Количество 37
Количество 37

CVE-2024-45016
In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate packet...

CVE-2024-45016
In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate packet until ...

CVE-2024-45016
In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate packe

CVE-2024-45016
CVE-2024-45016
In the Linux kernel, the following vulnerability has been resolved: n ...

SUSE-SU-2025:0414-1
Security update for the Linux Kernel (Live Patch 62 for SLE 12 SP5)
GHSA-q53p-qm4c-c2wj
In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate pa...

BDU:2025-01943
Уязвимость компонента netem ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе

SUSE-SU-2025:0494-1
Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5)

SUSE-SU-2025:0476-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)

SUSE-SU-2025:0452-1
Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)

SUSE-SU-2025:0440-1
Security update for the Linux Kernel (Live Patch 52 for SLE 12 SP5)

SUSE-SU-2025:0426-1
Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6)

SUSE-SU-2025:0410-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2025:0487-1
Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)

SUSE-SU-2025:0486-1
Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4)

SUSE-SU-2025:0465-1
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

SUSE-SU-2025:0449-1
Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)

SUSE-SU-2025:0489-1
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5)

SUSE-SU-2025:0462-1
Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-45016 In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate packet... | CVSS3: 5.5 | 0% Низкий | 9 месяцев назад |
![]() | CVE-2024-45016 In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate packet until ... | CVSS3: 7 | 0% Низкий | 9 месяцев назад |
![]() | CVE-2024-45016 In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate packe | CVSS3: 5.5 | 0% Низкий | 9 месяцев назад |
![]() | CVSS3: 5.5 | 0% Низкий | 8 месяцев назад | |
CVE-2024-45016 In the Linux kernel, the following vulnerability has been resolved: n ... | CVSS3: 5.5 | 0% Низкий | 9 месяцев назад | |
![]() | SUSE-SU-2025:0414-1 Security update for the Linux Kernel (Live Patch 62 for SLE 12 SP5) | 0% Низкий | 4 месяца назад | |
GHSA-q53p-qm4c-c2wj In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate pa... | CVSS3: 5.5 | 0% Низкий | 9 месяцев назад | |
![]() | BDU:2025-01943 Уязвимость компонента netem ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе | CVSS3: 5.5 | 0% Низкий | 10 месяцев назад |
![]() | SUSE-SU-2025:0494-1 Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0476-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0452-1 Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0440-1 Security update for the Linux Kernel (Live Patch 52 for SLE 12 SP5) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0426-1 Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0410-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0487-1 Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0486-1 Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0465-1 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0449-1 Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0489-1 Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0462-1 Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5) | 4 месяца назад |
Уязвимостей на страницу