Логотип exploitDog
bind:"CVE-2024-50208" OR bind:"CVE-2024-50252" OR bind:"CVE-2024-46713" OR bind:"CVE-2024-53122"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-50208" OR bind:"CVE-2024-50252" OR bind:"CVE-2024-46713" OR bind:"CVE-2024-53122"

Количество 79

Количество 79

suse-cvrf логотип

SUSE-SU-2025:02400-1

2 месяца назад

Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02398-1

2 месяца назад

Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02455-1

2 месяца назад

Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02436-1

2 месяца назад

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02419-1

2 месяца назад

Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02403-1

2 месяца назад

Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02449-1

2 месяца назад

Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02420-1

2 месяца назад

Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02411-1

2 месяца назад

Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02389-1

3 месяца назад

Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02388-1

3 месяца назад

Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

EPSS: Низкий
ubuntu логотип

CVE-2024-46713

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2024-46713

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2024-46713

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2024-46713

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: p ...

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2024-53122

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf().

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2024-53122

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf().

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2024-53122

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf().

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2024-53122

8 месяцев назад

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2024-53122

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: m ...

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2025:02400-1

Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4)

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02398-1

Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3)

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02455-1

Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4)

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02436-1

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02419-1

Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02403-1

Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02449-1

Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02420-1

Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6)

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02411-1

Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP6)

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02389-1

Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02388-1

Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

3 месяца назад
ubuntu логотип
CVE-2024-46713

In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch.

CVSS3: 7.8
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-46713

In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch.

CVSS3: 5.5
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-46713

In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch.

CVSS3: 7.8
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-46713

In the Linux kernel, the following vulnerability has been resolved: p ...

CVSS3: 7.8
0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2024-53122

In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf().

CVSS3: 5.5
0%
Низкий
10 месяцев назад
redhat логотип
CVE-2024-53122

In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf().

CVSS3: 5.9
0%
Низкий
10 месяцев назад
nvd логотип
CVE-2024-53122

In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf().

CVSS3: 5.5
0%
Низкий
10 месяцев назад
msrc логотип
CVSS3: 5.5
0%
Низкий
8 месяцев назад
debian логотип
CVE-2024-53122

In the Linux kernel, the following vulnerability has been resolved: m ...

CVSS3: 5.5
0%
Низкий
10 месяцев назад

Уязвимостей на страницу