Количество 78
Количество 78

SUSE-SU-2025:02400-1
Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4)

SUSE-SU-2025:02398-1
Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3)

SUSE-SU-2025:02455-1
Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4)

SUSE-SU-2025:02436-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

SUSE-SU-2025:02419-1
Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)

SUSE-SU-2025:02403-1
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

CVE-2024-46713
In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch.

CVE-2024-46713
In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch.

CVE-2024-46713
In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch.
CVE-2024-46713
In the Linux kernel, the following vulnerability has been resolved: p ...

SUSE-SU-2025:02449-1
Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)

SUSE-SU-2025:02420-1
Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6)

SUSE-SU-2025:02411-1
Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP6)

SUSE-SU-2025:02389-1
Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6)

SUSE-SU-2025:02388-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

CVE-2024-53122
In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf().

CVE-2024-53122
In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf().

CVE-2024-53122
In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf().

CVE-2024-53122
CVE-2024-53122
In the Linux kernel, the following vulnerability has been resolved: m ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2025:02400-1 Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4) | 14 дней назад | ||
![]() | SUSE-SU-2025:02398-1 Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3) | 14 дней назад | ||
![]() | SUSE-SU-2025:02455-1 Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4) | 14 дней назад | ||
![]() | SUSE-SU-2025:02436-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) | 14 дней назад | ||
![]() | SUSE-SU-2025:02419-1 Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) | 14 дней назад | ||
![]() | SUSE-SU-2025:02403-1 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) | 14 дней назад | ||
![]() | CVE-2024-46713 In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch. | 0% Низкий | 11 месяцев назад | |
![]() | CVE-2024-46713 In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch. | CVSS3: 5.5 | 0% Низкий | 11 месяцев назад |
![]() | CVE-2024-46713 In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch. | 0% Низкий | 11 месяцев назад | |
CVE-2024-46713 In the Linux kernel, the following vulnerability has been resolved: p ... | 0% Низкий | 11 месяцев назад | ||
![]() | SUSE-SU-2025:02449-1 Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6) | 14 дней назад | ||
![]() | SUSE-SU-2025:02420-1 Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6) | 14 дней назад | ||
![]() | SUSE-SU-2025:02411-1 Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP6) | 14 дней назад | ||
![]() | SUSE-SU-2025:02389-1 Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6) | 16 дней назад | ||
![]() | SUSE-SU-2025:02388-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) | 17 дней назад | ||
![]() | CVE-2024-53122 In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf(). | CVSS3: 5.5 | 0% Низкий | 8 месяцев назад |
![]() | CVE-2024-53122 In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf(). | CVSS3: 5.9 | 0% Низкий | 8 месяцев назад |
![]() | CVE-2024-53122 In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf(). | CVSS3: 5.5 | 0% Низкий | 8 месяцев назад |
![]() | CVSS3: 5.5 | 0% Низкий | 6 месяцев назад | |
CVE-2024-53122 In the Linux kernel, the following vulnerability has been resolved: m ... | CVSS3: 5.5 | 0% Низкий | 8 месяцев назад |
Уязвимостей на страницу