Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-38612

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-19 Jun, 2024 | 13:56
Updated At-04 May, 2025 | 09:15
Rejected At-
Credits

ipv6: sr: fix invalid unregister error path

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix invalid unregister error path The error path of seg6_init() is wrong in case CONFIG_IPV6_SEG6_LWTUNNEL is not defined. In that case if seg6_hmac_init() fails, the genl_unregister_family() isn't called. This issue exist since commit 46738b1317e1 ("ipv6: sr: add option to control lwtunnel support"), and commit 5559cea2d5aa ("ipv6: sr: fix possible use-after-free and null-ptr-deref") replaced unregister_pernet_subsys() with genl_unregister_family() in this error path.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:19 Jun, 2024 | 13:56
Updated At:04 May, 2025 | 09:15
Rejected At:
▼CVE Numbering Authority (CNA)
ipv6: sr: fix invalid unregister error path

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix invalid unregister error path The error path of seg6_init() is wrong in case CONFIG_IPV6_SEG6_LWTUNNEL is not defined. In that case if seg6_hmac_init() fails, the genl_unregister_family() isn't called. This issue exist since commit 46738b1317e1 ("ipv6: sr: add option to control lwtunnel support"), and commit 5559cea2d5aa ("ipv6: sr: fix possible use-after-free and null-ptr-deref") replaced unregister_pernet_subsys() with genl_unregister_family() in this error path.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/ipv6/seg6.c
Default Status
unaffected
Versions
Affected
  • From 46738b1317e169b281ad74690276916e24d1be6d before 10610575a3ac2a702bf5c57aa931beaf847949c7 (git)
  • From 46738b1317e169b281ad74690276916e24d1be6d before 646cd236c55e2cb5f146fc41bbe4034c4af5b2a4 (git)
  • From 46738b1317e169b281ad74690276916e24d1be6d before 00e6335329f23ac6cf3105931691674e28bc598c (git)
  • From 46738b1317e169b281ad74690276916e24d1be6d before 1a63730fb315bb1bab97edd69ff58ad45e04bb01 (git)
  • From 46738b1317e169b281ad74690276916e24d1be6d before e77a3ec7ada84543e75722a1283785a6544de925 (git)
  • From 46738b1317e169b281ad74690276916e24d1be6d before 3398a40dccb88d3a7eef378247a023a78472db66 (git)
  • From 46738b1317e169b281ad74690276916e24d1be6d before 85a70ff1e572160f1eeb096ed48d09a1c9d4d89a (git)
  • From 46738b1317e169b281ad74690276916e24d1be6d before c04d6a914e890ccea4a9d11233009a2ee7978bf4 (git)
  • From 46738b1317e169b281ad74690276916e24d1be6d before 160e9d2752181fcf18c662e74022d77d3164cd45 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/ipv6/seg6.c
Default Status
affected
Versions
Affected
  • 4.10
Unaffected
  • From 0 before 4.10 (semver)
  • From 4.19.316 through 4.19.* (semver)
  • From 5.4.278 through 5.4.* (semver)
  • From 5.10.219 through 5.10.* (semver)
  • From 5.15.161 through 5.15.* (semver)
  • From 6.1.93 through 6.1.* (semver)
  • From 6.6.33 through 6.6.* (semver)
  • From 6.8.12 through 6.8.* (semver)
  • From 6.9.3 through 6.9.* (semver)
  • From 6.10 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/10610575a3ac2a702bf5c57aa931beaf847949c7
N/A
https://git.kernel.org/stable/c/646cd236c55e2cb5f146fc41bbe4034c4af5b2a4
N/A
https://git.kernel.org/stable/c/00e6335329f23ac6cf3105931691674e28bc598c
N/A
https://git.kernel.org/stable/c/1a63730fb315bb1bab97edd69ff58ad45e04bb01
N/A
https://git.kernel.org/stable/c/e77a3ec7ada84543e75722a1283785a6544de925
N/A
https://git.kernel.org/stable/c/3398a40dccb88d3a7eef378247a023a78472db66
N/A
https://git.kernel.org/stable/c/85a70ff1e572160f1eeb096ed48d09a1c9d4d89a
N/A
https://git.kernel.org/stable/c/c04d6a914e890ccea4a9d11233009a2ee7978bf4
N/A
https://git.kernel.org/stable/c/160e9d2752181fcf18c662e74022d77d3164cd45
N/A
Hyperlink: https://git.kernel.org/stable/c/10610575a3ac2a702bf5c57aa931beaf847949c7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/646cd236c55e2cb5f146fc41bbe4034c4af5b2a4
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/00e6335329f23ac6cf3105931691674e28bc598c
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/1a63730fb315bb1bab97edd69ff58ad45e04bb01
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e77a3ec7ada84543e75722a1283785a6544de925
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/3398a40dccb88d3a7eef378247a023a78472db66
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/85a70ff1e572160f1eeb096ed48d09a1c9d4d89a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c04d6a914e890ccea4a9d11233009a2ee7978bf4
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/160e9d2752181fcf18c662e74022d77d3164cd45
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 46738b1317e1 before 0610575a3ac (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 46738b1317e1 before 646cd236c55e (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 46738b1317e1 before 00e6335329f2 (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 46738b1317e1 before 1a63730fb315 (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 46738b1317e1 before e77a3ec7ada8 (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 46738b1317e1 before 3398a40dccb8 (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 46738b1317e1 before 85a70ff1e572 (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 46738b1317e1 before c04d6a914e89 (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 46738b1317e1 before 160e9d275218 (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • 4.10
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Unaffected
  • From 0 before 4.10 (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Unaffected
  • From 4.19.316 through 4.20 (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Unaffected
  • From 5.4.278 through 5.5 (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
acrn
CPEs
  • cpe:2.3:o:linux:acrn:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Unaffected
  • From 5.10.219 through 5.11 (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Unaffected
  • From 5.15.161 through 5.16 (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Unaffected
  • From 6.1.93 through 6.2 (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Unaffected
  • From 6.6.33 through 6.7 (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Unaffected
  • From 6.8.12 through 6.9 (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Unaffected
  • From 6.9.3 through 6.10 (custom)
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Unaffected
  • 6.10-rc1
Problem Types
TypeCWE IDDescription
CWECWE-476CWE-476 NULL Pointer Dereference
CWECWE-416CWE-416 Use After Free
Type: CWE
CWE ID: CWE-476
Description: CWE-476 NULL Pointer Dereference
Type: CWE
CWE ID: CWE-416
Description: CWE-416 Use After Free
Metrics
VersionBase scoreBase severityVector
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/10610575a3ac2a702bf5c57aa931beaf847949c7
x_transferred
https://git.kernel.org/stable/c/646cd236c55e2cb5f146fc41bbe4034c4af5b2a4
x_transferred
https://git.kernel.org/stable/c/00e6335329f23ac6cf3105931691674e28bc598c
x_transferred
https://git.kernel.org/stable/c/1a63730fb315bb1bab97edd69ff58ad45e04bb01
x_transferred
https://git.kernel.org/stable/c/e77a3ec7ada84543e75722a1283785a6544de925
x_transferred
https://git.kernel.org/stable/c/3398a40dccb88d3a7eef378247a023a78472db66
x_transferred
https://git.kernel.org/stable/c/85a70ff1e572160f1eeb096ed48d09a1c9d4d89a
x_transferred
https://git.kernel.org/stable/c/c04d6a914e890ccea4a9d11233009a2ee7978bf4
x_transferred
https://git.kernel.org/stable/c/160e9d2752181fcf18c662e74022d77d3164cd45
x_transferred
Hyperlink: https://git.kernel.org/stable/c/10610575a3ac2a702bf5c57aa931beaf847949c7
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/646cd236c55e2cb5f146fc41bbe4034c4af5b2a4
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/00e6335329f23ac6cf3105931691674e28bc598c
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/1a63730fb315bb1bab97edd69ff58ad45e04bb01
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/e77a3ec7ada84543e75722a1283785a6544de925
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/3398a40dccb88d3a7eef378247a023a78472db66
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/85a70ff1e572160f1eeb096ed48d09a1c9d4d89a
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/c04d6a914e890ccea4a9d11233009a2ee7978bf4
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/160e9d2752181fcf18c662e74022d77d3164cd45
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:19 Jun, 2024 | 14:15
Updated At:01 Apr, 2025 | 18:26

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix invalid unregister error path The error path of seg6_init() is wrong in case CONFIG_IPV6_SEG6_LWTUNNEL is not defined. In that case if seg6_hmac_init() fails, the genl_unregister_family() isn't called. This issue exist since commit 46738b1317e1 ("ipv6: sr: add option to control lwtunnel support"), and commit 5559cea2d5aa ("ipv6: sr: fix possible use-after-free and null-ptr-deref") replaced unregister_pernet_subsys() with genl_unregister_family() in this error path.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.10(inclusive) to 4.19.316(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.20(inclusive) to 5.4.278(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.5(inclusive) to 5.10.219(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.11(inclusive) to 5.15.161(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16(inclusive) to 6.1.93(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.2(inclusive) to 6.6.33(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.7(inclusive) to 6.8.12(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.9(inclusive) to 6.9.3(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-416Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-476Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-416
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-476
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/00e6335329f23ac6cf3105931691674e28bc598c416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/10610575a3ac2a702bf5c57aa931beaf847949c7416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/160e9d2752181fcf18c662e74022d77d3164cd45416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/1a63730fb315bb1bab97edd69ff58ad45e04bb01416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/3398a40dccb88d3a7eef378247a023a78472db66416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/646cd236c55e2cb5f146fc41bbe4034c4af5b2a4416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/85a70ff1e572160f1eeb096ed48d09a1c9d4d89a416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/c04d6a914e890ccea4a9d11233009a2ee7978bf4416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/e77a3ec7ada84543e75722a1283785a6544de925416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/00e6335329f23ac6cf3105931691674e28bc598caf854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/10610575a3ac2a702bf5c57aa931beaf847949c7af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/160e9d2752181fcf18c662e74022d77d3164cd45af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/1a63730fb315bb1bab97edd69ff58ad45e04bb01af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/3398a40dccb88d3a7eef378247a023a78472db66af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/646cd236c55e2cb5f146fc41bbe4034c4af5b2a4af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/85a70ff1e572160f1eeb096ed48d09a1c9d4d89aaf854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/c04d6a914e890ccea4a9d11233009a2ee7978bf4af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/e77a3ec7ada84543e75722a1283785a6544de925af854a3a-2127-422b-91ae-364da2661108
Patch
Hyperlink: https://git.kernel.org/stable/c/00e6335329f23ac6cf3105931691674e28bc598c
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/10610575a3ac2a702bf5c57aa931beaf847949c7
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/160e9d2752181fcf18c662e74022d77d3164cd45
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/1a63730fb315bb1bab97edd69ff58ad45e04bb01
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/3398a40dccb88d3a7eef378247a023a78472db66
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/646cd236c55e2cb5f146fc41bbe4034c4af5b2a4
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/85a70ff1e572160f1eeb096ed48d09a1c9d4d89a
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/c04d6a914e890ccea4a9d11233009a2ee7978bf4
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/e77a3ec7ada84543e75722a1283785a6544de925
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/00e6335329f23ac6cf3105931691674e28bc598c
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/10610575a3ac2a702bf5c57aa931beaf847949c7
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/160e9d2752181fcf18c662e74022d77d3164cd45
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/1a63730fb315bb1bab97edd69ff58ad45e04bb01
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/3398a40dccb88d3a7eef378247a023a78472db66
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/646cd236c55e2cb5f146fc41bbe4034c4af5b2a4
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/85a70ff1e572160f1eeb096ed48d09a1c9d4d89a
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/c04d6a914e890ccea4a9d11233009a2ee7978bf4
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/e77a3ec7ada84543e75722a1283785a6544de925
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found