Логотип exploitDog
bind:"CVE-2024-26734" OR bind:"CVE-2024-47674"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-26734" OR bind:"CVE-2024-47674"

Количество 36

Количество 36

oracle-oval логотип

ELSA-2024-12845

8 месяцев назад

ELSA-2024-12845: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12830

9 месяцев назад

ELSA-2024-12830: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12796

10 месяцев назад

ELSA-2024-12796: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2024-26734

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: devlink: fix possible use-after-free and memory leaks in devlink_init() The pernet operations structure for the subsystem must be registered before registering the generic netlink family. Make an unregister in case of unsuccessful registration.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2024-26734

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: devlink: fix possible use-after-free and memory leaks in devlink_init() The pernet operations structure for the subsystem must be registered before registering the generic netlink family. Make an unregister in case of unsuccessful registration.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2024-26734

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: devlink: fix possible use-after-free and memory leaks in devlink_init() The pernet operations structure for the subsystem must be registered before registering the generic netlink family. Make an unregister in case of unsuccessful registration.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2024-26734

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: d ...

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2024-47674

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2024-47674

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2024-47674

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2024-47674

9 месяцев назад

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2024-47674

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: m ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-84hw-www5-5v7p

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: devlink: fix possible use-after-free and memory leaks in devlink_init() The pernet operations structure for the subsystem must be registered before registering the generic netlink family. Make an unregister in case of unsuccessful registration.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2024-03677

больше 1 года назад

Уязвимость функции devlink_init() в модуле net/devlink/core.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-qjwp-794r-6x7v

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2025-00021

11 месяцев назад

Уязвимость функции remap_pfn_range_notrack() в модуле mm/memory.c подсистемы управления памятью ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
oracle-oval логотип

ELSA-2024-12884

8 месяцев назад

ELSA-2024-12884: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4038-1

9 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
redos логотип

ROS-20241021-08

10 месяцев назад

Множественные уязвимости kernel-lt

CVSS3: 7.8
EPSS: Низкий
redos логотип

ROS-20250414-01

4 месяца назад

Множественные уязвимости kernel-lt

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2024-12845

ELSA-2024-12845: Unbreakable Enterprise kernel security update (IMPORTANT)

8 месяцев назад
oracle-oval логотип
ELSA-2024-12830

ELSA-2024-12830: Unbreakable Enterprise kernel security update (IMPORTANT)

9 месяцев назад
oracle-oval логотип
ELSA-2024-12796

ELSA-2024-12796: Unbreakable Enterprise kernel security update (IMPORTANT)

10 месяцев назад
ubuntu логотип
CVE-2024-26734

In the Linux kernel, the following vulnerability has been resolved: devlink: fix possible use-after-free and memory leaks in devlink_init() The pernet operations structure for the subsystem must be registered before registering the generic netlink family. Make an unregister in case of unsuccessful registration.

CVSS3: 7.8
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-26734

In the Linux kernel, the following vulnerability has been resolved: devlink: fix possible use-after-free and memory leaks in devlink_init() The pernet operations structure for the subsystem must be registered before registering the generic netlink family. Make an unregister in case of unsuccessful registration.

CVSS3: 5.5
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-26734

In the Linux kernel, the following vulnerability has been resolved: devlink: fix possible use-after-free and memory leaks in devlink_init() The pernet operations structure for the subsystem must be registered before registering the generic netlink family. Make an unregister in case of unsuccessful registration.

CVSS3: 7.8
0%
Низкий
больше 1 года назад
debian логотип
CVE-2024-26734

In the Linux kernel, the following vulnerability has been resolved: d ...

CVSS3: 7.8
0%
Низкий
больше 1 года назад
ubuntu логотип
CVE-2024-47674

In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVSS3: 5.5
0%
Низкий
10 месяцев назад
redhat логотип
CVE-2024-47674

In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVSS3: 5.5
0%
Низкий
10 месяцев назад
nvd логотип
CVE-2024-47674

In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVSS3: 5.5
0%
Низкий
10 месяцев назад
msrc логотип
CVSS3: 5.5
0%
Низкий
9 месяцев назад
debian логотип
CVE-2024-47674

In the Linux kernel, the following vulnerability has been resolved: m ...

CVSS3: 5.5
0%
Низкий
10 месяцев назад
github логотип
GHSA-84hw-www5-5v7p

In the Linux kernel, the following vulnerability has been resolved: devlink: fix possible use-after-free and memory leaks in devlink_init() The pernet operations structure for the subsystem must be registered before registering the generic netlink family. Make an unregister in case of unsuccessful registration.

CVSS3: 7.8
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-03677

Уязвимость функции devlink_init() в модуле net/devlink/core.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-qjwp-794r-6x7v

In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVSS3: 5.5
0%
Низкий
10 месяцев назад
fstec логотип
BDU:2025-00021

Уязвимость функции remap_pfn_range_notrack() в модуле mm/memory.c подсистемы управления памятью ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
11 месяцев назад
oracle-oval логотип
ELSA-2024-12884

ELSA-2024-12884: Unbreakable Enterprise kernel security update (IMPORTANT)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4038-1

Security update for the Linux Kernel

9 месяцев назад
redos логотип
ROS-20241021-08

Множественные уязвимости kernel-lt

CVSS3: 7.8
10 месяцев назад
redos логотип
ROS-20250414-01

Множественные уязвимости kernel-lt

CVSS3: 7.8
4 месяца назад

Уязвимостей на страницу