CVE-2024-35830 — In the Linux kernel, the following vulnerability has been resolved:
In the Linux kernel, the following vulnerability has been resolved:
Published
2024-05-17T13:41:19.675Z
Last modified
2025-05-04T09:06:21.297Z
01What is this vulnerability?
In the Linux kernel, the following vulnerability has been resolved:
02Affected products
| Vendor | Product | Versions |
|---|
| Linux | Linux | 4c5211a100399c3823563193dd881dcb3b7d24fc, 4c5211a100399c3823563193dd881dcb3b7d24fc, 4c5211a100399c3823563193dd881dcb3b7d24fc, 4c5211a100399c3823563193dd881dcb3b7d24fc, 4c5211a100399c3823563193dd881dcb3b7d24fc, 4c5211a100399c3823563193dd881dcb3b7d24fc, 4c5211a100399c3823563193dd881dcb3b7d24fc, 4c5211a100399c3823563193dd881dcb3b7d24fc, 4c5211a100399c3823563193dd881dcb3b7d24fc |
| Linux | Linux | 4.3, 0, 4.19.311, 5.4.273, 5.10.214, 5.15.153, 6.1.83, 6.6.23, 6.7.11, 6.8.2, 6.9 |
03Active exploitation status
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
04Recommended remediation
- Patch to a fixed version listed in the vendor advisory (see references below).
- Mitigate with WAF rules, network egress filters, or feature flags where the patch is not yet available.
- Hunt historical logs for exploitation indicators — see Detection signatures below.
05Technical details
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
06Detection signatures
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
Open in Sigma generator →
07Related CVEs
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.
08Timeline
- Published: 2024-05-17T13:41:19.675Z
- Last modified: 2025-05-04T09:06:21.297Z
09References
- git.kernel.org — https://git.kernel.org/stable/c/17c2650de14842c25c569cbb2126c421489a3a24
- git.kernel.org — https://git.kernel.org/stable/c/daf21394f9898fb9f0698c3e50de08132d2164e6
- git.kernel.org — https://git.kernel.org/stable/c/610f20e5cf35ca9c0992693cae0dd8643ce932e7
- git.kernel.org — https://git.kernel.org/stable/c/b8505a1aee8f1edc9d16d72ae09c93de086e2a1a
- git.kernel.org — https://git.kernel.org/stable/c/8ba8db9786b55047df5ad3db3e01dd886687a77d
- git.kernel.org — https://git.kernel.org/stable/c/edbb3226c985469a2f8eb69885055c9f5550f468
- git.kernel.org — https://git.kernel.org/stable/c/c915c46a25c3efb084c4f5e69a053d7f7a635496
- git.kernel.org — https://git.kernel.org/stable/c/4f1490a5d7a0472ee5d9f36547bc4ba46be755c7
- git.kernel.org — https://git.kernel.org/stable/c/87399f1ff92203d65f1febf5919429f4bb613a02
Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →