Количество 47
Количество 47

CVE-2024-50127
In the Linux kernel, the following vulnerability has been resolved: net: sched: fix use-after-free in taprio_change() In 'taprio_change()', 'admin' pointer may become dangling due to sched switch / removal caused by 'advance_sched()', and critical section protected by 'q->current_entry_lock' is too small to prevent from such a scenario (which causes use-after-free detected by KASAN). Fix this by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update 'admin' immediately before an attempt to schedule freeing.

CVE-2024-50127
In the Linux kernel, the following vulnerability has been resolved: net: sched: fix use-after-free in taprio_change() In 'taprio_change()', 'admin' pointer may become dangling due to sched switch / removal caused by 'advance_sched()', and critical section protected by 'q->current_entry_lock' is too small to prevent from such a scenario (which causes use-after-free detected by KASAN). Fix this by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update 'admin' immediately before an attempt to schedule freeing.

CVE-2024-50127
In the Linux kernel, the following vulnerability has been resolved: net: sched: fix use-after-free in taprio_change() In 'taprio_change()', 'admin' pointer may become dangling due to sched switch / removal caused by 'advance_sched()', and critical section protected by 'q->current_entry_lock' is too small to prevent from such a scenario (which causes use-after-free detected by KASAN). Fix this by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update 'admin' immediately before an attempt to schedule freeing.

CVE-2024-50127
CVE-2024-50127
In the Linux kernel, the following vulnerability has been resolved: n ...
GHSA-x848-x286-ccwf
In the Linux kernel, the following vulnerability has been resolved: net: sched: fix use-after-free in taprio_change() In 'taprio_change()', 'admin' pointer may become dangling due to sched switch / removal caused by 'advance_sched()', and critical section protected by 'q->current_entry_lock' is too small to prevent from such a scenario (which causes use-after-free detected by KASAN). Fix this by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update 'admin' immediately before an attempt to schedule freeing.

BDU:2024-10096
Уязвимость функции taprio_change() компонента net/sched ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

SUSE-SU-2025:02154-1
Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP4)

SUSE-SU-2025:02134-1
Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4)

SUSE-SU-2025:02111-1
Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4)

SUSE-SU-2025:02110-1
Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)

SUSE-SU-2025:02144-1
Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4)

SUSE-SU-2025:02142-1
Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4)

SUSE-SU-2025:02140-1
Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3)

SUSE-SU-2025:02136-1
Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)

SUSE-SU-2025:02125-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

SUSE-SU-2025:02171-1
Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5)

SUSE-SU-2025:02139-1
Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)

SUSE-SU-2025:02124-1
Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3)

SUSE-SU-2025:02113-1
Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-50127 In the Linux kernel, the following vulnerability has been resolved: net: sched: fix use-after-free in taprio_change() In 'taprio_change()', 'admin' pointer may become dangling due to sched switch / removal caused by 'advance_sched()', and critical section protected by 'q->current_entry_lock' is too small to prevent from such a scenario (which causes use-after-free detected by KASAN). Fix this by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update 'admin' immediately before an attempt to schedule freeing. | CVSS3: 7.8 | 0% Низкий | 9 месяцев назад |
![]() | CVE-2024-50127 In the Linux kernel, the following vulnerability has been resolved: net: sched: fix use-after-free in taprio_change() In 'taprio_change()', 'admin' pointer may become dangling due to sched switch / removal caused by 'advance_sched()', and critical section protected by 'q->current_entry_lock' is too small to prevent from such a scenario (which causes use-after-free detected by KASAN). Fix this by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update 'admin' immediately before an attempt to schedule freeing. | CVSS3: 7 | 0% Низкий | 9 месяцев назад |
![]() | CVE-2024-50127 In the Linux kernel, the following vulnerability has been resolved: net: sched: fix use-after-free in taprio_change() In 'taprio_change()', 'admin' pointer may become dangling due to sched switch / removal caused by 'advance_sched()', and critical section protected by 'q->current_entry_lock' is too small to prevent from such a scenario (which causes use-after-free detected by KASAN). Fix this by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update 'admin' immediately before an attempt to schedule freeing. | CVSS3: 7.8 | 0% Низкий | 9 месяцев назад |
![]() | CVSS3: 7.8 | 0% Низкий | 8 месяцев назад | |
CVE-2024-50127 In the Linux kernel, the following vulnerability has been resolved: n ... | CVSS3: 7.8 | 0% Низкий | 9 месяцев назад | |
GHSA-x848-x286-ccwf In the Linux kernel, the following vulnerability has been resolved: net: sched: fix use-after-free in taprio_change() In 'taprio_change()', 'admin' pointer may become dangling due to sched switch / removal caused by 'advance_sched()', and critical section protected by 'q->current_entry_lock' is too small to prevent from such a scenario (which causes use-after-free detected by KASAN). Fix this by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update 'admin' immediately before an attempt to schedule freeing. | CVSS3: 7.8 | 0% Низкий | 9 месяцев назад | |
![]() | BDU:2024-10096 Уязвимость функции taprio_change() компонента net/sched ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7.8 | 0% Низкий | 10 месяцев назад |
![]() | SUSE-SU-2025:02154-1 Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP4) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02134-1 Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02111-1 Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02110-1 Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02144-1 Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02142-1 Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02140-1 Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02136-1 Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02125-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02171-1 Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02139-1 Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02124-1 Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02113-1 Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5) | около 1 месяца назад |
Уязвимостей на страницу