Количество 41
Количество 41

BDU:2024-10573
Уязвимость компонента ethtool ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе

CVE-2021-47517
In the Linux kernel, the following vulnerability has been resolved: ethtool: do not perform operations on net devices being unregistered There is a short period between a net device starts to be unregistered and when it is actually gone. In that time frame ethtool operations could still be performed, which might end up in unwanted or undefined behaviours[1]. Do not allow ethtool operations after a net device starts its unregistration. This patch targets the netlink part as the ioctl one isn't affected: the reference to the net device is taken and the operation is executed within an rtnl lock section and the net device won't be found after unregister. [1] For example adding Tx queues after unregister ends up in NULL pointer exceptions and UaFs, such as: BUG: KASAN: use-after-free in kobject_get+0x14/0x90 Read of size 1 at addr ffff88801961248c by task ethtool/755 CPU: 0 PID: 755 Comm: ethtool Not tainted 5.15.0-rc6+ #778 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.1...

CVE-2021-47517
In the Linux kernel, the following vulnerability has been resolved: ethtool: do not perform operations on net devices being unregistered There is a short period between a net device starts to be unregistered and when it is actually gone. In that time frame ethtool operations could still be performed, which might end up in unwanted or undefined behaviours[1]. Do not allow ethtool operations after a net device starts its unregistration. This patch targets the netlink part as the ioctl one isn't affected: the reference to the net device is taken and the operation is executed within an rtnl lock section and the net device won't be found after unregister. [1] For example adding Tx queues after unregister ends up in NULL pointer exceptions and UaFs, such as: BUG: KASAN: use-after-free in kobject_get+0x14/0x90 Read of size 1 at addr ffff88801961248c by task ethtool/755 CPU: 0 PID: 755 Comm: ethtool Not tainted 5.15.0-rc6+ #778 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.1...

CVE-2021-47517
In the Linux kernel, the following vulnerability has been resolved: ethtool: do not perform operations on net devices being unregistered There is a short period between a net device starts to be unregistered and when it is actually gone. In that time frame ethtool operations could still be performed, which might end up in unwanted or undefined behaviours[1]. Do not allow ethtool operations after a net device starts its unregistration. This patch targets the netlink part as the ioctl one isn't affected: the reference to the net device is taken and the operation is executed within an rtnl lock section and the net device won't be found after unregister. [1] For example adding Tx queues after unregister ends up in NULL pointer exceptions and UaFs, such as: BUG: KASAN: use-after-free in kobject_get+0x14/0x90 Read of size 1 at addr ffff88801961248c by task ethtool/755 CPU: 0 PID: 755 Comm: ethtool Not tainted 5.15.0-rc6+ #778 Hardware name: QEMU Standard PC
CVE-2021-47517
In the Linux kernel, the following vulnerability has been resolved: e ...

SUSE-SU-2024:4240-1
Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)

SUSE-SU-2024:4160-1
Security update for the Linux Kernel RT (Live Patch 18 for SLE 15 SP5)

SUSE-SU-2025:0181-1
Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)

SUSE-SU-2024:4227-1
Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)

SUSE-SU-2024:4220-1
Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5)

SUSE-SU-2024:4206-1
Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)

SUSE-SU-2024:4141-1
Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5)

SUSE-SU-2024:4120-1
Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5)

SUSE-SU-2024:4128-1
Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5)

SUSE-SU-2024:4228-1
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

SUSE-SU-2024:4127-1
Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5)

SUSE-SU-2025:0138-1
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

SUSE-SU-2025:0260-1
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

SUSE-SU-2024:4243-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5)

SUSE-SU-2024:4207-1
Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2024-10573 Уязвимость компонента ethtool ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе | CVSS3: 8.8 | 0% Низкий | около 1 года назад |
![]() | CVE-2021-47517 In the Linux kernel, the following vulnerability has been resolved: ethtool: do not perform operations on net devices being unregistered There is a short period between a net device starts to be unregistered and when it is actually gone. In that time frame ethtool operations could still be performed, which might end up in unwanted or undefined behaviours[1]. Do not allow ethtool operations after a net device starts its unregistration. This patch targets the netlink part as the ioctl one isn't affected: the reference to the net device is taken and the operation is executed within an rtnl lock section and the net device won't be found after unregister. [1] For example adding Tx queues after unregister ends up in NULL pointer exceptions and UaFs, such as: BUG: KASAN: use-after-free in kobject_get+0x14/0x90 Read of size 1 at addr ffff88801961248c by task ethtool/755 CPU: 0 PID: 755 Comm: ethtool Not tainted 5.15.0-rc6+ #778 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.1... | CVSS3: 7.8 | 0% Низкий | около 1 года назад |
![]() | CVE-2021-47517 In the Linux kernel, the following vulnerability has been resolved: ethtool: do not perform operations on net devices being unregistered There is a short period between a net device starts to be unregistered and when it is actually gone. In that time frame ethtool operations could still be performed, which might end up in unwanted or undefined behaviours[1]. Do not allow ethtool operations after a net device starts its unregistration. This patch targets the netlink part as the ioctl one isn't affected: the reference to the net device is taken and the operation is executed within an rtnl lock section and the net device won't be found after unregister. [1] For example adding Tx queues after unregister ends up in NULL pointer exceptions and UaFs, such as: BUG: KASAN: use-after-free in kobject_get+0x14/0x90 Read of size 1 at addr ffff88801961248c by task ethtool/755 CPU: 0 PID: 755 Comm: ethtool Not tainted 5.15.0-rc6+ #778 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.1... | CVSS3: 4.4 | 0% Низкий | около 1 года назад |
![]() | CVE-2021-47517 In the Linux kernel, the following vulnerability has been resolved: ethtool: do not perform operations on net devices being unregistered There is a short period between a net device starts to be unregistered and when it is actually gone. In that time frame ethtool operations could still be performed, which might end up in unwanted or undefined behaviours[1]. Do not allow ethtool operations after a net device starts its unregistration. This patch targets the netlink part as the ioctl one isn't affected: the reference to the net device is taken and the operation is executed within an rtnl lock section and the net device won't be found after unregister. [1] For example adding Tx queues after unregister ends up in NULL pointer exceptions and UaFs, such as: BUG: KASAN: use-after-free in kobject_get+0x14/0x90 Read of size 1 at addr ffff88801961248c by task ethtool/755 CPU: 0 PID: 755 Comm: ethtool Not tainted 5.15.0-rc6+ #778 Hardware name: QEMU Standard PC | CVSS3: 7.8 | 0% Низкий | около 1 года назад |
CVE-2021-47517 In the Linux kernel, the following vulnerability has been resolved: e ... | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:4240-1 Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4160-1 Security update for the Linux Kernel RT (Live Patch 18 for SLE 15 SP5) | 7 месяцев назад | ||
![]() | SUSE-SU-2025:0181-1 Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) | 5 месяцев назад | ||
![]() | SUSE-SU-2024:4227-1 Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4220-1 Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4206-1 Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4141-1 Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4120-1 Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4128-1 Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4228-1 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4127-1 Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5) | 7 месяцев назад | ||
![]() | SUSE-SU-2025:0138-1 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) | 5 месяцев назад | ||
![]() | SUSE-SU-2025:0260-1 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) | 5 месяцев назад | ||
![]() | SUSE-SU-2024:4243-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4207-1 Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5) | 7 месяцев назад |
Уязвимостей на страницу