๐Ÿ” CVE Alert

CVE-2024-44944

UNKNOWN 0.0

netfilter: ctnetlink: use helper function to calculate expect ID

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use helper function to calculate expect ID Delete expectation path is missing a call to the nf_expect_get_id() helper function to calculate the expectation ID, otherwise LSB of the expectation object address is leaked to userspace.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Aug 30, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
7b115755fb9d3aff0ddcd18a5c4d83381362acce < 66e7650dbbb8e236e781c670b167edc81e771450 3c79107631db1f7fd32cf3f7368e4672004a3010 < 64c0b8e64be8368617ef08dfc59a3160563a1435 3c79107631db1f7fd32cf3f7368e4672004a3010 < eb4ca1a97e08ff5b920664ba292e576257e2d184 3c79107631db1f7fd32cf3f7368e4672004a3010 < 5e2c24f7b0911b15c29aefce760bcf770542fb61 3c79107631db1f7fd32cf3f7368e4672004a3010 < 24f407042cf90b0872de667460230d8d50c06c39 3c79107631db1f7fd32cf3f7368e4672004a3010 < 27662b46f2adaa52c1665a82af4b21c42c4337fd 3c79107631db1f7fd32cf3f7368e4672004a3010 < 74de442b8e12a207c07953ee068009a7701aff8f 3c79107631db1f7fd32cf3f7368e4672004a3010 < 782161895eb4ac45cf7cfa8db375bd4766cb8299 3d8b3d0384f709126beef6b917b7e97c23f18e74 36bbd861a402a8c5bd8f0365a5967d34cc492f09 1922476beeeea46bebbe577215078736dd4231dc f862c13c3c926d3008b2c2bcc746ab813108dfbf b0a90cae081d7ee14eaa46524fb70f4e23ae8905
Linux / Linux
5.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/66e7650dbbb8e236e781c670b167edc81e771450 git.kernel.org: https://git.kernel.org/stable/c/64c0b8e64be8368617ef08dfc59a3160563a1435 git.kernel.org: https://git.kernel.org/stable/c/eb4ca1a97e08ff5b920664ba292e576257e2d184 git.kernel.org: https://git.kernel.org/stable/c/5e2c24f7b0911b15c29aefce760bcf770542fb61 git.kernel.org: https://git.kernel.org/stable/c/24f407042cf90b0872de667460230d8d50c06c39 git.kernel.org: https://git.kernel.org/stable/c/27662b46f2adaa52c1665a82af4b21c42c4337fd git.kernel.org: https://git.kernel.org/stable/c/74de442b8e12a207c07953ee068009a7701aff8f git.kernel.org: https://git.kernel.org/stable/c/782161895eb4ac45cf7cfa8db375bd4766cb8299 zerodayinitiative.com: https://www.zerodayinitiative.com/advisories/ZDI-24-1182/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-398330.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-613116.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html