Vulnerability CVE-2024-50126 fixed in Linux kernel to prevent use-after-free in taprio_dump().
Reporter | Title | Published | Views | Family All 19 |
---|---|---|---|---|
CVE | CVE-2024-50126 | 5 Nov 202418:15 | – | cve |
RedhatCVE | CVE-2024-50126 | 5 Nov 202422:34 | – | redhatcve |
OSV | UBUNTU-CVE-2024-50126 | 5 Nov 202418:15 | – | osv |
OSV | CVE-2024-50126 | 5 Nov 202418:15 | – | osv |
OSV | linux - security update | 24 Nov 202400:00 | – | osv |
OSV | kernel-devel-6.11.8-1.1 on GA media | 15 Nov 202400:00 | – | osv |
OSV | linux-6.1 - security update | 2 Jan 202500:00 | – | osv |
UbuntuCve | CVE-2024-50126 | 5 Nov 202400:00 | – | ubuntucve |
NVD | CVE-2024-50126 | 5 Nov 202418:15 | – | nvd |
Cvelist | CVE-2024-50126 net: sched: use RCU read-side critical section in taprio_dump() | 5 Nov 202417:10 | – | cvelist |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo