CVE-2024-36900
- EPSS 0.01%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 30.09.2025 17:49:17
In the Linux kernel, the following vulnerability has been resolved: net: hns3: fix kernel crash when devlink reload during initialization The devlink reload process will access the hardware resources, but the register operation is done before the h...
CVE-2024-36901
- EPSS 0.01%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 21.11.2024 09:22:46
In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent NULL dereference in ip6_output() According to syzbot, there is a chance that ip6_dst_idev() returns NULL in ip6_output(). Most places in IPv6 stack deal with a NULL i...
CVE-2024-36902
- EPSS 0.01%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 12.05.2026 12:16:49
In the Linux kernel, the following vulnerability has been resolved: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() syzbot is able to trigger the following crash [1], caused by unsafe ip6_dst_idev() use. Indeed ip6_dst_idev...
CVE-2024-36903
- EPSS 0.01%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 19.01.2026 13:16:06
In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix potential uninit-value access in __ip6_make_skb() As it was done in commit fc1092f51567 ("ipv4: Fix uninit-value access in __ip_make_skb()") for IPv4, check FLOWI_FLAG_KN...
CVE-2024-36904
- EPSS 0.34%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 12.05.2026 12:16:49
In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique() with nice analysis. Since commit ec94c2696f0b ("tcp...
CVE-2024-36886
- EPSS 0.33%
- Veröffentlicht 30.05.2024 16:15:12
- Zuletzt bearbeitet 22.01.2026 20:24:06
In the Linux kernel, the following vulnerability has been resolved: tipc: fix UAF in error path Sam Page (sam4k) working with Trend Micro Zero Day Initiative reported a UAF in the tipc_buf_append() error path: BUG: KASAN: slab-use-after-free in kf...
CVE-2024-36889
- EPSS 0.01%
- Veröffentlicht 30.05.2024 16:15:12
- Zuletzt bearbeitet 17.12.2025 03:30:38
In the Linux kernel, the following vulnerability has been resolved: mptcp: ensure snd_nxt is properly initialized on connect Christoph reported a splat hinting at a corrupted snd_una: WARNING: CPU: 1 PID: 38 at net/mptcp/protocol.c:1005 __mptcp_...
CVE-2024-36890
- EPSS 0.01%
- Veröffentlicht 30.05.2024 16:15:12
- Zuletzt bearbeitet 29.10.2025 14:15:50
In the Linux kernel, the following vulnerability has been resolved: mm/slab: make __free(kfree) accept error pointers Currently, if an automatically freed allocation is an error pointer that will lead to a crash. An example of this is in wm831x_gp...
CVE-2024-36891
- EPSS 0.02%
- Veröffentlicht 30.05.2024 16:15:12
- Zuletzt bearbeitet 21.11.2024 09:22:44
In the Linux kernel, the following vulnerability has been resolved: maple_tree: fix mas_empty_area_rev() null pointer dereference Currently the code calls mas_start() followed by mas_data_end() if the maple state is MA_START, but mas_start() may re...
CVE-2024-36893
- EPSS 0.02%
- Veröffentlicht 30.05.2024 16:15:12
- Zuletzt bearbeitet 21.11.2024 09:22:45
In the Linux kernel, the following vulnerability has been resolved: usb: typec: tcpm: Check for port partner validity before consuming it typec_register_partner() does not guarantee partner registration to always succeed. In the event of failure, p...