->irq will be 0. bq27xxx_battery_i2c_probe() already has an if (client->irq) check wrapping the request_thre…

πŸ“… Published: May 17, 2024, midnight πŸ”„ Last Modified: Dec. 17, 2025, 7:39 p.m.

5.5

CVSS3.1

CVE-2024-35813 - mmc: core: Avoid negative index with array access

In the Linux kernel, the following vulnerability has been resolved: mmc: core: Avoid negative index with array access Commit 4d0c8d0aef63 ("mmc: core: Use mrq.sbc in close-ended ffu") assigns prev_idata = idatas[i - 1], but doesn't check that the iterator i is greater than zero. Let's fix this by…

πŸ“… Published: May 17, 2024, midnight πŸ”„ Last Modified: Dec. 15, 2025, 8:57 p.m.

5.5

CVSS3.1

CVE-2024-35815 - fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion

In the Linux kernel, the following vulnerability has been resolved: fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion The first kiocb_set_cancel_fn() argument may point at a struct kiocb that is not embedded inside struct aio_kiocb. With the current code, depending on the compiler,…

πŸ“… Published: May 17, 2024, midnight πŸ”„ Last Modified: Dec. 16, 2025, 8:10 p.m.

5.5

CVSS3.1

CVE-2023-52694 - drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function

In the Linux kernel, the following vulnerability has been resolved: drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function With tpd12s015_remove() marked with __exit this function is discarded when the driver is compiled as a built-in. The result is that when the driver unbinds t…

πŸ“… Published: May 17, 2024, midnight πŸ”„ Last Modified: Dec. 17, 2025, 3:43 a.m.

5.5

CVSS3.1

CVE-2023-52693 - ACPI: video: check for error while searching for backlight device parent

In the Linux kernel, the following vulnerability has been resolved: ACPI: video: check for error while searching for backlight device parent If acpi_get_parent() called in acpi_video_dev_register_backlight() fails, for example, because acpi_ut_acquire_mutex() fails inside acpi_get_parent), this c…

πŸ“… Published: May 17, 2024, midnight πŸ”„ Last Modified: Dec. 17, 2025, 3:43 a.m.

5.5

CVSS3.1

CVE-2023-52683 - ACPI: LPIT: Avoid u32 multiplication overflow

In the Linux kernel, the following vulnerability has been resolved: ACPI: LPIT: Avoid u32 multiplication overflow In lpit_update_residency() there is a possibility of overflow in multiplication, if tsc_khz is large enough (> UINT_MAX/1000). Change multiplication to mul_u32_u32(). Found by Linux…

πŸ“… Published: May 17, 2024, midnight πŸ”„ Last Modified: Dec. 17, 2025, 3:43 a.m.

5.5

CVSS3.1

CVE-2024-35788 - kernel: drm/amd/display: Fix bounds check for dcn35 DcfClocks

This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

πŸ“… Published: May 17, 2024, midnight πŸ”„ Last Modified: June 19, 2025, 1:15 p.m.

4.7

CVSS3.1

CVE-2024-27419 - netrom: Fix data-races around sysctl_net_busy_read

In the Linux kernel, the following vulnerability has been resolved: netrom: Fix data-races around sysctl_net_busy_read We need to protect the reader reading the sysctl value because the value can be changed concurrently.

πŸ“… Published: May 17, 2024, midnight πŸ”„ Last Modified: Dec. 23, 2025, 6:42 p.m.

5.5

CVSS3.1

CVE-2024-35841 - net: tls, fix WARNIING in __sk_msg_free

In the Linux kernel, the following vulnerability has been resolved: net: tls, fix WARNIING in __sk_msg_free A splice with MSG_SPLICE_PAGES will cause tls code to use the tls_sw_sendmsg_splice path in the TLS sendmsg code to move the user provided pages from the msg into the msg_pl. This will loop…

πŸ“… Published: May 17, 2024, midnight πŸ”„ Last Modified: Sept. 26, 2025, 4:05 p.m.
Total resulsts: 349182
Page 9812 of 34,919
Β« previous page Β» next page
Filters