CVE-2024-35847 — In the Linux kernel, the following vulnerability has been resolved:
In the Linux kernel, the following vulnerability has been resolved:
Published
2024-05-17T14:47:26.175Z
Last modified
2025-05-04T09:06:44.998Z
01What is this vulnerability?
In the Linux kernel, the following vulnerability has been resolved:
02Affected products
| Vendor | Product | Versions |
|---|
| Linux | Linux | 7d75bbb4bc1ad90386776459d37e4ddfe605671e, 7d75bbb4bc1ad90386776459d37e4ddfe605671e, 7d75bbb4bc1ad90386776459d37e4ddfe605671e, 7d75bbb4bc1ad90386776459d37e4ddfe605671e, 7d75bbb4bc1ad90386776459d37e4ddfe605671e, 7d75bbb4bc1ad90386776459d37e4ddfe605671e, 7d75bbb4bc1ad90386776459d37e4ddfe605671e, 7d75bbb4bc1ad90386776459d37e4ddfe605671e |
| Linux | Linux | 4.14, 0, 4.19.313, 5.4.275, 5.10.216, 5.15.158, 6.1.90, 6.6.30, 6.8.9, 6.9 |
03Active exploitation status
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
04Recommended remediation
- Patch to a fixed version listed in the vendor advisory (see references below).
- Mitigate with WAF rules, network egress filters, or feature flags where the patch is not yet available.
- Hunt historical logs for exploitation indicators — see Detection signatures below.
05Technical details
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
06Detection signatures
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
Open in Sigma generator →
07Related CVEs
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.
08Timeline
- Published: 2024-05-17T14:47:26.175Z
- Last modified: 2025-05-04T09:06:44.998Z
09References
- git.kernel.org — https://git.kernel.org/stable/c/f5417ff561b8ac9a7e53c747b8627a7ab58378ae
- git.kernel.org — https://git.kernel.org/stable/c/b72d2b1448b682844f995e660b77f2a1fabc1662
- git.kernel.org — https://git.kernel.org/stable/c/aa44d21574751a7d6bca892eb8e0e9ac68372e52
- git.kernel.org — https://git.kernel.org/stable/c/5dbdbe1133911ca7d8466bb86885adec32ad9438
- git.kernel.org — https://git.kernel.org/stable/c/dd681710ab77c8beafe2e263064cb1bd0e2d6ca9
- git.kernel.org — https://git.kernel.org/stable/c/03170e657f62c26834172742492a8cb8077ef792
- git.kernel.org — https://git.kernel.org/stable/c/5b012f77abde89bf0be8a0547636184fea618137
- git.kernel.org — https://git.kernel.org/stable/c/c26591afd33adce296c022e3480dea4282b7ef91
Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →