Количество 13
Количество 13
BDU:2024-01766
Уязвимость функции memblock_free_late компонента ima ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2023-52576
In the Linux kernel, the following vulnerability has been resolved: x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() The code calling ima_free_kexec_buffer() runs long after the memblock allocator has already been torn down, potentially resulting in a use after free in memblock_isolate_range(). With KASAN or KFENCE, this use after free will result in a BUG from the idle task, and a subsequent kernel panic. Switch ima_free_kexec_buffer() over to memblock_free_late() to avoid that bug.
CVE-2023-52576
In the Linux kernel, the following vulnerability has been resolved: x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() The code calling ima_free_kexec_buffer() runs long after the memblock allocator has already been torn down, potentially resulting in a use after free in memblock_isolate_range(). With KASAN or KFENCE, this use after free will result in a BUG from the idle task, and a subsequent kernel panic. Switch ima_free_kexec_buffer() over to memblock_free_late() to avoid that bug.
CVE-2023-52576
In the Linux kernel, the following vulnerability has been resolved: x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() The code calling ima_free_kexec_buffer() runs long after the memblock allocator has already been torn down, potentially resulting in a use after free in memblock_isolate_range(). With KASAN or KFENCE, this use after free will result in a BUG from the idle task, and a subsequent kernel panic. Switch ima_free_kexec_buffer() over to memblock_free_late() to avoid that bug.
CVE-2023-52576
x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()
CVE-2023-52576
In the Linux kernel, the following vulnerability has been resolved: x ...
ROS-20251013-01
Множественные уязвимости kernel-lt
GHSA-jj48-3v62-2vf9
In the Linux kernel, the following vulnerability has been resolved: x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() The code calling ima_free_kexec_buffer() runs long after the memblock allocator has already been torn down, potentially resulting in a use after free in memblock_isolate_range(). With KASAN or KFENCE, this use after free will result in a BUG from the idle task, and a subsequent kernel panic. Switch ima_free_kexec_buffer() over to memblock_free_late() to avoid that bug.
SUSE-SU-2024:1321-1
Security update for the Linux Kernel
SUSE-SU-2024:1466-1
Security update for the Linux Kernel
SUSE-SU-2024:1322-1
Security update for the Linux Kernel
SUSE-SU-2024:1480-1
Security update for the Linux Kernel
SUSE-SU-2024:1490-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2024-01766 Уязвимость функции memblock_free_late компонента ima ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | около 2 лет назад | |
CVE-2023-52576 In the Linux kernel, the following vulnerability has been resolved: x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() The code calling ima_free_kexec_buffer() runs long after the memblock allocator has already been torn down, potentially resulting in a use after free in memblock_isolate_range(). With KASAN or KFENCE, this use after free will result in a BUG from the idle task, and a subsequent kernel panic. Switch ima_free_kexec_buffer() over to memblock_free_late() to avoid that bug. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
CVE-2023-52576 In the Linux kernel, the following vulnerability has been resolved: x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() The code calling ima_free_kexec_buffer() runs long after the memblock allocator has already been torn down, potentially resulting in a use after free in memblock_isolate_range(). With KASAN or KFENCE, this use after free will result in a BUG from the idle task, and a subsequent kernel panic. Switch ima_free_kexec_buffer() over to memblock_free_late() to avoid that bug. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
CVE-2023-52576 In the Linux kernel, the following vulnerability has been resolved: x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() The code calling ima_free_kexec_buffer() runs long after the memblock allocator has already been torn down, potentially resulting in a use after free in memblock_isolate_range(). With KASAN or KFENCE, this use after free will result in a BUG from the idle task, and a subsequent kernel panic. Switch ima_free_kexec_buffer() over to memblock_free_late() to avoid that bug. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
CVE-2023-52576 x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() | 0% Низкий | 2 месяца назад | ||
CVE-2023-52576 In the Linux kernel, the following vulnerability has been resolved: x ... | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
ROS-20251013-01 Множественные уязвимости kernel-lt | CVSS3: 8.8 | около 1 месяца назад | ||
GHSA-jj48-3v62-2vf9 In the Linux kernel, the following vulnerability has been resolved: x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() The code calling ima_free_kexec_buffer() runs long after the memblock allocator has already been torn down, potentially resulting in a use after free in memblock_isolate_range(). With KASAN or KFENCE, this use after free will result in a BUG from the idle task, and a subsequent kernel panic. Switch ima_free_kexec_buffer() over to memblock_free_late() to avoid that bug. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
SUSE-SU-2024:1321-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:1466-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:1322-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:1480-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:1490-1 Security update for the Linux Kernel | больше 1 года назад |
Уязвимостей на страницу