Количество 79
Количество 79
SUSE-SU-2025:02400-1
Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4)
SUSE-SU-2025:02398-1
Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3)
SUSE-SU-2025:02455-1
Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4)
SUSE-SU-2025:02436-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)
SUSE-SU-2025:02419-1
Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)
SUSE-SU-2025:02403-1
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)
SUSE-SU-2025:02449-1
Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)
SUSE-SU-2025:02420-1
Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6)
SUSE-SU-2025:02411-1
Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP6)
SUSE-SU-2025:02389-1
Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6)
SUSE-SU-2025:02388-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)
CVE-2024-46713
In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch.
CVE-2024-46713
In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch.
CVE-2024-46713
In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch.
CVE-2024-46713
In the Linux kernel, the following vulnerability has been resolved: p ...
CVE-2024-53122
In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf().
CVE-2024-53122
In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf().
CVE-2024-53122
In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf().
CVE-2024-53122
CVE-2024-53122
In the Linux kernel, the following vulnerability has been resolved: m ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2025:02400-1 Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4) | 4 месяца назад | |||
SUSE-SU-2025:02398-1 Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3) | 4 месяца назад | |||
SUSE-SU-2025:02455-1 Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4) | 4 месяца назад | |||
SUSE-SU-2025:02436-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) | 4 месяца назад | |||
SUSE-SU-2025:02419-1 Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) | 4 месяца назад | |||
SUSE-SU-2025:02403-1 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) | 4 месяца назад | |||
SUSE-SU-2025:02449-1 Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6) | 4 месяца назад | |||
SUSE-SU-2025:02420-1 Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6) | 4 месяца назад | |||
SUSE-SU-2025:02411-1 Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP6) | 4 месяца назад | |||
SUSE-SU-2025:02389-1 Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6) | 4 месяца назад | |||
SUSE-SU-2025:02388-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) | 4 месяца назад | |||
CVE-2024-46713 In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch. | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
CVE-2024-46713 In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-46713 In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch. | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
CVE-2024-46713 In the Linux kernel, the following vulnerability has been resolved: p ... | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
CVE-2024-53122 In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf(). | CVSS3: 5.5 | 0% Низкий | 12 месяцев назад | |
CVE-2024-53122 In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf(). | CVSS3: 5.9 | 0% Низкий | 12 месяцев назад | |
CVE-2024-53122 In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf(). | CVSS3: 5.5 | 0% Низкий | 12 месяцев назад | |
CVSS3: 5.5 | 0% Низкий | 10 месяцев назад | ||
CVE-2024-53122 In the Linux kernel, the following vulnerability has been resolved: m ... | CVSS3: 5.5 | 0% Низкий | 12 месяцев назад |
Уязвимостей на страницу