Логотип exploitDog
bind:"BDU:2024-10742" OR bind:"CVE-2024-38559"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2024-10742" OR bind:"CVE-2024-38559"

Количество 29

Количество 29

fstec логотип

BDU:2024-10742

больше 1 года назад

Уязвимость компонента qedf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 4.4
EPSS: Низкий
ubuntu логотип

CVE-2024-38559

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on this buffer but we don't ensure that the string is terminated inside the buffer, this can lead to OOB read when using kstrtouint. Fix this issue by using memdup_user_nul instead of memdup_user.

CVSS3: 4.4
EPSS: Низкий
redhat логотип

CVE-2024-38559

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on this buffer but we don't ensure that the string is terminated inside the buffer, this can lead to OOB read when using kstrtouint. Fix this issue by using memdup_user_nul instead of memdup_user.

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2024-38559

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on this buffer but we don't ensure that the string is terminated inside the buffer, this can lead to OOB read when using kstrtouint. Fix this issue by using memdup_user_nul instead of memdup_user.

CVSS3: 4.4
EPSS: Низкий
debian логотип

CVE-2024-38559

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: s ...

CVSS3: 4.4
EPSS: Низкий
github логотип

GHSA-j698-35hc-3jf8

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on this buffer but we don't ensure that the string is terminated inside the buffer, this can lead to OOB read when using kstrtouint. Fix this issue by using memdup_user_nul instead of memdup_user.

CVSS3: 4.4
EPSS: Низкий
redos логотип

ROS-20241129-02

10 месяцев назад

Множественные уязвимости kernel-lt

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2923-1

около 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
rocky логотип

RLSA-2024:6567

около 1 года назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-6567

около 1 года назад

ELSA-2024-6567: kernel security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2495-1

около 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2948-1

около 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2365-1

около 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12611

около 1 года назад

ELSA-2024-12611: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12585

около 1 года назад

ELSA-2024-12585: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12584

около 1 года назад

ELSA-2024-12584: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12581

около 1 года назад

ELSA-2024-12581: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2362-1

около 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2024-7000

около 1 года назад

ELSA-2024-7000: kernel security update (IMPORTANT)

EPSS: Низкий
rocky логотип

RLSA-2024:7000

5 месяцев назад

Important: kernel security update

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2024-10742

Уязвимость компонента qedf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 4.4
0%
Низкий
больше 1 года назад
ubuntu логотип
CVE-2024-38559

In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on this buffer but we don't ensure that the string is terminated inside the buffer, this can lead to OOB read when using kstrtouint. Fix this issue by using memdup_user_nul instead of memdup_user.

CVSS3: 4.4
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-38559

In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on this buffer but we don't ensure that the string is terminated inside the buffer, this can lead to OOB read when using kstrtouint. Fix this issue by using memdup_user_nul instead of memdup_user.

CVSS3: 4.4
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-38559

In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on this buffer but we don't ensure that the string is terminated inside the buffer, this can lead to OOB read when using kstrtouint. Fix this issue by using memdup_user_nul instead of memdup_user.

CVSS3: 4.4
0%
Низкий
больше 1 года назад
debian логотип
CVE-2024-38559

In the Linux kernel, the following vulnerability has been resolved: s ...

CVSS3: 4.4
0%
Низкий
больше 1 года назад
github логотип
GHSA-j698-35hc-3jf8

In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on this buffer but we don't ensure that the string is terminated inside the buffer, this can lead to OOB read when using kstrtouint. Fix this issue by using memdup_user_nul instead of memdup_user.

CVSS3: 4.4
0%
Низкий
больше 1 года назад
redos логотип
ROS-20241129-02

Множественные уязвимости kernel-lt

CVSS3: 8.8
10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2923-1

Security update for the Linux Kernel

около 1 года назад
rocky логотип
RLSA-2024:6567

Moderate: kernel security update

около 1 года назад
oracle-oval логотип
ELSA-2024-6567

ELSA-2024-6567: kernel security update (MODERATE)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2495-1

Security update for the Linux Kernel

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2948-1

Security update for the Linux Kernel

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2365-1

Security update for the Linux Kernel

около 1 года назад
oracle-oval логотип
ELSA-2024-12611

ELSA-2024-12611: Unbreakable Enterprise kernel security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-12585

ELSA-2024-12585: Unbreakable Enterprise kernel-container security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-12584

ELSA-2024-12584: Unbreakable Enterprise kernel-container security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-12581

ELSA-2024-12581: Unbreakable Enterprise kernel security update (IMPORTANT)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2362-1

Security update for the Linux Kernel

около 1 года назад
oracle-oval логотип
ELSA-2024-7000

ELSA-2024-7000: kernel security update (IMPORTANT)

около 1 года назад
rocky логотип
RLSA-2024:7000

Important: kernel security update

5 месяцев назад

Уязвимостей на страницу