Vulnerabilities > Linux > Linux Kernel > 4.4.74

DATE CVE VULNERABILITY TITLE RISK
2024-12-27 CVE-2024-56595 Improper Validation of Array Index vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree When the value of lp is 0 at the beginning of the for loop, it will become negative in the next assignment and we should bail out.
local
low complexity
linux CWE-129
7.8
2024-12-27 CVE-2024-56596 Improper Validation of Array Index vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: jfs: fix array-index-out-of-bounds in jfs_readdir The stbl might contain some invalid values.
local
low complexity
linux CWE-129
7.8
2024-12-27 CVE-2024-56598 Improper Validation of Array Index vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: jfs: array-index-out-of-bounds fix in dtReadFirst The value of stbl can be sometimes out of bounds due to a bad filesystem.
local
low complexity
linux CWE-129
7.8
2024-12-27 CVE-2024-56599 NULL Pointer Dereference vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: avoid NULL pointer error during sdio remove When running 'rmmod ath10k', ath10k_sdio_remove() will free sdio workqueue by destroy_workqueue().
local
low complexity
linux CWE-476
5.5
2024-12-27 CVE-2024-56600 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object.
local
low complexity
linux CWE-416
7.8
2024-12-27 CVE-2024-56601 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: net: inet: do not leave a dangling sk pointer in inet_create() sock_init_data() attaches the allocated sk object to the provided sock object.
local
low complexity
linux CWE-416
7.8
2024-12-27 CVE-2024-56602 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() sock_init_data() attaches the allocated sk object to the provided sock object.
local
low complexity
linux CWE-416
7.8
2024-12-27 CVE-2024-56603 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: net: af_can: do not leave a dangling sk pointer in can_create() On error can_create() frees the allocated sk object, but sock_init_data() has already attached it to the provided sock object.
local
low complexity
linux CWE-416
7.8
2024-12-27 CVE-2024-56604 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() bt_sock_alloc() attaches allocated sk object to the provided sock object. If rfcomm_dlc_alloc() fails, we release the sk object, but leave the dangling pointer in the sock object, which may cause use-after-free. Fix this by swapping calls to bt_sock_alloc() and rfcomm_dlc_alloc().
local
low complexity
linux CWE-416
7.8
2024-12-27 CVE-2024-56605 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() bt_sock_alloc() allocates the sk object and attaches it to the provided sock object.
local
low complexity
linux CWE-416
7.8