In the Linux kernel, the following vulnerability has been resolved:
dyndbg: fix old BUG_ON in >control parser
Fix a BUG_ON from 2009. Even if it looks "unreachable" (I didn't
really look), lets make sure by removing it, doing pr_err and return
-EINVAL instead.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
04 Apr 2025, 14:23
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c - Patch | |
References | () https://git.kernel.org/stable/c/343081c21e56bd6690d342e2f5ae8c00183bf081 - Patch | |
References | () https://git.kernel.org/stable/c/3c718bddddca9cbef177ac475b94c5c91147fb38 - Patch | |
References | () https://git.kernel.org/stable/c/41d8ac238ab1cab01a8c71798d61903304f4e79b - Patch | |
References | () https://git.kernel.org/stable/c/529e1852785599160415e964ca322ee7add7aef0 - Patch | |
References | () https://git.kernel.org/stable/c/a66c869b17c4c4dcf81d273b02cb0efe88e127ab - Patch | |
References | () https://git.kernel.org/stable/c/a69e1bdd777ce51061111dc419801e8a2fd241cc - Patch | |
References | () https://git.kernel.org/stable/c/ba3c118cff7bcb0fe6aa84ae1f9080d50e31c561 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/ - Mailing List, Third Party Advisory | |
CWE | NVD-CWE-noinfo | |
First Time |
Fedoraproject
Debian debian Linux Debian Fedoraproject fedora Linux Linux linux Kernel |
Information
Published : 2024-05-19 12:15
Updated : 2025-04-04 14:23
NVD link : CVE-2024-35947
Mitre link : CVE-2024-35947
CVE.ORG link : CVE-2024-35947
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
fedoraproject
- fedora
CWE