CVE-2024-36898
- EPSS 0.02%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 23.04.2026 13:51:28
In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: fix uninitialised kfifo If a line is requested with debounce, and that results in debouncing in software, and the line is subsequently reconfigured to enable edge de...
- EPSS 0.01%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 12.05.2026 12:16:49
In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Fix use after free in lineinfo_changed_notify The use-after-free issue occurs as follows: when the GPIO chip device file is being closed by invoking gpio_chrdev_rele...
CVE-2024-36900
- EPSS 0.01%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 30.09.2025 17:49:17
In the Linux kernel, the following vulnerability has been resolved: net: hns3: fix kernel crash when devlink reload during initialization The devlink reload process will access the hardware resources, but the register operation is done before the h...
CVE-2024-36901
- EPSS 0.01%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 21.11.2024 09:22:46
In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent NULL dereference in ip6_output() According to syzbot, there is a chance that ip6_dst_idev() returns NULL in ip6_output(). Most places in IPv6 stack deal with a NULL i...
CVE-2024-36902
- EPSS 0.01%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 12.05.2026 12:16:49
In the Linux kernel, the following vulnerability has been resolved: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() syzbot is able to trigger the following crash [1], caused by unsafe ip6_dst_idev() use. Indeed ip6_dst_idev...
CVE-2024-36903
- EPSS 0.01%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 19.01.2026 13:16:06
In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix potential uninit-value access in __ip6_make_skb() As it was done in commit fc1092f51567 ("ipv4: Fix uninit-value access in __ip_make_skb()") for IPv4, check FLOWI_FLAG_KN...
CVE-2024-36904
- EPSS 0.34%
- Veröffentlicht 30.05.2024 16:15:13
- Zuletzt bearbeitet 12.05.2026 12:16:49
In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique() with nice analysis. Since commit ec94c2696f0b ("tcp...
CVE-2024-36886
- EPSS 0.33%
- Veröffentlicht 30.05.2024 16:15:12
- Zuletzt bearbeitet 22.01.2026 20:24:06
In the Linux kernel, the following vulnerability has been resolved: tipc: fix UAF in error path Sam Page (sam4k) working with Trend Micro Zero Day Initiative reported a UAF in the tipc_buf_append() error path: BUG: KASAN: slab-use-after-free in kf...
CVE-2024-36889
- EPSS 0.01%
- Veröffentlicht 30.05.2024 16:15:12
- Zuletzt bearbeitet 17.12.2025 03:30:38
In the Linux kernel, the following vulnerability has been resolved: mptcp: ensure snd_nxt is properly initialized on connect Christoph reported a splat hinting at a corrupted snd_una: WARNING: CPU: 1 PID: 38 at net/mptcp/protocol.c:1005 __mptcp_...
CVE-2024-36893
- EPSS 0.02%
- Veröffentlicht 30.05.2024 16:15:12
- Zuletzt bearbeitet 21.11.2024 09:22:45
In the Linux kernel, the following vulnerability has been resolved: usb: typec: tcpm: Check for port partner validity before consuming it typec_register_partner() does not guarantee partner registration to always succeed. In the event of failure, p...