Количество 44
Количество 44

CVE-2024-40909
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a potential use-after-free in bpf_link_free() After commit 1a80dbcb2dba, bpf_link can be freed by link->ops->dealloc_deferred, but the code still tests and uses link->ops->dealloc afterward, which leads to a use-after-free as reported by syzbot. Actually, one of them should be sufficient, so just call one of them instead of both. Also add a WARN_ON() in case of any problematic implementation.

CVE-2024-40909
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a potential use-after-free in bpf_link_free() After commit 1a80dbcb2dba, bpf_link can be freed by link->ops->dealloc_deferred, but the code still tests and uses link->ops->dealloc afterward, which leads to a use-after-free as reported by syzbot. Actually, one of them should be sufficient, so just call one of them instead of both. Also add a WARN_ON() in case of any problematic implementation.

CVE-2024-40909
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a potential use-after-free in bpf_link_free() After commit 1a80dbcb2dba, bpf_link can be freed by link->ops->dealloc_deferred, but the code still tests and uses link->ops->dealloc afterward, which leads to a use-after-free as reported by syzbot. Actually, one of them should be sufficient, so just call one of them instead of both. Also add a WARN_ON() in case of any problematic implementation.
CVE-2024-40909
In the Linux kernel, the following vulnerability has been resolved: b ...

SUSE-SU-2024:3398-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)

SUSE-SU-2024:3387-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)

SUSE-SU-2024:3322-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)
GHSA-v89r-8c65-6vgh
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a potential use-after-free in bpf_link_free() After commit 1a80dbcb2dba, bpf_link can be freed by link->ops->dealloc_deferred, but the code still tests and uses link->ops->dealloc afterward, which leads to a use-after-free as reported by syzbot. Actually, one of them should be sufficient, so just call one of them instead of both. Also add a WARN_ON() in case of any problematic implementation.

BDU:2024-08190
Уязвимость функции bpf_link_free() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

SUSE-SU-2024:3708-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)

SUSE-SU-2024:3626-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

SUSE-SU-2024:3468-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

SUSE-SU-2024:3884-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)

SUSE-SU-2024:3835-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

SUSE-SU-2024:3627-1
Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5)

SUSE-SU-2024:3350-1
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

SUSE-SU-2024:3319-1
Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5)

SUSE-SU-2024:3882-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)

SUSE-SU-2024:3856-1
Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5)

SUSE-SU-2024:4210-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-40909 In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a potential use-after-free in bpf_link_free() After commit 1a80dbcb2dba, bpf_link can be freed by link->ops->dealloc_deferred, but the code still tests and uses link->ops->dealloc afterward, which leads to a use-after-free as reported by syzbot. Actually, one of them should be sufficient, so just call one of them instead of both. Also add a WARN_ON() in case of any problematic implementation. | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад |
![]() | CVE-2024-40909 In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a potential use-after-free in bpf_link_free() After commit 1a80dbcb2dba, bpf_link can be freed by link->ops->dealloc_deferred, but the code still tests and uses link->ops->dealloc afterward, which leads to a use-after-free as reported by syzbot. Actually, one of them should be sufficient, so just call one of them instead of both. Also add a WARN_ON() in case of any problematic implementation. | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад |
![]() | CVE-2024-40909 In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a potential use-after-free in bpf_link_free() After commit 1a80dbcb2dba, bpf_link can be freed by link->ops->dealloc_deferred, but the code still tests and uses link->ops->dealloc afterward, which leads to a use-after-free as reported by syzbot. Actually, one of them should be sufficient, so just call one of them instead of both. Also add a WARN_ON() in case of any problematic implementation. | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад |
CVE-2024-40909 In the Linux kernel, the following vulnerability has been resolved: b ... | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад | |
![]() | SUSE-SU-2024:3398-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) | 0% Низкий | 9 месяцев назад | |
![]() | SUSE-SU-2024:3387-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6) | 0% Низкий | 9 месяцев назад | |
![]() | SUSE-SU-2024:3322-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) | 0% Низкий | 9 месяцев назад | |
GHSA-v89r-8c65-6vgh In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a potential use-after-free in bpf_link_free() After commit 1a80dbcb2dba, bpf_link can be freed by link->ops->dealloc_deferred, but the code still tests and uses link->ops->dealloc afterward, which leads to a use-after-free as reported by syzbot. Actually, one of them should be sufficient, so just call one of them instead of both. Also add a WARN_ON() in case of any problematic implementation. | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад | |
![]() | BDU:2024-08190 Уязвимость функции bpf_link_free() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7.8 | 0% Низкий | около 1 года назад |
![]() | SUSE-SU-2024:3708-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3626-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3468-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3884-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3835-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3627-1 Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3350-1 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3319-1 Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3882-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3856-1 Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:4210-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6) | 7 месяцев назад |
Уязвимостей на страницу