Количество 40
Количество 40

CVE-2024-56600
In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear the sock sk pointer on error.

CVE-2024-56600
In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear the sock sk pointer on error.

CVE-2024-56600
In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear the sock sk pointer on error.

CVE-2024-56600
CVE-2024-56600
In the Linux kernel, the following vulnerability has been resolved: n ...

SUSE-SU-2025:1276-1
Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5)

SUSE-SU-2025:1238-1
Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6)

SUSE-SU-2025:1214-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)
GHSA-qc69-73cr-g9fg
In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear the sock sk pointer on error.

BDU:2025-03600
Уязвимость функции inet6_create() модуля net/ipv6/af_inet6.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

SUSE-SU-2025:1257-1
Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

SUSE-SU-2025:1252-1
Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4)

SUSE-SU-2025:1232-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2025:1207-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2025:1275-1
Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3)

SUSE-SU-2025:1278-1
Security update for the Linux Kernel (Live Patch 61 for SLE 12 SP5)

SUSE-SU-2025:1259-1
Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3)

SUSE-SU-2025:1248-1
Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3)

SUSE-SU-2025:1236-1
Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5)

SUSE-SU-2025:1225-1
Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-56600 In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear the sock sk pointer on error. | CVSS3: 7.8 | 0% Низкий | 6 месяцев назад |
![]() | CVE-2024-56600 In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear the sock sk pointer on error. | CVSS3: 7.3 | 0% Низкий | 6 месяцев назад |
![]() | CVE-2024-56600 In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear the sock sk pointer on error. | CVSS3: 7.8 | 0% Низкий | 6 месяцев назад |
![]() | CVSS3: 7.8 | 0% Низкий | 3 месяца назад | |
CVE-2024-56600 In the Linux kernel, the following vulnerability has been resolved: n ... | CVSS3: 7.8 | 0% Низкий | 6 месяцев назад | |
![]() | SUSE-SU-2025:1276-1 Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5) | 0% Низкий | 2 месяца назад | |
![]() | SUSE-SU-2025:1238-1 Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6) | 0% Низкий | 2 месяца назад | |
![]() | SUSE-SU-2025:1214-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) | 0% Низкий | 2 месяца назад | |
GHSA-qc69-73cr-g9fg In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear the sock sk pointer on error. | CVSS3: 7.8 | 0% Низкий | 6 месяцев назад | |
![]() | BDU:2025-03600 Уязвимость функции inet6_create() модуля net/ipv6/af_inet6.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7.8 | 0% Низкий | 8 месяцев назад |
![]() | SUSE-SU-2025:1257-1 Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) | 2 месяца назад | ||
![]() | SUSE-SU-2025:1252-1 Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4) | 2 месяца назад | ||
![]() | SUSE-SU-2025:1232-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 2 месяца назад | ||
![]() | SUSE-SU-2025:1207-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 2 месяца назад | ||
![]() | SUSE-SU-2025:1275-1 Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3) | 2 месяца назад | ||
![]() | SUSE-SU-2025:1278-1 Security update for the Linux Kernel (Live Patch 61 for SLE 12 SP5) | 2 месяца назад | ||
![]() | SUSE-SU-2025:1259-1 Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3) | 2 месяца назад | ||
![]() | SUSE-SU-2025:1248-1 Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3) | 2 месяца назад | ||
![]() | SUSE-SU-2025:1236-1 Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5) | 2 месяца назад | ||
![]() | SUSE-SU-2025:1225-1 Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) | 2 месяца назад |
Уязвимостей на страницу