Количество 29
Количество 29

CVE-2022-49080
In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix mpol_new leak in shared_policy_replace If mpol_new is allocated but not used in restart loop, mpol_new will be freed via mpol_put before returning to the caller. But refcnt is not initialized yet, so mpol_put could not do the right things and might leak the unused mpol_new. This would happen if mempolicy was updated on the shared shmem file while the sp->lock has been dropped during the memory allocation. This issue could be triggered easily with the below code snippet if there are many processes doing the below work at the same time: shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT); shm = shmat(shmid, 0, 0); loop many times { mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0); mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask, maxnode, 0); }

CVE-2022-49080
In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix mpol_new leak in shared_policy_replace If mpol_new is allocated but not used in restart loop, mpol_new will be freed via mpol_put before returning to the caller. But refcnt is not initialized yet, so mpol_put could not do the right things and might leak the unused mpol_new. This would happen if mempolicy was updated on the shared shmem file while the sp->lock has been dropped during the memory allocation. This issue could be triggered easily with the below code snippet if there are many processes doing the below work at the same time: shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT); shm = shmat(shmid, 0, 0); loop many times { mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0); mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask, maxnode, 0); }

CVE-2022-49080
In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix mpol_new leak in shared_policy_replace If mpol_new is allocated but not used in restart loop, mpol_new will be freed via mpol_put before returning to the caller. But refcnt is not initialized yet, so mpol_put could not do the right things and might leak the unused mpol_new. This would happen if mempolicy was updated on the shared shmem file while the sp->lock has been dropped during the memory allocation. This issue could be triggered easily with the below code snippet if there are many processes doing the below work at the same time: shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT); shm = shmat(shmid, 0, 0); loop many times { mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0); mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask, maxnode, 0); }
CVE-2022-49080
In the Linux kernel, the following vulnerability has been resolved: m ...

BDU:2025-06063
Уязвимость функции kmem_cache_alloc() модуля mm/mempolicy.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2025:01950-1
Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)

SUSE-SU-2025:01935-1
Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4)

SUSE-SU-2025:01928-1
Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4)

SUSE-SU-2025:01927-1
Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4)

SUSE-SU-2025:01922-1
Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4)

SUSE-SU-2025:01906-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

SUSE-SU-2025:01901-1
Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3)

SUSE-SU-2025:01899-1
Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

SUSE-SU-2025:01892-1
Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3)

SUSE-SU-2025:01868-1
Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)

SUSE-SU-2025:01849-1
Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5)

SUSE-SU-2025:01844-1
Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5)

SUSE-SU-2025:01893-1
Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP5)

SUSE-SU-2025:01875-1
Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP5)

SUSE-SU-2025:01956-1
Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2022-49080 In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix mpol_new leak in shared_policy_replace If mpol_new is allocated but not used in restart loop, mpol_new will be freed via mpol_put before returning to the caller. But refcnt is not initialized yet, so mpol_put could not do the right things and might leak the unused mpol_new. This would happen if mempolicy was updated on the shared shmem file while the sp->lock has been dropped during the memory allocation. This issue could be triggered easily with the below code snippet if there are many processes doing the below work at the same time: shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT); shm = shmat(shmid, 0, 0); loop many times { mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0); mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask, maxnode, 0); } | 0% Низкий | 6 месяцев назад | |
![]() | CVE-2022-49080 In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix mpol_new leak in shared_policy_replace If mpol_new is allocated but not used in restart loop, mpol_new will be freed via mpol_put before returning to the caller. But refcnt is not initialized yet, so mpol_put could not do the right things and might leak the unused mpol_new. This would happen if mempolicy was updated on the shared shmem file while the sp->lock has been dropped during the memory allocation. This issue could be triggered easily with the below code snippet if there are many processes doing the below work at the same time: shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT); shm = shmat(shmid, 0, 0); loop many times { mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0); mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask, maxnode, 0); } | CVSS3: 5.5 | 0% Низкий | 7 месяцев назад |
![]() | CVE-2022-49080 In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix mpol_new leak in shared_policy_replace If mpol_new is allocated but not used in restart loop, mpol_new will be freed via mpol_put before returning to the caller. But refcnt is not initialized yet, so mpol_put could not do the right things and might leak the unused mpol_new. This would happen if mempolicy was updated on the shared shmem file while the sp->lock has been dropped during the memory allocation. This issue could be triggered easily with the below code snippet if there are many processes doing the below work at the same time: shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT); shm = shmat(shmid, 0, 0); loop many times { mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0); mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask, maxnode, 0); } | 0% Низкий | 6 месяцев назад | |
CVE-2022-49080 In the Linux kernel, the following vulnerability has been resolved: m ... | 0% Низкий | 6 месяцев назад | ||
![]() | BDU:2025-06063 Уязвимость функции kmem_cache_alloc() модуля mm/mempolicy.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад |
![]() | SUSE-SU-2025:01950-1 Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) | 3 месяца назад | ||
![]() | SUSE-SU-2025:01935-1 Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4) | 3 месяца назад | ||
![]() | SUSE-SU-2025:01928-1 Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4) | 3 месяца назад | ||
![]() | SUSE-SU-2025:01927-1 Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4) | 3 месяца назад | ||
![]() | SUSE-SU-2025:01922-1 Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4) | 3 месяца назад | ||
![]() | SUSE-SU-2025:01906-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) | 3 месяца назад | ||
![]() | SUSE-SU-2025:01901-1 Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3) | 3 месяца назад | ||
![]() | SUSE-SU-2025:01899-1 Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) | 3 месяца назад | ||
![]() | SUSE-SU-2025:01892-1 Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3) | 3 месяца назад | ||
![]() | SUSE-SU-2025:01868-1 Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) | 3 месяца назад | ||
![]() | SUSE-SU-2025:01849-1 Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5) | 3 месяца назад | ||
![]() | SUSE-SU-2025:01844-1 Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5) | 3 месяца назад | ||
![]() | SUSE-SU-2025:01893-1 Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP5) | 3 месяца назад | ||
![]() | SUSE-SU-2025:01875-1 Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP5) | 3 месяца назад | ||
![]() | SUSE-SU-2025:01956-1 Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3) | 3 месяца назад |
Уязвимостей на страницу