Логотип exploitDog
bind:CVE-2024-45016
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-45016

Количество 37

Количество 37

ubuntu логотип

CVE-2024-45016

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate packet...

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2024-45016

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate packet until ...

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2024-45016

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate packe

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2024-45016

8 месяцев назад

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2024-45016

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: n ...

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0414-1

4 месяца назад

Security update for the Linux Kernel (Live Patch 62 for SLE 12 SP5)

EPSS: Низкий
github логотип

GHSA-q53p-qm4c-c2wj

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate pa...

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2025-01943

10 месяцев назад

Уязвимость компонента netem ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0494-1

4 месяца назад

Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0476-1

4 месяца назад

Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0452-1

4 месяца назад

Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0440-1

4 месяца назад

Security update for the Linux Kernel (Live Patch 52 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0426-1

4 месяца назад

Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0410-1

4 месяца назад

Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0487-1

4 месяца назад

Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0486-1

4 месяца назад

Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0465-1

4 месяца назад

Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0449-1

4 месяца назад

Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0489-1

4 месяца назад

Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0462-1

4 месяца назад

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-45016

In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate packet...

CVSS3: 5.5
0%
Низкий
9 месяцев назад
redhat логотип
CVE-2024-45016

In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate packet until ...

CVSS3: 7
0%
Низкий
9 месяцев назад
nvd логотип
CVE-2024-45016

In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate packe

CVSS3: 5.5
0%
Низкий
9 месяцев назад
msrc логотип
CVSS3: 5.5
0%
Низкий
8 месяцев назад
debian логотип
CVE-2024-45016

In the Linux kernel, the following vulnerability has been resolved: n ...

CVSS3: 5.5
0%
Низкий
9 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0414-1

Security update for the Linux Kernel (Live Patch 62 for SLE 12 SP5)

0%
Низкий
4 месяца назад
github логотип
GHSA-q53p-qm4c-c2wj

In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate pa...

CVSS3: 5.5
0%
Низкий
9 месяцев назад
fstec логотип
BDU:2025-01943

Уязвимость компонента netem ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе

CVSS3: 5.5
0%
Низкий
10 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0494-1

Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0476-1

Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0452-1

Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0440-1

Security update for the Linux Kernel (Live Patch 52 for SLE 12 SP5)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0426-1

Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0410-1

Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0487-1

Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0486-1

Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0465-1

Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0449-1

Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0489-1

Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0462-1

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)

4 месяца назад

Уязвимостей на страницу