Логотип exploitDog
bind:CVE-2024-40954
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-40954

Количество 123

Количество 123

ubuntu логотип

CVE-2024-40954

11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe calling the bpf_get_socket_cookie() helper * running traceroute -I 1.1.1.1 on a freshly booted VM A KASAN enabled kernel will log something like below (decoded and stripped): ================================================================== BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Read of size 8 at addr ffff888007110dd8 by task traceroute/299 CPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> dump_stack_lvl (lib/dump_stack.c:...

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2024-40954

11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe calling the bpf_get_socket_cookie() helper * running traceroute -I 1.1.1.1 on a freshly booted VM A KASAN enabled kernel will log something like below (decoded and stripped): ================================================================== BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Read of size 8 at addr ffff888007110dd8 by task traceroute/299 CPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> dump_stack_lvl (lib/dump_stack.c:117 ...

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2024-40954

11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe calling the bpf_get_socket_cookie() helper * running traceroute -I 1.1.1.1 on a freshly booted VM A KASAN enabled kernel will log something like below (decoded and stripped): ================================================================== BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Read of size 8 at addr ffff888007110dd8 by task traceroute/299 CPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> dump_stack_lvl (lib/dump_st

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2024-40954

11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: n ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-68p8-jjxw-w2v4

11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe calling the bpf_get_socket_cookie() helper * running traceroute -I 1.1.1.1 on a freshly booted VM A KASAN enabled kernel will log something like below (decoded and stripped): ================================================================== BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Read of size 8 at addr ffff888007110dd8 by task traceroute/299 CPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> dump_stack_lvl (lib/dump...

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2024-08227

12 месяцев назад

Уязвимость функции sk_common_release() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3708-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3707-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3680-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3626-1

8 месяцев назад

Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3884-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3836-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3835-1

8 месяцев назад

Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3627-1

8 месяцев назад

Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4262-1

6 месяцев назад

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3882-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3881-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3856-1

8 месяцев назад

Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3628-1

8 месяцев назад

Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4210-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-40954

In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe calling the bpf_get_socket_cookie() helper * running traceroute -I 1.1.1.1 on a freshly booted VM A KASAN enabled kernel will log something like below (decoded and stripped): ================================================================== BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Read of size 8 at addr ffff888007110dd8 by task traceroute/299 CPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> dump_stack_lvl (lib/dump_stack.c:...

CVSS3: 7.8
0%
Низкий
11 месяцев назад
redhat логотип
CVE-2024-40954

In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe calling the bpf_get_socket_cookie() helper * running traceroute -I 1.1.1.1 on a freshly booted VM A KASAN enabled kernel will log something like below (decoded and stripped): ================================================================== BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Read of size 8 at addr ffff888007110dd8 by task traceroute/299 CPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> dump_stack_lvl (lib/dump_stack.c:117 ...

CVSS3: 5.5
0%
Низкий
11 месяцев назад
nvd логотип
CVE-2024-40954

In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe calling the bpf_get_socket_cookie() helper * running traceroute -I 1.1.1.1 on a freshly booted VM A KASAN enabled kernel will log something like below (decoded and stripped): ================================================================== BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Read of size 8 at addr ffff888007110dd8 by task traceroute/299 CPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> dump_stack_lvl (lib/dump_st

CVSS3: 7.8
0%
Низкий
11 месяцев назад
debian логотип
CVE-2024-40954

In the Linux kernel, the following vulnerability has been resolved: n ...

CVSS3: 7.8
0%
Низкий
11 месяцев назад
github логотип
GHSA-68p8-jjxw-w2v4

In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe calling the bpf_get_socket_cookie() helper * running traceroute -I 1.1.1.1 on a freshly booted VM A KASAN enabled kernel will log something like below (decoded and stripped): ================================================================== BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Read of size 8 at addr ffff888007110dd8 by task traceroute/299 CPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> dump_stack_lvl (lib/dump...

CVSS3: 7.8
0%
Низкий
11 месяцев назад
fstec логотип
BDU:2024-08227

Уязвимость функции sk_common_release() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7.8
0%
Низкий
12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3708-1

Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3707-1

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3680-1

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3626-1

Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3884-1

Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3836-1

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3835-1

Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3627-1

Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4262-1

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

6 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3882-1

Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3881-1

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3856-1

Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3628-1

Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4210-1

Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)

7 месяцев назад

Уязвимостей на страницу