Количество 17
Количество 17
CVE-2024-56606
In the Linux kernel, the following vulnerability has been resolved: af_packet: avoid erroring out after sock_init_data() in packet_create() After sock_init_data() the allocated sk object is attached to the provided sock object. On error, packet_create() frees the sk object leaving the dangling pointer in the sock object on return. Some other code may try to use this pointer and cause use-after-free.
CVE-2024-56606
In the Linux kernel, the following vulnerability has been resolved: af_packet: avoid erroring out after sock_init_data() in packet_create() After sock_init_data() the allocated sk object is attached to the provided sock object. On error, packet_create() frees the sk object leaving the dangling pointer in the sock object on return. Some other code may try to use this pointer and cause use-after-free.
CVE-2024-56606
In the Linux kernel, the following vulnerability has been resolved: af_packet: avoid erroring out after sock_init_data() in packet_create() After sock_init_data() the allocated sk object is attached to the provided sock object. On error, packet_create() frees the sk object leaving the dangling pointer in the sock object on return. Some other code may try to use this pointer and cause use-after-free.
CVE-2024-56606
CVE-2024-56606
In the Linux kernel, the following vulnerability has been resolved: a ...
GHSA-p4h8-c4rj-g3r9
In the Linux kernel, the following vulnerability has been resolved: af_packet: avoid erroring out after sock_init_data() in packet_create() After sock_init_data() the allocated sk object is attached to the provided sock object. On error, packet_create() frees the sk object leaving the dangling pointer in the sock object on return. Some other code may try to use this pointer and cause use-after-free.
BDU:2025-04675
Уязвимость функции packet_create() модуля net/packet/af_packet.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации.
ROS-20250414-01
Множественные уязвимости kernel-lt
SUSE-SU-2025:0236-1
Security update for the Linux Kernel
ELSA-2025-20100
ELSA-2025-20100: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-20095
ELSA-2025-20095: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2025:0428-1
Security update for the Linux Kernel
SUSE-SU-2025:0557-1
Security update for the Linux Kernel
SUSE-SU-2025:0499-1
Security update for the Linux Kernel
SUSE-SU-2025:0289-1
Security update for the Linux Kernel
ELSA-2025-20530
ELSA-2025-20530: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-20480
ELSA-2025-20480: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-56606 In the Linux kernel, the following vulnerability has been resolved: af_packet: avoid erroring out after sock_init_data() in packet_create() After sock_init_data() the allocated sk object is attached to the provided sock object. On error, packet_create() frees the sk object leaving the dangling pointer in the sock object on return. Some other code may try to use this pointer and cause use-after-free. | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад | |
CVE-2024-56606 In the Linux kernel, the following vulnerability has been resolved: af_packet: avoid erroring out after sock_init_data() in packet_create() After sock_init_data() the allocated sk object is attached to the provided sock object. On error, packet_create() frees the sk object leaving the dangling pointer in the sock object on return. Some other code may try to use this pointer and cause use-after-free. | CVSS3: 7.3 | 0% Низкий | 11 месяцев назад | |
CVE-2024-56606 In the Linux kernel, the following vulnerability has been resolved: af_packet: avoid erroring out after sock_init_data() in packet_create() After sock_init_data() the allocated sk object is attached to the provided sock object. On error, packet_create() frees the sk object leaving the dangling pointer in the sock object on return. Some other code may try to use this pointer and cause use-after-free. | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад | |
CVSS3: 7.8 | 0% Низкий | 8 месяцев назад | ||
CVE-2024-56606 In the Linux kernel, the following vulnerability has been resolved: a ... | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад | |
GHSA-p4h8-c4rj-g3r9 In the Linux kernel, the following vulnerability has been resolved: af_packet: avoid erroring out after sock_init_data() in packet_create() After sock_init_data() the allocated sk object is attached to the provided sock object. On error, packet_create() frees the sk object leaving the dangling pointer in the sock object on return. Some other code may try to use this pointer and cause use-after-free. | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад | |
BDU:2025-04675 Уязвимость функции packet_create() модуля net/packet/af_packet.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации. | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
ROS-20250414-01 Множественные уязвимости kernel-lt | CVSS3: 7.8 | 7 месяцев назад | ||
SUSE-SU-2025:0236-1 Security update for the Linux Kernel | 10 месяцев назад | |||
ELSA-2025-20100 ELSA-2025-20100: Unbreakable Enterprise kernel security update (IMPORTANT) | 9 месяцев назад | |||
ELSA-2025-20095 ELSA-2025-20095: Unbreakable Enterprise kernel security update (IMPORTANT) | 9 месяцев назад | |||
SUSE-SU-2025:0428-1 Security update for the Linux Kernel | 9 месяцев назад | |||
SUSE-SU-2025:0557-1 Security update for the Linux Kernel | 9 месяцев назад | |||
SUSE-SU-2025:0499-1 Security update for the Linux Kernel | 9 месяцев назад | |||
SUSE-SU-2025:0289-1 Security update for the Linux Kernel | 10 месяцев назад | |||
ELSA-2025-20530 ELSA-2025-20530: Unbreakable Enterprise kernel security update (IMPORTANT) | 3 месяца назад | |||
ELSA-2025-20480 ELSA-2025-20480: Unbreakable Enterprise kernel security update (IMPORTANT) | 4 месяца назад |
Уязвимостей на страницу