CVE-2024-35860 – bpf: support deferring bpf_link dealloc to after RCU grace period
https://notcve.org/view.php?id=CVE-2024-35860
Esto se hace exponiendo dos devoluciones de llamada de desasignación diferentes, una sincrónica y otra diferida. ... BPF utiliza dos tipos de RCU: uno "clásico" que no se puede dormir y uno de seguimiento de tareas de RCU. • https://git.kernel.org/stable/c/0dcac272540613d41c05e89679e4ddb978b612f1 https://git.kernel.org/stable/c/876941f533e7b47fc69977fc4551c02f2d18af97 https://git.kernel.org/stable/c/5d8d447777564b35f67000e7838e7ccb64d525c8 https://git.kernel.org/stable/c/1a80dbcb2dbaf6e4c216e62e30fa7d3daa8001ce •
CVE-2024-5095 – Victor Zsviot Camera MQTT Packet denial of service
https://notcve.org/view.php?id=CVE-2024-5095
The manipulation leads to denial of service. ... Durch Beeinflussen mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. • https://github.com/kzLiu2017/Tuya_Cam_CVE_Doc/blob/main/zsviot%20camera.pdf https://vuldb.com/?ctiid.265077 https://vuldb.com/?id.265077 https://vuldb.com/?submit.332461 • CWE-404: Improper Resource Shutdown or Release •
CVE-2024-31879 – IBM i denial of service
https://notcve.org/view.php?id=CVE-2024-31879
IBM i 7.2, 7.3, and 7.4 could allow a remote attacker to execute arbitrary code leading to a denial of service of network ports on the system, caused by the deserialization of untrusted data. • https://exchange.xforce.ibmcloud.com/vulnerabilities/287539 https://www.ibm.com/support/pages/node/7154380 • CWE-502: Deserialization of Untrusted Data •
CVE-2024-23556 – HCL BigFix Platform is impacted by a failure to restrict SSL/TLS renegotiation
https://notcve.org/view.php?id=CVE-2024-23556
SSL/TLS Renegotiation functionality potentially leading to DoS attack vulnerability. La funcionalidad de renegociación SSL/TLS puede conducir a una vulnerabilidad de ataque DoS. • https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0113140 •
CVE-2024-35853 – mlxsw: spectrum_acl_tcam: Fix memory leak during rehash
https://notcve.org/view.php?id=CVE-2024-35853
Cada fragmento virtual hace referencia a dos fragmentos: el que se utiliza actualmente ('vchunk->chunk') y una copia de seguridad ('vchunk->chunk2'). • https://git.kernel.org/stable/c/843500518509128a935edab96bd8efef7c54669e https://git.kernel.org/stable/c/c6f3fa7f5a748bf6e5c4eb742686d6952f854e76 https://git.kernel.org/stable/c/617e98ba4c50f4547c9eb0946b1cfc26937d70d1 https://git.kernel.org/stable/c/413a01886c3958d4b8aac23a3bff3d430b92093e https://git.kernel.org/stable/c/b822644fd90992ee362c5e0c8d2556efc8856c76 https://git.kernel.org/stable/c/0ae8ff7b6d42e33943af462910bdcfa2ec0cb8cf https://git.kernel.org/stable/c/b3fd51f684a0711504f82de510da109ae639722d https://git.kernel.org/stable/c/8ca3f7a7b61393804c46f170743c3b839 • CWE-416: Use After Free •