CVE-2024-50123
- EPSS 0.05%
- Veröffentlicht 05.11.2024 18:15:15
- Zuletzt bearbeitet 01.10.2025 21:15:50
In the Linux kernel, the following vulnerability has been resolved: bpf: Add the missing BPF_LINK_TYPE invocation for sockmap There is an out-of-bounds read in bpf_link_show_fdinfo() for the sockmap link fd. Fix it by adding the missing BPF_LINK_TY...
CVE-2024-50124
- EPSS 0.05%
- Veröffentlicht 05.11.2024 18:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:52
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Fix UAF on iso_sock_timeout conn->sk maybe have been unlinked/freed while waiting for iso_conn_lock so this checks if the conn->sk is still valid by checking if it ...
CVE-2024-50125
- EPSS 0.05%
- Veröffentlicht 05.11.2024 18:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:52
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix UAF on sco_sock_timeout conn->sk maybe have been unlinked/freed while waiting for sco_conn_lock so this checks if the conn->sk is still valid by checking if it ...
CVE-2024-50126
- EPSS 0.05%
- Veröffentlicht 05.11.2024 18:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:52
In the Linux kernel, the following vulnerability has been resolved: net: sched: use RCU read-side critical section in taprio_dump() Fix possible use-after-free in 'taprio_dump()' by adding RCU read-side critical section there. Never seen on x86 but...
CVE-2024-50127
- EPSS 0.05%
- Veröffentlicht 05.11.2024 18:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:53
In the Linux kernel, the following vulnerability has been resolved: net: sched: fix use-after-free in taprio_change() In 'taprio_change()', 'admin' pointer may become dangling due to sched switch / removal caused by 'advance_sched()', and critical ...
CVE-2024-50128
- EPSS 0.05%
- Veröffentlicht 05.11.2024 18:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:53
In the Linux kernel, the following vulnerability has been resolved: net: wwan: fix global oob in wwan_rtnl_policy The variable wwan_rtnl_link_ops assign a *bigger* maxtype which leads to a global out-of-bounds read when parsing the netlink attribut...
CVE-2024-50129
- EPSS 0.05%
- Veröffentlicht 05.11.2024 18:15:15
- Zuletzt bearbeitet 01.10.2025 21:15:51
In the Linux kernel, the following vulnerability has been resolved: net: pse-pd: Fix out of bound for loop Adjust the loop limit to prevent out-of-bounds access when iterating over PI structures. The loop should not reach the index pcdev->nr_lines ...
CVE-2024-50130
- EPSS 0.05%
- Veröffentlicht 05.11.2024 18:15:15
- Zuletzt bearbeitet 06.03.2025 17:15:18
In the Linux kernel, the following vulnerability has been resolved: netfilter: bpf: must hold reference on net namespace BUG: KASAN: slab-use-after-free in __nf_unregister_net_hook+0x640/0x6b0 Read of size 8 at addr ffff8880106fe400 by task repro/7...
CVE-2024-50131
- EPSS 0.05%
- Veröffentlicht 05.11.2024 18:15:15
- Zuletzt bearbeitet 03.11.2025 23:16:53
In the Linux kernel, the following vulnerability has been resolved: tracing: Consider the NULL character when validating the event length strlen() returns a string length excluding the null byte. If the string length equals to the maximum buffer le...
CVE-2024-50132
- EPSS 0.05%
- Veröffentlicht 05.11.2024 18:15:15
- Zuletzt bearbeitet 01.10.2025 21:15:51
In the Linux kernel, the following vulnerability has been resolved: tracing/probes: Fix MAX_TRACE_ARGS limit handling When creating a trace_probe we would set nr_args prior to truncating the arguments to MAX_TRACE_ARGS. However, we would only initi...