CVE-2024-31879 – IBM i denial of service
https://notcve.org/view.php?id=CVE-2024-31879
IBM i 7.2, 7.3, and 7.4 could allow a remote attacker to execute arbitrary code leading to a denial of service of network ports on the system, caused by the deserialization of untrusted data. • https://exchange.xforce.ibmcloud.com/vulnerabilities/287539 https://www.ibm.com/support/pages/node/7154380 • CWE-502: Deserialization of Untrusted Data •
CVE-2024-23556 – HCL BigFix Platform is impacted by a failure to restrict SSL/TLS renegotiation
https://notcve.org/view.php?id=CVE-2024-23556
SSL/TLS Renegotiation functionality potentially leading to DoS attack vulnerability. La funcionalidad de renegociación SSL/TLS puede conducir a una vulnerabilidad de ataque DoS. • https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0113140 •
CVE-2024-35853 – mlxsw: spectrum_acl_tcam: Fix memory leak during rehash
https://notcve.org/view.php?id=CVE-2024-35853
Cada fragmento virtual hace referencia a dos fragmentos: el que se utiliza actualmente ('vchunk->chunk') y una copia de seguridad ('vchunk->chunk2'). • https://git.kernel.org/stable/c/843500518509128a935edab96bd8efef7c54669e https://git.kernel.org/stable/c/c6f3fa7f5a748bf6e5c4eb742686d6952f854e76 https://git.kernel.org/stable/c/617e98ba4c50f4547c9eb0946b1cfc26937d70d1 https://git.kernel.org/stable/c/413a01886c3958d4b8aac23a3bff3d430b92093e https://git.kernel.org/stable/c/b822644fd90992ee362c5e0c8d2556efc8856c76 https://git.kernel.org/stable/c/0ae8ff7b6d42e33943af462910bdcfa2ec0cb8cf https://git.kernel.org/stable/c/b3fd51f684a0711504f82de510da109ae639722d https://git.kernel.org/stable/c/8ca3f7a7b61393804c46f170743c3b839 • CWE-416: Use After Free •
CVE-2024-35846 – mm: zswap: fix shrinker NULL crash with cgroup_disable=memory
https://notcve.org/view.php?id=CVE-2024-35846
Christian informa una deref NULL en zswap que dividió en dos hasta el reductor zswap. • https://git.kernel.org/stable/c/b5ba474f3f518701249598b35c581b92a3c95b48 https://git.kernel.org/stable/c/b0fdabc908a7f81d12382c87ca9e46a9c2e14042 https://git.kernel.org/stable/c/682886ec69d22363819a83ddddd5d66cb5c791e1 •
CVE-2023-52697 – ASoC: Intel: sof_sdw_rt_sdca_jack_common: ctx->headset_codec_dev = NULL
https://notcve.org/view.php?id=CVE-2023-52697
Como resultado, mc_dailink_exit_loop() llamará dos veces a sof_sdw_rt_sdca_jack_exit(). Establecer ctx->headset_codec_dev = NULL; después de put_device(ctx->headset_codec_dev); para evitar que ctx->headset_codec_dev se coloque dos veces. • https://git.kernel.org/stable/c/5360c67046385f90406ec17e367ba9aeb42d5459 https://git.kernel.org/stable/c/a410d58117d6da4b7d41f3c91365f191d006bc3d https://git.kernel.org/stable/c/582231a8c4f73ac153493687ecc1bed853e9c9ef https://git.kernel.org/stable/c/e38e252dbceeef7d2f848017132efd68e9ae1416 https://access.redhat.com/security/cve/CVE-2023-52697 https://bugzilla.redhat.com/show_bug.cgi?id=2281288 •