CVE-2024-38637 – greybus: lights: check return of get_channel_from_mode
https://notcve.org/view.php?id=CVE-2024-38637
Asegúrese de validar el puntero de retorno antes de usarlo en dos de los lugares que faltan. • https://git.kernel.org/stable/c/2870b52bae4c81823ffcb3ed2b0626fb39d64f48 https://git.kernel.org/stable/c/8f4a76d477f0cc3c54d512f07f6f88c8e1c1e07b https://git.kernel.org/stable/c/e2c64246e5dc8c0d35ec41770b85e2b4cafdff21 https://git.kernel.org/stable/c/eac10cf3a97ffd4b4deb0a29f57c118225a42850 https://git.kernel.org/stable/c/330f6bcdcef03f70f81db5f2ed6747af656a09f2 https://git.kernel.org/stable/c/9b41a9b9c8be8c552f10633453fdb509e83b66f8 https://git.kernel.org/stable/c/518e2c46b5dbce40b1aa0100001d03c3ceaa7d38 https://git.kernel.org/stable/c/895cdd9aa9546523df839f9cc1488a0ec •
CVE-2024-38621 – media: stk1160: fix bounds checking in stk1160_copy_video()
https://notcve.org/view.php?id=CVE-2024-38621
Calcula el número de líneas completas ya escritas, multiplica por dos, omite una línea si es necesario para comenzar en una línea impar y agrega el desplazamiento a la línea. • https://git.kernel.org/stable/c/9cb2173e6ea8f2948bd1367c93083a2500fcf08f https://git.kernel.org/stable/c/f6a392266276730bea893b55d12940e32a25f56a https://git.kernel.org/stable/c/ecf4ddc3aee8ade504c4d36b7b4053ce6093e200 https://git.kernel.org/stable/c/a16775828aaed1c54ff4e6fe83e8e4d5c6a50cb7 https://git.kernel.org/stable/c/7532bcec0797adfa08791301c3bcae14141db3bd https://git.kernel.org/stable/c/b504518a397059e1d55c521ba0ea2b545a6c4b52 https://git.kernel.org/stable/c/d410017a7181cb55e4a5c810b32b75e4416c6808 https://git.kernel.org/stable/c/a08492832cc4cacc24e0612f483c86ca8 •
CVE-2024-24737 – Silicon Labs Gecko OS DNS Response Processing Infinite Loop Denial-of-Service Vulnerability
https://notcve.org/view.php?id=CVE-2024-24737
This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of Silicon Labs Gecko OS. ... An attacker can leverage this vulnerability to create a denial-of-service condition on the system. •
CVE-2024-38359 – Lightning Network Daemon Onion Bomb
https://notcve.org/view.php?id=CVE-2024-38359
A parsing vulnerability in lnd's onion processing logic and lead to a DoS vector due to excessive memory allocation. • https://delvingbitcoin.org/t/dos-disclosure-lnd-onion-bomb/979 https://github.com/lightningnetwork/lnd/releases/tag/v0.17.0-beta https://github.com/lightningnetwork/lnd/security/advisories/GHSA-9gxx-58q6-42p7 https://lightning.network https://morehouse.github.io/lightning/lnd-onion-bomb • CWE-20: Improper Input Validation •
CVE-2024-32943 – Westermo L210-F2G Lynx Improper Control of Interaction Frequency
https://notcve.org/view.php?id=CVE-2024-32943
An attacker may be able to cause a denial-of-service condition by sending many SSH packets repeatedly. • https://www.cisa.gov/news-events/ics-advisories/icsa-24-172-03 • CWE-799: Improper Control of Interaction Frequency •