Vulnerabilities > Linux > Linux Kernel > 2.2.5

DATE CVE VULNERABILITY TITLE RISK
2024-12-27 CVE-2024-56600 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object.
local
low complexity
linux CWE-416
7.8
2024-12-27 CVE-2024-56601 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: net: inet: do not leave a dangling sk pointer in inet_create() sock_init_data() attaches the allocated sk object to the provided sock object.
local
low complexity
linux CWE-416
7.8
2024-12-27 CVE-2024-56602 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() sock_init_data() attaches the allocated sk object to the provided sock object.
local
low complexity
linux CWE-416
7.8
2024-12-27 CVE-2024-56603 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: net: af_can: do not leave a dangling sk pointer in can_create() On error can_create() frees the allocated sk object, but sock_init_data() has already attached it to the provided sock object.
local
low complexity
linux CWE-416
7.8
2024-12-27 CVE-2024-56604 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() bt_sock_alloc() attaches allocated sk object to the provided sock object. If rfcomm_dlc_alloc() fails, we release the sk object, but leave the dangling pointer in the sock object, which may cause use-after-free. Fix this by swapping calls to bt_sock_alloc() and rfcomm_dlc_alloc().
local
low complexity
linux CWE-416
7.8
2024-12-27 CVE-2024-56605 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() bt_sock_alloc() allocates the sk object and attaches it to the provided sock object.
local
low complexity
linux CWE-416
7.8
2024-12-27 CVE-2024-56606 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: af_packet: avoid erroring out after sock_init_data() in packet_create() After sock_init_data() the allocated sk object is attached to the provided sock object.
local
low complexity
linux CWE-416
7.8
2024-12-27 CVE-2024-56608 Improper Validation of Array Index vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' An issue was identified in the dcn21_link_encoder_create function where an out-of-bounds access could occur when the hpd_source index was used to reference the link_enc_hpd_regs array.
local
low complexity
linux CWE-129
7.8
2024-12-27 CVE-2024-56623 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix use after free on unload System crash is observed with stack trace warning of use after free.
local
low complexity
linux CWE-416
5.5
2024-12-27 CVE-2024-53179 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free of signing key Customers have reported use-after-free in @ses->auth_key.response with SMB2.1 + sign mounts which occurs due to following race: task A task B cifs_mount() dfs_mount_share() get_session() cifs_mount_get_session() cifs_send_recv() cifs_get_smb_ses() compound_send_recv() cifs_setup_session() smb2_setup_request() kfree_sensitive() smb2_calc_signature() crypto_shash_setkey() *UAF* Fix this by ensuring that we have a valid @ses->auth_key.response by checking whether @ses->ses_status is SES_GOOD or SES_EXITING with @ses->ses_lock held.
local
low complexity
linux CWE-416
7.8