CVE-2024-44999
- EPSS 0.01%
- Veröffentlicht 04.09.2024 20:15:08
- Zuletzt bearbeitet 03.11.2025 23:15:47
In the Linux kernel, the following vulnerability has been resolved: gtp: pull network headers in gtp_dev_xmit() syzbot/KMSAN reported use of uninit-value in get_dev_xmit() [1] We must make sure the IPv4 or Ipv6 header is pulled in skb->head before...
CVE-2024-45003
- EPSS 0.01%
- Veröffentlicht 04.09.2024 20:15:08
- Zuletzt bearbeitet 03.11.2025 23:15:48
In the Linux kernel, the following vulnerability has been resolved: vfs: Don't evict inode under the inode lru traversing context The inode reclaiming process(See function prune_icache_sb) collects all reclaimable inodes and mark them with I_FREEIN...
CVE-2024-45006
- EPSS 0.02%
- Veröffentlicht 04.09.2024 20:15:08
- Zuletzt bearbeitet 03.11.2025 23:15:48
In the Linux kernel, the following vulnerability has been resolved: xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration re-enumerating full-speed devices after a failed address device command can trigger a NULL pointer dereferen...
CVE-2024-44974
- EPSS 0.01%
- Veröffentlicht 04.09.2024 20:15:07
- Zuletzt bearbeitet 09.04.2026 17:41:57
In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: avoid possible UaF when selecting endp select_local_address() and select_signal_address() both select an endpoint entry from the list inside an RCU protected section, bu...
CVE-2024-44982
- EPSS 0.01%
- Veröffentlicht 04.09.2024 20:15:07
- Zuletzt bearbeitet 03.11.2025 23:15:45
In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails If the dpu_format_populate_layout() fails, then FB is prepared, but not cleaned up. This ends up leaking the pin_count o...
CVE-2024-44983
- EPSS 0.01%
- Veröffentlicht 04.09.2024 20:15:07
- Zuletzt bearbeitet 03.11.2025 23:15:45
In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: validate vlan header Ensure there is sufficient room to access the protocol field of the VLAN header, validate it once before the flowtable lookup. =========...
CVE-2024-44985
- EPSS 0.01%
- Veröffentlicht 04.09.2024 20:15:07
- Zuletzt bearbeitet 03.11.2025 23:15:46
In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent possible UAF in ip6_xmit() If skb_expand_head() returns NULL, skb has been freed and the associated dst/idev could also have been freed. We must use rcu_read_lock() ...
CVE-2024-44986
- EPSS 0.02%
- Veröffentlicht 04.09.2024 20:15:07
- Zuletzt bearbeitet 09.04.2026 17:42:15
In the Linux kernel, the following vulnerability has been resolved: ipv6: fix possible UAF in ip6_finish_output2() If skb_expand_head() returns NULL, skb has been freed and associated dst/idev could also have been freed. We need to hold rcu_read_l...
CVE-2024-44987
- EPSS 0.02%
- Veröffentlicht 04.09.2024 20:15:07
- Zuletzt bearbeitet 12.05.2026 12:17:09
In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent UAF in ip6_send_skb() syzbot reported an UAF in ip6_send_skb() [1] After ip6_local_out() has returned, we no longer can safely dereference rt, unless we hold rcu_rea...
CVE-2024-44988
- EPSS 0.02%
- Veröffentlicht 04.09.2024 20:15:07
- Zuletzt bearbeitet 03.11.2025 23:15:46
In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Fix out-of-bound access If an ATU violation was caused by a CPU Load operation, the SPID could be larger than DSA_MAX_PORTS (the size of mv88e6xxx_chip.ports[]...