We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-44998

atm: idt77252: prevent use after free in dequeue_rx()



AssignerLinux
Reserved2024-08-21
Published2024-09-04
Updated2024-09-04

Description

In the Linux kernel, the following vulnerability has been resolved: atm: idt77252: prevent use after free in dequeue_rx() We can't dereference "skb" after calling vcc->push() because the skb is released.

Product status

Default status
0x4005db6ed0

1da177e4c3f4 before 628ea82190a6
affected

1da177e4c3f4 before 09e086a5f72e
affected

1da177e4c3f4 before 1cece837e387
affected

1da177e4c3f4 before 24cf390a5426
affected

1da177e4c3f4 before 379a6a326514
affected

1da177e4c3f4 before ef23c18ab88e
affected

1da177e4c3f4 before 91b4850e7165
affected

1da177e4c3f4 before a9a18e8f770c
affected

Default status
0x4005db7100

2.6.12
affected

Any version before 2.6.12
unaffected

4.19.321
unaffected

5.4.283
unaffected

5.10.225
unaffected

5.15.166
unaffected

6.1.107
unaffected

6.6.48
unaffected

6.10.7
unaffected

6.11-rc4
unaffected

References

https://git.kernel.org/stable/c/628ea82190a678a56d2ec38cda3addf3b3a6248d

https://git.kernel.org/stable/c/09e086a5f72ea27c758b3f3b419a69000c32adc1

https://git.kernel.org/stable/c/1cece837e387c039225f19028df255df87a97c0d

https://git.kernel.org/stable/c/24cf390a5426aac9255205e9533cdd7b4235d518

https://git.kernel.org/stable/c/379a6a326514a3e2f71b674091dfb0e0e7522b55

https://git.kernel.org/stable/c/ef23c18ab88e33ce000d06a5c6aad0620f219bfd

https://git.kernel.org/stable/c/91b4850e7165a4b7180ef1e227733bcb41ccdf10

https://git.kernel.org/stable/c/a9a18e8f770c9b0703dab93580d0b02e199a4c79

cve.org CVE-2024-44998

nvd.nist.gov CVE-2024-44998

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-44998
Subscribe to our newsletter to learn more about our work.