Количество 40
Количество 40

BDU:2025-00021
Уязвимость функции remap_pfn_range_notrack() в модуле mm/memory.c подсистемы управления памятью ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVE-2024-47674
In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVE-2024-47674
In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVE-2024-47674
In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVE-2024-47674
CVE-2024-47674
In the Linux kernel, the following vulnerability has been resolved: m ...

ROS-20250414-01
Множественные уязвимости kernel-lt
GHSA-qjwp-794r-6x7v
In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.
ELSA-2024-12845
ELSA-2024-12845: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2025:03135-1
Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5)
ELSA-2024-12830
ELSA-2024-12830: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2025:03190-1
Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)

SUSE-SU-2025:03181-1
Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4)

SUSE-SU-2025:03175-1
Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)

SUSE-SU-2025:03156-1
Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4)

SUSE-SU-2025:03130-1
Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3)

SUSE-SU-2025:03124-1
Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)

SUSE-SU-2025:03191-1
Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5)

SUSE-SU-2025:03186-1
Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5)
ELSA-2024-12796
ELSA-2024-12796: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2025-00021 Уязвимость функции remap_pfn_range_notrack() в модуле mm/memory.c подсистемы управления памятью ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-47674 In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling. | CVSS3: 5.5 | 0% Низкий | 12 месяцев назад |
![]() | CVE-2024-47674 In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling. | CVSS3: 5.5 | 0% Низкий | 12 месяцев назад |
![]() | CVE-2024-47674 In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling. | CVSS3: 5.5 | 0% Низкий | 12 месяцев назад |
![]() | CVSS3: 5.5 | 0% Низкий | 11 месяцев назад | |
CVE-2024-47674 In the Linux kernel, the following vulnerability has been resolved: m ... | CVSS3: 5.5 | 0% Низкий | 12 месяцев назад | |
![]() | ROS-20250414-01 Множественные уязвимости kernel-lt | CVSS3: 7.8 | 6 месяцев назад | |
GHSA-qjwp-794r-6x7v In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling. | CVSS3: 5.5 | 0% Низкий | 12 месяцев назад | |
ELSA-2024-12845 ELSA-2024-12845: Unbreakable Enterprise kernel security update (IMPORTANT) | 10 месяцев назад | |||
![]() | SUSE-SU-2025:03135-1 Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5) | 21 день назад | ||
ELSA-2024-12830 ELSA-2024-12830: Unbreakable Enterprise kernel security update (IMPORTANT) | 11 месяцев назад | |||
![]() | SUSE-SU-2025:03190-1 Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) | 20 дней назад | ||
![]() | SUSE-SU-2025:03181-1 Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4) | 20 дней назад | ||
![]() | SUSE-SU-2025:03175-1 Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) | 20 дней назад | ||
![]() | SUSE-SU-2025:03156-1 Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4) | 21 день назад | ||
![]() | SUSE-SU-2025:03130-1 Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3) | 21 день назад | ||
![]() | SUSE-SU-2025:03124-1 Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) | 22 дня назад | ||
![]() | SUSE-SU-2025:03191-1 Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5) | 20 дней назад | ||
![]() | SUSE-SU-2025:03186-1 Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5) | 20 дней назад | ||
ELSA-2024-12796 ELSA-2024-12796: Unbreakable Enterprise kernel security update (IMPORTANT) | 12 месяцев назад |
Уязвимостей на страницу