CVE-2024-27395
- EPSS 0.01%
- Veröffentlicht 14.05.2024 15:12:27
- Zuletzt bearbeitet 14.01.2025 14:27:22
In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: Fix Use-After-Free in ovs_ct_exit Since kfree_rcu, which is called in the hlist_for_each_entry_rcu traversal of ovs_ct_limit_exit, is not part of the RCU read cri...
CVE-2024-34397
- EPSS 0.1%
- Veröffentlicht 07.05.2024 18:15:08
- Zuletzt bearbeitet 18.06.2025 14:36:02
An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can ...
CVE-2024-33602
- EPSS 0.32%
- Veröffentlicht 06.05.2024 20:15:11
- Zuletzt bearbeitet 18.06.2025 14:40:48
nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 ...
CVE-2024-33601
- EPSS 0.07%
- Veröffentlicht 06.05.2024 20:15:11
- Zuletzt bearbeitet 01.08.2025 01:56:26
nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a den...
CVE-2024-33600
- EPSS 0.22%
- Veröffentlicht 06.05.2024 20:15:11
- Zuletzt bearbeitet 18.06.2025 14:50:25
nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in gli...
CVE-2024-33599
- EPSS 0.6%
- Veröffentlicht 06.05.2024 20:15:11
- Zuletzt bearbeitet 18.06.2025 14:56:01
nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw...
CVE-2024-34509
- EPSS 0.11%
- Veröffentlicht 05.05.2024 20:15:07
- Zuletzt bearbeitet 11.06.2025 15:35:22
dcmdata in DCMTK before 3.6.9 has a segmentation fault via an invalid DIMSE message.
CVE-2024-34508
- EPSS 0.06%
- Veröffentlicht 05.05.2024 20:15:07
- Zuletzt bearbeitet 10.06.2025 17:44:33
dcmnet in DCMTK before 3.6.9 has a segmentation fault via an invalid DIMSE message.
CVE-2024-27388
- EPSS 0.01%
- Veröffentlicht 01.05.2024 13:15:51
- Zuletzt bearbeitet 14.01.2025 14:56:08
In the Linux kernel, the following vulnerability has been resolved: SUNRPC: fix some memleaks in gssx_dec_option_array The creds and oa->data need to be freed in the error-handling paths after their allocation. So this patch add these deallocations...
CVE-2024-27077
- EPSS 0.01%
- Veröffentlicht 01.05.2024 13:15:51
- Zuletzt bearbeitet 23.12.2024 14:38:37
In the Linux kernel, the following vulnerability has been resolved: media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity The entity->name (i.e. name) is allocated in v4l2_m2m_register_entity but isn't freed in its following error-handling...