๐Ÿ” CVE Alert

CVE-2024-50024

UNKNOWN 0.0

net: Fix an unsafe loop on the list

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net: Fix an unsafe loop on the list The kernel may crash when deleting a genetlink family if there are still listeners for that family: Oops: Kernel access of bad area, sig: 11 [#1] ... NIP [c000000000c080bc] netlink_update_socket_mc+0x3c/0xc0 LR [c000000000c0f764] __netlink_clear_multicast_users+0x74/0xc0 Call Trace: __netlink_clear_multicast_users+0x74/0xc0 genl_unregister_family+0xd4/0x2d0 Change the unsafe loop on the list to a safe one, because inside the loop there is an element removal from this list.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
b8273570f802a7658827dcb077b0b517ba75a289 < 464801a0f6ccb52b21faa33bac6014fd74cc5e10 b8273570f802a7658827dcb077b0b517ba75a289 < 8e0766fcf37ad8eed289dd3853628dd9b01b58b0 b8273570f802a7658827dcb077b0b517ba75a289 < 68ad5da6ca630a276f0a5c924179e57724d00013 b8273570f802a7658827dcb077b0b517ba75a289 < 1cdec792b2450105b1314c5123a9a0452cb2c2f0 b8273570f802a7658827dcb077b0b517ba75a289 < 5f03a7f601f33cda1f710611625235dc86fd8a9e b8273570f802a7658827dcb077b0b517ba75a289 < 3be342e0332a7c83eb26fbb22bf156fdca467a5d b8273570f802a7658827dcb077b0b517ba75a289 < 49f9b726bf2bf3dd2caf0d27cadf4bc1ccf7a7dd b8273570f802a7658827dcb077b0b517ba75a289 < 1dae9f1187189bc09ff6d25ca97ead711f7e26f9
Linux / Linux
2.6.32

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/464801a0f6ccb52b21faa33bac6014fd74cc5e10 git.kernel.org: https://git.kernel.org/stable/c/8e0766fcf37ad8eed289dd3853628dd9b01b58b0 git.kernel.org: https://git.kernel.org/stable/c/68ad5da6ca630a276f0a5c924179e57724d00013 git.kernel.org: https://git.kernel.org/stable/c/1cdec792b2450105b1314c5123a9a0452cb2c2f0 git.kernel.org: https://git.kernel.org/stable/c/5f03a7f601f33cda1f710611625235dc86fd8a9e git.kernel.org: https://git.kernel.org/stable/c/3be342e0332a7c83eb26fbb22bf156fdca467a5d git.kernel.org: https://git.kernel.org/stable/c/49f9b726bf2bf3dd2caf0d27cadf4bc1ccf7a7dd git.kernel.org: https://git.kernel.org/stable/c/1dae9f1187189bc09ff6d25ca97ead711f7e26f9 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html