Логотип exploitDog
bind: "CVE-2021-47598"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2021-47598"

Количество 115

Количество 115

ubuntu логотип

CVE-2021-47598

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: sch_cake: do not call cake_destroy() from cake_init() qdiscs are not supposed to call their own destroy() method from init(), because core stack already does that. syzbot was able to trigger use after free: DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock_common kernel/locking/mutex.c:586 [inline] WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740 Modules linked in: CPU: 0 PID: 21902 Comm: syz-executor189 Not tainted 5.16.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__mutex_lock_common kernel/locking/mutex.c:586 [inline] RIP: 0010:__mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740 Code: 08 84 d2 0f 85 19 08 00 00 8b 05 97 38 4b 04 85 c0 0f 85 27 f7 ff ff 48 c7 c6 20 00 ac 89 48 c7 c7 a0 fe ab 89 e8 bf 76 ba ff <0f> 0b e9 0...

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2021-47598

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: sch_cake: do not call cake_destroy() from cake_init() qdiscs are not supposed to call their own destroy() method from init(), because core stack already does that. syzbot was able to trigger use after free: DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock_common kernel/locking/mutex.c:586 [inline] WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740 Modules linked in: CPU: 0 PID: 21902 Comm: syz-executor189 Not tainted 5.16.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__mutex_lock_common kernel/locking/mutex.c:586 [inline] RIP: 0010:__mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740 Code: 08 84 d2 0f 85 19 08 00 00 8b 05 97 38 4b 04 85 c0 0f 85 27 f7 ff ff 48 c7 c6 20 00 ac 89 48 c7 c7 a0 fe ab 89 e8 bf 76 ba ff <0f> 0b e9 0...

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2021-47598

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: sch_cake: do not call cake_destroy() from cake_init() qdiscs are not supposed to call their own destroy() method from init(), because core stack already does that. syzbot was able to trigger use after free: DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock_common kernel/locking/mutex.c:586 [inline] WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740 Modules linked in: CPU: 0 PID: 21902 Comm: syz-executor189 Not tainted 5.16.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__mutex_lock_common kernel/locking/mutex.c:586 [inline] RIP: 0010:__mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740 Code: 08 84 d2 0f 85 19 08 00 00 8b 05 97 38 4b 04 85 c0 0f 85 27 f7 ff ff 48 c7 c6 20 00 ac 89 48 c7 c7 a0 fe ab 89 e8 bf 76 ba ff <0f> 0b e9

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2021-47598

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: s ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-h7wh-wpqg-g2jm

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: sch_cake: do not call cake_destroy() from cake_init() qdiscs are not supposed to call their own destroy() method from init(), because core stack already does that. syzbot was able to trigger use after free: DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock_common kernel/locking/mutex.c:586 [inline] WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740 Modules linked in: CPU: 0 PID: 21902 Comm: syz-executor189 Not tainted 5.16.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__mutex_lock_common kernel/locking/mutex.c:586 [inline] RIP: 0010:__mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740 Code: 08 84 d2 0f 85 19 08 00 00 8b 05 97 38 4b 04 85 c0 0f 85 27 f7 ff ff 48 c7 c6 20 00 ac 89 48 c7 c7 a0 fe ab 89 e8 bf 76 ba ff <0f> 0b ...

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2024-11472

больше 3 лет назад

Уязвимость функции cake_destroy() компонента sch_cake ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3836-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3779-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4262-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4161-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3856-1

9 месяцев назад

Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3850-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3804-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3797-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3783-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3768-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4248-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3848-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3794-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3782-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP2)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-47598

In the Linux kernel, the following vulnerability has been resolved: sch_cake: do not call cake_destroy() from cake_init() qdiscs are not supposed to call their own destroy() method from init(), because core stack already does that. syzbot was able to trigger use after free: DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock_common kernel/locking/mutex.c:586 [inline] WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740 Modules linked in: CPU: 0 PID: 21902 Comm: syz-executor189 Not tainted 5.16.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__mutex_lock_common kernel/locking/mutex.c:586 [inline] RIP: 0010:__mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740 Code: 08 84 d2 0f 85 19 08 00 00 8b 05 97 38 4b 04 85 c0 0f 85 27 f7 ff ff 48 c7 c6 20 00 ac 89 48 c7 c7 a0 fe ab 89 e8 bf 76 ba ff <0f> 0b e9 0...

CVSS3: 7.8
0%
Низкий
около 1 года назад
redhat логотип
CVE-2021-47598

In the Linux kernel, the following vulnerability has been resolved: sch_cake: do not call cake_destroy() from cake_init() qdiscs are not supposed to call their own destroy() method from init(), because core stack already does that. syzbot was able to trigger use after free: DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock_common kernel/locking/mutex.c:586 [inline] WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740 Modules linked in: CPU: 0 PID: 21902 Comm: syz-executor189 Not tainted 5.16.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__mutex_lock_common kernel/locking/mutex.c:586 [inline] RIP: 0010:__mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740 Code: 08 84 d2 0f 85 19 08 00 00 8b 05 97 38 4b 04 85 c0 0f 85 27 f7 ff ff 48 c7 c6 20 00 ac 89 48 c7 c7 a0 fe ab 89 e8 bf 76 ba ff <0f> 0b e9 0...

CVSS3: 7.8
0%
Низкий
около 1 года назад
nvd логотип
CVE-2021-47598

In the Linux kernel, the following vulnerability has been resolved: sch_cake: do not call cake_destroy() from cake_init() qdiscs are not supposed to call their own destroy() method from init(), because core stack already does that. syzbot was able to trigger use after free: DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock_common kernel/locking/mutex.c:586 [inline] WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740 Modules linked in: CPU: 0 PID: 21902 Comm: syz-executor189 Not tainted 5.16.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__mutex_lock_common kernel/locking/mutex.c:586 [inline] RIP: 0010:__mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740 Code: 08 84 d2 0f 85 19 08 00 00 8b 05 97 38 4b 04 85 c0 0f 85 27 f7 ff ff 48 c7 c6 20 00 ac 89 48 c7 c7 a0 fe ab 89 e8 bf 76 ba ff <0f> 0b e9

CVSS3: 7.8
0%
Низкий
около 1 года назад
debian логотип
CVE-2021-47598

In the Linux kernel, the following vulnerability has been resolved: s ...

CVSS3: 7.8
0%
Низкий
около 1 года назад
github логотип
GHSA-h7wh-wpqg-g2jm

In the Linux kernel, the following vulnerability has been resolved: sch_cake: do not call cake_destroy() from cake_init() qdiscs are not supposed to call their own destroy() method from init(), because core stack already does that. syzbot was able to trigger use after free: DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock_common kernel/locking/mutex.c:586 [inline] WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740 Modules linked in: CPU: 0 PID: 21902 Comm: syz-executor189 Not tainted 5.16.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__mutex_lock_common kernel/locking/mutex.c:586 [inline] RIP: 0010:__mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740 Code: 08 84 d2 0f 85 19 08 00 00 8b 05 97 38 4b 04 85 c0 0f 85 27 f7 ff ff 48 c7 c6 20 00 ac 89 48 c7 c7 a0 fe ab 89 e8 bf 76 ba ff <0f> 0b ...

CVSS3: 7.8
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-11472

Уязвимость функции cake_destroy() компонента sch_cake ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2024:3836-1

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3779-1

Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4262-1

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4161-1

Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3856-1

Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3850-1

Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3804-1

Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP3)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3797-1

Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3783-1

Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3768-1

Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP2)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4248-1

Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP2)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3848-1

Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP2)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3794-1

Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP2)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3782-1

Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP2)

9 месяцев назад

Уязвимостей на страницу