Количество 78
Количество 78

CVE-2021-47383
In the Linux kernel, the following vulnerability has been resolved: tty: Fix out-of-bound vmalloc access in imageblit This issue happens when a userspace program does an ioctl FBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct containing only the fields xres, yres, and bits_per_pixel with values. If this struct is the same as the previous ioctl, the vc_resize() detects it and doesn't call the resize_screen(), leaving the fb_var_screeninfo incomplete. And this leads to the updatescrollmode() calculates a wrong value to fbcon_display->vrows, which makes the real_y() return a wrong value of y, and that value, eventually, causes the imageblit to access an out-of-bound address value. To solve this issue I made the resize_screen() be called even if the screen does not need any resizing, so it will "fix and fill" the fb_var_screeninfo independently.

CVE-2021-47383
In the Linux kernel, the following vulnerability has been resolved: tty: Fix out-of-bound vmalloc access in imageblit This issue happens when a userspace program does an ioctl FBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct containing only the fields xres, yres, and bits_per_pixel with values. If this struct is the same as the previous ioctl, the vc_resize() detects it and doesn't call the resize_screen(), leaving the fb_var_screeninfo incomplete. And this leads to the updatescrollmode() calculates a wrong value to fbcon_display->vrows, which makes the real_y() return a wrong value of y, and that value, eventually, causes the imageblit to access an out-of-bound address value. To solve this issue I made the resize_screen() be called even if the screen does not need any resizing, so it will "fix and fill" the fb_var_screeninfo independently.

CVE-2021-47383
In the Linux kernel, the following vulnerability has been resolved: tty: Fix out-of-bound vmalloc access in imageblit This issue happens when a userspace program does an ioctl FBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct containing only the fields xres, yres, and bits_per_pixel with values. If this struct is the same as the previous ioctl, the vc_resize() detects it and doesn't call the resize_screen(), leaving the fb_var_screeninfo incomplete. And this leads to the updatescrollmode() calculates a wrong value to fbcon_display->vrows, which makes the real_y() return a wrong value of y, and that value, eventually, causes the imageblit to access an out-of-bound address value. To solve this issue I made the resize_screen() be called even if the screen does not need any resizing, so it will "fix and fill" the fb_var_screeninfo independently.
CVE-2021-47383
In the Linux kernel, the following vulnerability has been resolved: t ...
GHSA-h7hm-j4cr-jwhq
In the Linux kernel, the following vulnerability has been resolved: tty: Fix out-of-bound vmalloc access in imageblit This issue happens when a userspace program does an ioctl FBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct containing only the fields xres, yres, and bits_per_pixel with values. If this struct is the same as the previous ioctl, the vc_resize() detects it and doesn't call the resize_screen(), leaving the fb_var_screeninfo incomplete. And this leads to the updatescrollmode() calculates a wrong value to fbcon_display->vrows, which makes the real_y() return a wrong value of y, and that value, eventually, causes the imageblit to access an out-of-bound address value. To solve this issue I made the resize_screen() be called even if the screen does not need any resizing, so it will "fix and fill" the fb_var_screeninfo independently.

SUSE-SU-2024:2396-1
Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP3)

SUSE-SU-2024:2369-1
Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)

SUSE-SU-2024:2368-1
Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3)

SUSE-SU-2024:2351-1
Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP2)

SUSE-SU-2024:2342-1
Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3)

SUSE-SU-2024:2341-1
Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP2)

SUSE-SU-2024:2559-1
Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

SUSE-SU-2024:2549-1
Security update for the Linux Kernel (Live Patch 49 for SLE 12 SP5)

SUSE-SU-2024:2792-1
Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)

SUSE-SU-2024:2759-1
Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP2)

SUSE-SU-2024:2822-1
Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

SUSE-SU-2024:3039-1
Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)

SUSE-SU-2024:3015-1
Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

SUSE-SU-2024:2344-1
Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2)

SUSE-SU-2024:2357-1
Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-47383 In the Linux kernel, the following vulnerability has been resolved: tty: Fix out-of-bound vmalloc access in imageblit This issue happens when a userspace program does an ioctl FBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct containing only the fields xres, yres, and bits_per_pixel with values. If this struct is the same as the previous ioctl, the vc_resize() detects it and doesn't call the resize_screen(), leaving the fb_var_screeninfo incomplete. And this leads to the updatescrollmode() calculates a wrong value to fbcon_display->vrows, which makes the real_y() return a wrong value of y, and that value, eventually, causes the imageblit to access an out-of-bound address value. To solve this issue I made the resize_screen() be called even if the screen does not need any resizing, so it will "fix and fill" the fb_var_screeninfo independently. | 0% Низкий | около 1 года назад | |
![]() | CVE-2021-47383 In the Linux kernel, the following vulnerability has been resolved: tty: Fix out-of-bound vmalloc access in imageblit This issue happens when a userspace program does an ioctl FBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct containing only the fields xres, yres, and bits_per_pixel with values. If this struct is the same as the previous ioctl, the vc_resize() detects it and doesn't call the resize_screen(), leaving the fb_var_screeninfo incomplete. And this leads to the updatescrollmode() calculates a wrong value to fbcon_display->vrows, which makes the real_y() return a wrong value of y, and that value, eventually, causes the imageblit to access an out-of-bound address value. To solve this issue I made the resize_screen() be called even if the screen does not need any resizing, so it will "fix and fill" the fb_var_screeninfo independently. | CVSS3: 6.6 | 0% Низкий | около 1 года назад |
![]() | CVE-2021-47383 In the Linux kernel, the following vulnerability has been resolved: tty: Fix out-of-bound vmalloc access in imageblit This issue happens when a userspace program does an ioctl FBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct containing only the fields xres, yres, and bits_per_pixel with values. If this struct is the same as the previous ioctl, the vc_resize() detects it and doesn't call the resize_screen(), leaving the fb_var_screeninfo incomplete. And this leads to the updatescrollmode() calculates a wrong value to fbcon_display->vrows, which makes the real_y() return a wrong value of y, and that value, eventually, causes the imageblit to access an out-of-bound address value. To solve this issue I made the resize_screen() be called even if the screen does not need any resizing, so it will "fix and fill" the fb_var_screeninfo independently. | 0% Низкий | около 1 года назад | |
CVE-2021-47383 In the Linux kernel, the following vulnerability has been resolved: t ... | 0% Низкий | около 1 года назад | ||
GHSA-h7hm-j4cr-jwhq In the Linux kernel, the following vulnerability has been resolved: tty: Fix out-of-bound vmalloc access in imageblit This issue happens when a userspace program does an ioctl FBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct containing only the fields xres, yres, and bits_per_pixel with values. If this struct is the same as the previous ioctl, the vc_resize() detects it and doesn't call the resize_screen(), leaving the fb_var_screeninfo incomplete. And this leads to the updatescrollmode() calculates a wrong value to fbcon_display->vrows, which makes the real_y() return a wrong value of y, and that value, eventually, causes the imageblit to access an out-of-bound address value. To solve this issue I made the resize_screen() be called even if the screen does not need any resizing, so it will "fix and fill" the fb_var_screeninfo independently. | 0% Низкий | около 1 года назад | ||
![]() | SUSE-SU-2024:2396-1 Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP3) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2369-1 Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) | 12 месяцев назад | ||
![]() | SUSE-SU-2024:2368-1 Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3) | 12 месяцев назад | ||
![]() | SUSE-SU-2024:2351-1 Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP2) | 12 месяцев назад | ||
![]() | SUSE-SU-2024:2342-1 Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3) | 12 месяцев назад | ||
![]() | SUSE-SU-2024:2341-1 Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP2) | 12 месяцев назад | ||
![]() | SUSE-SU-2024:2559-1 Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2549-1 Security update for the Linux Kernel (Live Patch 49 for SLE 12 SP5) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2792-1 Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2759-1 Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP2) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2822-1 Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:3039-1 Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) | 10 месяцев назад | ||
![]() | SUSE-SU-2024:3015-1 Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) | 10 месяцев назад | ||
![]() | SUSE-SU-2024:2344-1 Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2) | 12 месяцев назад | ||
![]() | SUSE-SU-2024:2357-1 Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3) | 12 месяцев назад |
Уязвимостей на страницу