Количество 16
Количество 16
CVE-2024-49852
In the Linux kernel, the following vulnerability has been resolved: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() The kref_put() function will call nport->release if the refcount drops to zero. The nport->release release function is _efc_nport_free() which frees "nport". But then we dereference "nport" on the next line which is a use after free. Re-order these lines to avoid the use after free.
CVE-2024-49852
In the Linux kernel, the following vulnerability has been resolved: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() The kref_put() function will call nport->release if the refcount drops to zero. The nport->release release function is _efc_nport_free() which frees "nport". But then we dereference "nport" on the next line which is a use after free. Re-order these lines to avoid the use after free.
CVE-2024-49852
In the Linux kernel, the following vulnerability has been resolved: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() The kref_put() function will call nport->release if the refcount drops to zero. The nport->release release function is _efc_nport_free() which frees "nport". But then we dereference "nport" on the next line which is a use after free. Re-order these lines to avoid the use after free.
CVE-2024-49852
scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()
CVE-2024-49852
In the Linux kernel, the following vulnerability has been resolved: s ...
GHSA-5w8m-6wwq-mm8m
In the Linux kernel, the following vulnerability has been resolved: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() The kref_put() function will call nport->release if the refcount drops to zero. The nport->release release function is _efc_nport_free() which frees "nport". But then we dereference "nport" on the next line which is a use after free. Re-order these lines to avoid the use after free.
BDU:2024-08995
Уязвимость функции efc_nport_vport_del() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
ROS-20250312-01
Множественные уязвимости kernel-lt
ELSA-2024-12887
ELSA-2024-12887: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2024:4376-1
Security update for the Linux Kernel
SUSE-SU-2024:4315-1
Security update for the Linux Kernel
SUSE-SU-2024:4314-1
Security update for the Linux Kernel
SUSE-SU-2024:3984-1
Security update for the Linux Kernel
SUSE-SU-2024:4364-1
Security update for the Linux Kernel
SUSE-SU-2024:4387-1
Security update for the Linux Kernel
SUSE-SU-2024:4318-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-49852 In the Linux kernel, the following vulnerability has been resolved: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() The kref_put() function will call nport->release if the refcount drops to zero. The nport->release release function is _efc_nport_free() which frees "nport". But then we dereference "nport" on the next line which is a use after free. Re-order these lines to avoid the use after free. | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
CVE-2024-49852 In the Linux kernel, the following vulnerability has been resolved: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() The kref_put() function will call nport->release if the refcount drops to zero. The nport->release release function is _efc_nport_free() which frees "nport". But then we dereference "nport" on the next line which is a use after free. Re-order these lines to avoid the use after free. | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
CVE-2024-49852 In the Linux kernel, the following vulnerability has been resolved: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() The kref_put() function will call nport->release if the refcount drops to zero. The nport->release release function is _efc_nport_free() which frees "nport". But then we dereference "nport" on the next line which is a use after free. Re-order these lines to avoid the use after free. | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
CVE-2024-49852 scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() | 0% Низкий | около 1 года назад | ||
CVE-2024-49852 In the Linux kernel, the following vulnerability has been resolved: s ... | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
GHSA-5w8m-6wwq-mm8m In the Linux kernel, the following vulnerability has been resolved: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() The kref_put() function will call nport->release if the refcount drops to zero. The nport->release release function is _efc_nport_free() which frees "nport". But then we dereference "nport" on the next line which is a use after free. Re-order these lines to avoid the use after free. | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
BDU:2024-08995 Уязвимость функции efc_nport_vport_del() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
ROS-20250312-01 Множественные уязвимости kernel-lt | CVSS3: 7.8 | 8 месяцев назад | ||
ELSA-2024-12887 ELSA-2024-12887: Unbreakable Enterprise kernel security update (IMPORTANT) | 11 месяцев назад | |||
SUSE-SU-2024:4376-1 Security update for the Linux Kernel | 11 месяцев назад | |||
SUSE-SU-2024:4315-1 Security update for the Linux Kernel | 11 месяцев назад | |||
SUSE-SU-2024:4314-1 Security update for the Linux Kernel | 11 месяцев назад | |||
SUSE-SU-2024:3984-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:4364-1 Security update for the Linux Kernel | 11 месяцев назад | |||
SUSE-SU-2024:4387-1 Security update for the Linux Kernel | 11 месяцев назад | |||
SUSE-SU-2024:4318-1 Security update for the Linux Kernel | 11 месяцев назад |
Уязвимостей на страницу