Количество 49
Количество 49

CVE-2024-57996
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does not work correctly with a limit of 1. iproute2 actually checks for this and this patch adds the check in kernel as well. This fixes the following syzkaller reported crash: UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:210:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 0 PID: 2569 Comm: syz-executor101 Not tainted 5.10.0-smp-DEV #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0x125/0x19f lib/dump_stack.c:120 ubsan_epilogue lib/ubsan.c:148 [inline] __ubsan_handle_out_of_bounds+0xed/0x120 lib/ubsan.c:347 sfq_link net/sched/sch_sfq.c:210 [inline] sfq_dec+0x528/0x600 net/sched/sch_sfq.c:238 sfq_dequeue+0x39b/0x9d0 net/sched/sch_sfq.c:500 sfq_reset+0x13/0x50 net/sched/sch_sfq.c:525 qdisc_reset+0xfe/0x51...

CVE-2024-57996
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does not work correctly with a limit of 1. iproute2 actually checks for this and this patch adds the check in kernel as well. This fixes the following syzkaller reported crash: UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:210:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 0 PID: 2569 Comm: syz-executor101 Not tainted 5.10.0-smp-DEV #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0x125/0x19f lib/dump_stack.c:120 ubsan_epilogue lib/ubsan.c:148 [inline] __ubsan_handle_out_of_bounds+0xed/0x120 lib/ubsan.c:347 sfq_link net/sched/sch_sfq.c:210 [inline] sfq_dec+0x528/0x600 net/sched/sch_sfq.c:238 sfq_dequeue+0x39b/0x9d0 net/sched/sch_sfq.c:500 sfq_reset+0x13/0x50 net/sched/sch_sfq.c:525 qdisc_reset+0xfe/0x510 ne...

CVE-2024-57996
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does not work correctly with a limit of 1. iproute2 actually checks for this and this patch adds the check in kernel as well. This fixes the following syzkaller reported crash: UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:210:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 0 PID: 2569 Comm: syz-executor101 Not tainted 5.10.0-smp-DEV #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0x125/0x19f lib/dump_stack.c:120 ubsan_epilogue lib/ubsan.c:148 [inline] __ubsan_handle_out_of_bounds+0xed/0x120 lib/ubsan.c:347 sfq_link net/sched/sch_sfq.c:210 [inline] sfq_dec+0x528/0x600 net/sched/sch_sfq.c:238 sfq_dequeue+0x39b/0x9d0 net/sched/sch_sfq.c:500 sfq_reset+0x13/0x50 net/sched/sch_sfq.c:525 qdisc_

CVE-2024-57996
CVE-2024-57996
In the Linux kernel, the following vulnerability has been resolved: n ...

SUSE-SU-2025:01949-1
Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6)

SUSE-SU-2025:01929-1
Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP4)

SUSE-SU-2025:01843-1
Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP6)
GHSA-25pp-pjqx-3f66
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does not work correctly with a limit of 1. iproute2 actually checks for this and this patch adds the check in kernel as well. This fixes the following syzkaller reported crash: UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:210:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 0 PID: 2569 Comm: syz-executor101 Not tainted 5.10.0-smp-DEV #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0x125/0x19f lib/dump_stack.c:120 ubsan_epilogue lib/ubsan.c:148 [inline] __ubsan_handle_out_of_bounds+0xed/0x120 lib/ubsan.c:347 sfq_link net/sched/sch_sfq.c:210 [inline] sfq_dec+0x528/0x600 net/sched/sch_sfq.c:238 sfq_dequeue+0x39b/0x9d0 net/sched/sch_sfq.c:500 sfq_reset+0x13/0x50 net/sched/sch_sfq.c:525 qdi...

SUSE-SU-2025:01950-1
Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)

SUSE-SU-2025:01935-1
Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4)

SUSE-SU-2025:01928-1
Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4)

SUSE-SU-2025:01927-1
Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4)

SUSE-SU-2025:01922-1
Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4)

SUSE-SU-2025:01906-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

SUSE-SU-2025:01901-1
Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3)

SUSE-SU-2025:01899-1
Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

SUSE-SU-2025:01894-1
Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP5)

SUSE-SU-2025:01892-1
Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3)

SUSE-SU-2025:01868-1
Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-57996 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does not work correctly with a limit of 1. iproute2 actually checks for this and this patch adds the check in kernel as well. This fixes the following syzkaller reported crash: UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:210:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 0 PID: 2569 Comm: syz-executor101 Not tainted 5.10.0-smp-DEV #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0x125/0x19f lib/dump_stack.c:120 ubsan_epilogue lib/ubsan.c:148 [inline] __ubsan_handle_out_of_bounds+0xed/0x120 lib/ubsan.c:347 sfq_link net/sched/sch_sfq.c:210 [inline] sfq_dec+0x528/0x600 net/sched/sch_sfq.c:238 sfq_dequeue+0x39b/0x9d0 net/sched/sch_sfq.c:500 sfq_reset+0x13/0x50 net/sched/sch_sfq.c:525 qdisc_reset+0xfe/0x51... | CVSS3: 5.5 | 0% Низкий | 5 месяцев назад |
![]() | CVE-2024-57996 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does not work correctly with a limit of 1. iproute2 actually checks for this and this patch adds the check in kernel as well. This fixes the following syzkaller reported crash: UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:210:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 0 PID: 2569 Comm: syz-executor101 Not tainted 5.10.0-smp-DEV #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0x125/0x19f lib/dump_stack.c:120 ubsan_epilogue lib/ubsan.c:148 [inline] __ubsan_handle_out_of_bounds+0xed/0x120 lib/ubsan.c:347 sfq_link net/sched/sch_sfq.c:210 [inline] sfq_dec+0x528/0x600 net/sched/sch_sfq.c:238 sfq_dequeue+0x39b/0x9d0 net/sched/sch_sfq.c:500 sfq_reset+0x13/0x50 net/sched/sch_sfq.c:525 qdisc_reset+0xfe/0x510 ne... | CVSS3: 5.5 | 0% Низкий | 5 месяцев назад |
![]() | CVE-2024-57996 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does not work correctly with a limit of 1. iproute2 actually checks for this and this patch adds the check in kernel as well. This fixes the following syzkaller reported crash: UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:210:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 0 PID: 2569 Comm: syz-executor101 Not tainted 5.10.0-smp-DEV #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0x125/0x19f lib/dump_stack.c:120 ubsan_epilogue lib/ubsan.c:148 [inline] __ubsan_handle_out_of_bounds+0xed/0x120 lib/ubsan.c:347 sfq_link net/sched/sch_sfq.c:210 [inline] sfq_dec+0x528/0x600 net/sched/sch_sfq.c:238 sfq_dequeue+0x39b/0x9d0 net/sched/sch_sfq.c:500 sfq_reset+0x13/0x50 net/sched/sch_sfq.c:525 qdisc_ | CVSS3: 5.5 | 0% Низкий | 5 месяцев назад |
![]() | CVSS3: 5.5 | 0% Низкий | 4 месяца назад | |
CVE-2024-57996 In the Linux kernel, the following vulnerability has been resolved: n ... | CVSS3: 5.5 | 0% Низкий | 5 месяцев назад | |
![]() | SUSE-SU-2025:01949-1 Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) | 0% Низкий | около 1 месяца назад | |
![]() | SUSE-SU-2025:01929-1 Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP4) | 0% Низкий | около 1 месяца назад | |
![]() | SUSE-SU-2025:01843-1 Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP6) | 0% Низкий | около 1 месяца назад | |
GHSA-25pp-pjqx-3f66 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does not work correctly with a limit of 1. iproute2 actually checks for this and this patch adds the check in kernel as well. This fixes the following syzkaller reported crash: UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:210:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 0 PID: 2569 Comm: syz-executor101 Not tainted 5.10.0-smp-DEV #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0x125/0x19f lib/dump_stack.c:120 ubsan_epilogue lib/ubsan.c:148 [inline] __ubsan_handle_out_of_bounds+0xed/0x120 lib/ubsan.c:347 sfq_link net/sched/sch_sfq.c:210 [inline] sfq_dec+0x528/0x600 net/sched/sch_sfq.c:238 sfq_dequeue+0x39b/0x9d0 net/sched/sch_sfq.c:500 sfq_reset+0x13/0x50 net/sched/sch_sfq.c:525 qdi... | CVSS3: 5.5 | 0% Низкий | 5 месяцев назад | |
![]() | SUSE-SU-2025:01950-1 Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:01935-1 Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:01928-1 Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:01927-1 Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:01922-1 Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:01906-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:01901-1 Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:01899-1 Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:01894-1 Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP5) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:01892-1 Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:01868-1 Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) | около 1 месяца назад |
Уязвимостей на страницу