Количество 64
Количество 64

BDU:2024-03709
Уязвимость функции context_close() в модуле drivers/gpu/drm/i915/gem/i915_gem_context.c драйвера Intel 8xx/9xx/G3x/G4x/HD Graphics ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

ROS-20240814-04
Множественные уязвимости kernel-lt

CVE-2022-48662
In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires that we do not remove the context from the list until after we drop the final reference and release the struct. If, as currently, we remove the context from the list during context_close(), the link.next pointer may be poisoned while we are holding the context reference and cause a GPF: [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.1346 09/18/2017...

CVE-2022-48662
In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires that we do not remove the context from the list until after we drop the final reference and release the struct. If, as currently, we remove the context from the list during context_close(), the link.next pointer may be poisoned while we are holding the context reference and cause a GPF: [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918....

CVE-2022-48662
In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires that we do not remove the context from the list until after we drop the final reference and release the struct. If, as currently, we remove the context from the list during context_close(), the link.next pointer may be poisoned while we are holding the context reference and cause a GPF: [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.
CVE-2022-48662
In the Linux kernel, the following vulnerability has been resolved: d ...
GHSA-8wq2-m78j-qq93
In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires that we do not remove the context from the list until after we drop the final reference and release the struct. If, as currently, we remove the context from the list during context_close(), the link.next pointer may be poisoned while we are holding the context reference and cause a GPF: [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.09...

SUSE-SU-2024:3425-1
Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP4)

SUSE-SU-2024:3405-1
Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5)

SUSE-SU-2024:3395-1
Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4)

SUSE-SU-2024:3361-1
Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5)

SUSE-SU-2024:3348-1
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5)

SUSE-SU-2024:3336-1
Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5)

SUSE-SU-2024:3375-1
Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

SUSE-SU-2024:3679-1
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5)

SUSE-SU-2024:3639-1
Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5)

SUSE-SU-2024:3347-1
Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5)

SUSE-SU-2024:3318-1
Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5)

SUSE-SU-2024:3368-1
Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4)

SUSE-SU-2024:3696-1
Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2024-03709 Уязвимость функции context_close() в модуле drivers/gpu/drm/i915/gem/i915_gem_context.c драйвера Intel 8xx/9xx/G3x/G4x/HD Graphics ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7.8 | 0% Низкий | почти 3 года назад |
![]() | ROS-20240814-04 Множественные уязвимости kernel-lt | CVSS3: 7.8 | 11 месяцев назад | |
![]() | CVE-2022-48662 In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires that we do not remove the context from the list until after we drop the final reference and release the struct. If, as currently, we remove the context from the list during context_close(), the link.next pointer may be poisoned while we are holding the context reference and cause a GPF: [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.1346 09/18/2017... | CVSS3: 7.8 | 0% Низкий | около 1 года назад |
![]() | CVE-2022-48662 In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires that we do not remove the context from the list until after we drop the final reference and release the struct. If, as currently, we remove the context from the list during context_close(), the link.next pointer may be poisoned while we are holding the context reference and cause a GPF: [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.... | CVSS3: 7.3 | 0% Низкий | около 1 года назад |
![]() | CVE-2022-48662 In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires that we do not remove the context from the list until after we drop the final reference and release the struct. If, as currently, we remove the context from the list during context_close(), the link.next pointer may be poisoned while we are holding the context reference and cause a GPF: [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918. | CVSS3: 7.8 | 0% Низкий | около 1 года назад |
CVE-2022-48662 In the Linux kernel, the following vulnerability has been resolved: d ... | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
GHSA-8wq2-m78j-qq93 In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires that we do not remove the context from the list until after we drop the final reference and release the struct. If, as currently, we remove the context from the list during context_close(), the link.next pointer may be poisoned while we are holding the context reference and cause a GPF: [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.09... | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:3425-1 Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP4) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3405-1 Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3395-1 Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3361-1 Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3348-1 Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3336-1 Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3375-1 Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3679-1 Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3639-1 Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3347-1 Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3318-1 Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3368-1 Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3696-1 Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) | 9 месяцев назад |
Уязвимостей на страницу