CVE-2024-36484
- EPSS 0.01%
- Veröffentlicht 21.06.2024 11:15:10
- Zuletzt bearbeitet 12.05.2026 12:16:48
In the Linux kernel, the following vulnerability has been resolved: net: relax socket state check at accept time. Christoph reported the following splat: WARNING: CPU: 1 PID: 772 at net/ipv4/af_inet.c:761 __inet_accept+0x1f4/0x4a0 Modules linked i...
- EPSS 0.04%
- Veröffentlicht 21.06.2024 11:15:10
- Zuletzt bearbeitet 22.08.2024 00:15:05
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-37356
- EPSS 0.02%
- Veröffentlicht 21.06.2024 11:15:10
- Zuletzt bearbeitet 12.05.2026 12:16:51
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix shift-out-of-bounds in dctcp_update_alpha(). In dctcp_update_alpha(), we use a module parameter dctcp_shift_g as follows: alpha -= min_not_zero(alpha, alpha >> dctcp_sh...
CVE-2024-38381
- EPSS 0.01%
- Veröffentlicht 21.06.2024 11:15:10
- Zuletzt bearbeitet 12.05.2026 12:16:52
In the Linux kernel, the following vulnerability has been resolved: nfc: nci: Fix uninit-value in nci_rx_work syzbot reported the following uninit-value access issue [1] nci_rx_work() parses received packet from ndev->rx_q. It should be validated ...
CVE-2024-31076
- EPSS 0.02%
- Veröffentlicht 21.06.2024 11:15:09
- Zuletzt bearbeitet 04.11.2025 18:16:19
In the Linux kernel, the following vulnerability has been resolved: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline The absence of IRQD_MOVE_PCNTXT prevents immediate effectiveness of interrupt affinity reconfiguration via pro...
CVE-2024-33621
- EPSS 0.01%
- Veröffentlicht 21.06.2024 11:15:09
- Zuletzt bearbeitet 12.05.2026 12:16:35
In the Linux kernel, the following vulnerability has been resolved: ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound Raw packet from PF_PACKET socket ontop of an IPv6-backed ipvlan device will hit WARN_ON_ONCE() in sk_mc_loop() through sc...
- EPSS 0.03%
- Veröffentlicht 20.06.2024 12:15:14
- Zuletzt bearbeitet 17.09.2025 17:18:53
In the Linux kernel, the following vulnerability has been resolved: rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev struct rpmsg_ctrldev contains a struct cdev. The current code frees the rpmsg_ctrldev struct in rpmsg_ctrldev_re...
CVE-2022-48760
- EPSS 0.02%
- Veröffentlicht 20.06.2024 12:15:14
- Zuletzt bearbeitet 17.09.2025 16:49:52
In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix hang in usb_kill_urb by adding memory barriers The syzbot fuzzer has identified a bug in which processes hang waiting for usb_kill_urb() to return. It turns out the...
CVE-2022-48768
- EPSS 0.04%
- Veröffentlicht 20.06.2024 12:15:14
- Zuletzt bearbeitet 21.11.2024 07:33:59
In the Linux kernel, the following vulnerability has been resolved: tracing/histogram: Fix a potential memory leak for kstrdup() kfree() is missing on an error path to free the memory allocated by kstrdup(): p = param = kstrdup(data->params[i], ...
CVE-2022-48754
- EPSS 0.03%
- Veröffentlicht 20.06.2024 12:15:13
- Zuletzt bearbeitet 24.03.2025 18:17:31
In the Linux kernel, the following vulnerability has been resolved: phylib: fix potential use-after-free Commit bafbdd527d56 ("phylib: Add device reset GPIO support") added call to phy_device_reset(phydev) after the put_device() call in phy_detach(...