Логотип exploitDog
bind:"CVE-2024-26735" OR bind:"CVE-2024-26993"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-26735" OR bind:"CVE-2024-26993"

Количество 40

Количество 40

rocky логотип

RLSA-2024:3619

около 1 года назад

Moderate: kernel security and bug fix update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-3619

около 1 года назад

ELSA-2024-3619: kernel security and bug fix update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2024-26735

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations structure for the subsystem must be registered before registering the generic netlink family.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2024-26735

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations structure for the subsystem must be registered before registering the generic netlink family.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2024-26735

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations structure for the subsystem must be registered before registering the generic netlink family.

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2024-26735

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: i ...

CVSS3: 5.5
EPSS: Низкий
ubuntu логотип

CVE-2024-26993

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: fs: sysfs: Fix reference leak in sysfs_break_active_protection() The sysfs_break_active_protection() routine has an obvious reference leak in its error path. If the call to kernfs_find_and_get() fails then kn will be NULL, so the companion sysfs_unbreak_active_protection() routine won't get called (and would only cause an access violation by trying to dereference kn->parent if it was called). As a result, the reference to kobj acquired at the start of the function will never be released. Fix the leak by adding an explicit kobject_put() call when kn is NULL.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2024-26993

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: fs: sysfs: Fix reference leak in sysfs_break_active_protection() The sysfs_break_active_protection() routine has an obvious reference leak in its error path. If the call to kernfs_find_and_get() fails then kn will be NULL, so the companion sysfs_unbreak_active_protection() routine won't get called (and would only cause an access violation by trying to dereference kn->parent if it was called). As a result, the reference to kobj acquired at the start of the function will never be released. Fix the leak by adding an explicit kobject_put() call when kn is NULL.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2024-26993

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: fs: sysfs: Fix reference leak in sysfs_break_active_protection() The sysfs_break_active_protection() routine has an obvious reference leak in its error path. If the call to kernfs_find_and_get() fails then kn will be NULL, so the companion sysfs_unbreak_active_protection() routine won't get called (and would only cause an access violation by trying to dereference kn->parent if it was called). As a result, the reference to kobj acquired at the start of the function will never be released. Fix the leak by adding an explicit kobject_put() call when kn is NULL.

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2024-26993

около 1 года назад

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2024-26993

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: f ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-vmh5-6rg4-ggmq

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations structure for the subsystem must be registered before registering the generic netlink family.

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2024-03678

больше 1 года назад

Уязвимость функции seg6_init() в модуле net/ipv6/seg6.c реализации протокола IPv6 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-x5rp-2v68-jcgf

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: fs: sysfs: Fix reference leak in sysfs_break_active_protection() The sysfs_break_active_protection() routine has an obvious reference leak in its error path. If the call to kernfs_find_and_get() fails then kn will be NULL, so the companion sysfs_unbreak_active_protection() routine won't get called (and would only cause an access violation by trying to dereference kn->parent if it was called). As a result, the reference to kobj acquired at the start of the function will never be released. Fix the leak by adding an explicit kobject_put() call when kn is NULL.

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2024-09321

больше 1 года назад

Уязвимость компонента sysfs ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальной информации

CVSS3: 3.3
EPSS: Низкий
redos логотип

ROS-20241101-01

9 месяцев назад

Множественные уязвимости kernel-lt

CVSS3: 7.8
EPSS: Низкий
rocky логотип

RLSA-2024:3618

около 1 года назад

Moderate: kernel update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-3618

около 1 года назад

ELSA-2024-3618: kernel update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2024:4211

около 1 года назад

Important: kernel security and bug fix update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-4211

около 1 года назад

ELSA-2024-4211: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2024:3619

Moderate: kernel security and bug fix update

около 1 года назад
oracle-oval логотип
ELSA-2024-3619

ELSA-2024-3619: kernel security and bug fix update (MODERATE)

около 1 года назад
ubuntu логотип
CVE-2024-26735

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations structure for the subsystem must be registered before registering the generic netlink family.

CVSS3: 5.5
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-26735

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations structure for the subsystem must be registered before registering the generic netlink family.

CVSS3: 5.5
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-26735

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations structure for the subsystem must be registered before registering the generic netlink family.

CVSS3: 5.5
0%
Низкий
больше 1 года назад
debian логотип
CVE-2024-26735

In the Linux kernel, the following vulnerability has been resolved: i ...

CVSS3: 5.5
0%
Низкий
больше 1 года назад
ubuntu логотип
CVE-2024-26993

In the Linux kernel, the following vulnerability has been resolved: fs: sysfs: Fix reference leak in sysfs_break_active_protection() The sysfs_break_active_protection() routine has an obvious reference leak in its error path. If the call to kernfs_find_and_get() fails then kn will be NULL, so the companion sysfs_unbreak_active_protection() routine won't get called (and would only cause an access violation by trying to dereference kn->parent if it was called). As a result, the reference to kobj acquired at the start of the function will never be released. Fix the leak by adding an explicit kobject_put() call when kn is NULL.

CVSS3: 5.5
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-26993

In the Linux kernel, the following vulnerability has been resolved: fs: sysfs: Fix reference leak in sysfs_break_active_protection() The sysfs_break_active_protection() routine has an obvious reference leak in its error path. If the call to kernfs_find_and_get() fails then kn will be NULL, so the companion sysfs_unbreak_active_protection() routine won't get called (and would only cause an access violation by trying to dereference kn->parent if it was called). As a result, the reference to kobj acquired at the start of the function will never be released. Fix the leak by adding an explicit kobject_put() call when kn is NULL.

CVSS3: 5.5
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-26993

In the Linux kernel, the following vulnerability has been resolved: fs: sysfs: Fix reference leak in sysfs_break_active_protection() The sysfs_break_active_protection() routine has an obvious reference leak in its error path. If the call to kernfs_find_and_get() fails then kn will be NULL, so the companion sysfs_unbreak_active_protection() routine won't get called (and would only cause an access violation by trying to dereference kn->parent if it was called). As a result, the reference to kobj acquired at the start of the function will never be released. Fix the leak by adding an explicit kobject_put() call when kn is NULL.

CVSS3: 5.5
0%
Низкий
около 1 года назад
msrc логотип
CVSS3: 5.5
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-26993

In the Linux kernel, the following vulnerability has been resolved: f ...

CVSS3: 5.5
0%
Низкий
около 1 года назад
github логотип
GHSA-vmh5-6rg4-ggmq

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations structure for the subsystem must be registered before registering the generic netlink family.

CVSS3: 5.5
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-03678

Уязвимость функции seg6_init() в модуле net/ipv6/seg6.c реализации протокола IPv6 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-x5rp-2v68-jcgf

In the Linux kernel, the following vulnerability has been resolved: fs: sysfs: Fix reference leak in sysfs_break_active_protection() The sysfs_break_active_protection() routine has an obvious reference leak in its error path. If the call to kernfs_find_and_get() fails then kn will be NULL, so the companion sysfs_unbreak_active_protection() routine won't get called (and would only cause an access violation by trying to dereference kn->parent if it was called). As a result, the reference to kobj acquired at the start of the function will never be released. Fix the leak by adding an explicit kobject_put() call when kn is NULL.

CVSS3: 5.5
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-09321

Уязвимость компонента sysfs ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальной информации

CVSS3: 3.3
0%
Низкий
больше 1 года назад
redos логотип
ROS-20241101-01

Множественные уязвимости kernel-lt

CVSS3: 7.8
9 месяцев назад
rocky логотип
RLSA-2024:3618

Moderate: kernel update

около 1 года назад
oracle-oval логотип
ELSA-2024-3618

ELSA-2024-3618: kernel update (MODERATE)

около 1 года назад
rocky логотип
RLSA-2024:4211

Important: kernel security and bug fix update

около 1 года назад
oracle-oval логотип
ELSA-2024-4211

ELSA-2024-4211: kernel security and bug fix update (IMPORTANT)

около 1 года назад

Уязвимостей на страницу