CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-57930

Description: In the Linux kernel, the following vulnerability has been resolved: tracing: Have process_string() also allow arrays In order to catch a common bug where a TRACE_EVENT() TP_fast_assign() assigns an address of an allocated string to the ring buffer and then references it in TP_printk(), which can be executed hours later when the string is free, the function test_event_printk() runs on all events as they are registered to make sure there's no unwanted dereferencing. It calls process_string() to handle cases in TP_printk() format that has "%s". It returns whether or not the string is safe. But it can have some false positives. For instance, xe_bo_move() has: TP_printk("move_lacks_source:%s, migrate object %p [size %zu] from %s to %s device_id:%s", __entry->move_lacks_source ? "yes" : "no", __entry->bo, __entry->size, xe_mem_type_to_name[__entry->old_placement], xe_mem_type_to_name[__entry->new_placement], __get_str(device_id)) Where the "%s" references into xe_mem_type_to_name[]. This is an array of pointers that should be safe for the event to access. Instead of flagging this as a bad reference, if a reference points to an array, where the record field is the index, consider it safe.

EPSS Score: 0.05%

Source: CVE
January 22nd, 2025 (5 months ago)

CVE-2024-57545

Description: Linksys E8450 v1.2.00.360516 was discovered to contain a buffer overflow vulnerability. The parsed field (hidden_dhcp_num) is copied to the stack without length verification.

EPSS Score: 0.04%

Source: CVE
January 22nd, 2025 (5 months ago)

CVE-2024-57544

Description: Linksys E8450 v1.2.00.360516 was discovered to contain a buffer overflow vulnerability. The parsed field (lan_ipaddr) is copied to the stack without length verification.

EPSS Score: 0.04%

Source: CVE
January 22nd, 2025 (5 months ago)

CVE-2024-57543

Description: Linksys E8450 v1.2.00.360516 was discovered to contain a buffer overflow vulnerability. The parsed field (dhcpstart_ip) is copied to the stack without length verification.

EPSS Score: 0.04%

Source: CVE
January 22nd, 2025 (5 months ago)

CVE-2024-57542

Description: Linksys E8450 v1.2.00.360516 was discovered to contain a command injection vulnerability via the field id_email_check_btn.

EPSS Score: 0.04%

Source: CVE
January 22nd, 2025 (5 months ago)

CVE-2024-57541

Description: Linksys E8450 v1.2.00.360516 was discovered to contain a buffer overflow vulnerability. The parsed field (ipv6_protect_status) is copied to the stack without length verification.

EPSS Score: 0.04%

Source: CVE
January 22nd, 2025 (5 months ago)

CVE-2024-57540

Description: Linksys E8450 v1.2.00.360516 was discovered to contain a buffer overflow vulnerability. The parsed field (action) is copied to the stack without length verification.

EPSS Score: 0.04%

Source: CVE
January 22nd, 2025 (5 months ago)

CVE-2024-57539

Description: Linksys E8450 v1.2.00.360516 was discovered to contain a command injection vulnerability via userEmail.

EPSS Score: 0.04%

Source: CVE
January 22nd, 2025 (5 months ago)

CVE-2024-57538

Description: Linksys E8450 v1.2.00.360516 was discovered to contain a buffer overflow vulnerability. The parsed field (anonymous_protect_status) is copied to the stack without length verification.

EPSS Score: 0.04%

Source: CVE
January 22nd, 2025 (5 months ago)

CVE-2024-57537

Description: Linksys E8450 v1.2.00.360516 was discovered to contain a buffer overflow vulnerability. The parsed field (page) is copied to the stack without length verification.

EPSS Score: 0.04%

Source: CVE
January 22nd, 2025 (5 months ago)