Количество 17
Количество 17

BDU:2024-11564
Уязвимость компонента arm_scpi ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVE-2021-47609
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Fix string overflow in SCPI genpd driver Without the bound checks for scpi_pd->name, it could result in the buffer overflow when copying the SCPI device name from the corresponding device tree node as the name string is set at maximum size of 30. Let us fix it by using devm_kasprintf so that the string buffer is allocated dynamically.

CVE-2021-47609
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Fix string overflow in SCPI genpd driver Without the bound checks for scpi_pd->name, it could result in the buffer overflow when copying the SCPI device name from the corresponding device tree node as the name string is set at maximum size of 30. Let us fix it by using devm_kasprintf so that the string buffer is allocated dynamically.

CVE-2021-47609
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Fix string overflow in SCPI genpd driver Without the bound checks for scpi_pd->name, it could result in the buffer overflow when copying the SCPI device name from the corresponding device tree node as the name string is set at maximum size of 30. Let us fix it by using devm_kasprintf so that the string buffer is allocated dynamically.
CVE-2021-47609
In the Linux kernel, the following vulnerability has been resolved: f ...
GHSA-75vg-83r4-pmmq
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Fix string overflow in SCPI genpd driver Without the bound checks for scpi_pd->name, it could result in the buffer overflow when copying the SCPI device name from the corresponding device tree node as the name string is set at maximum size of 30. Let us fix it by using devm_kasprintf so that the string buffer is allocated dynamically.

ROS-20241202-02
Множественные уязвимости kernel-lt

SUSE-SU-2024:2362-1
Security update for the Linux Kernel

SUSE-SU-2024:2381-1
Security update for the Linux Kernel
ELSA-2024-7000
ELSA-2024-7000: kernel security update (IMPORTANT)

RLSA-2024:7000
Important: kernel security update

SUSE-SU-2024:2360-1
Security update for the Linux Kernel

SUSE-SU-2024:2561-1
Security update for the Linux Kernel

SUSE-SU-2024:2929-1
Security update for the Linux Kernel

SUSE-SU-2024:2394-1
Security update for the Linux Kernel

SUSE-SU-2024:2372-1
Security update for the Linux Kernel

SUSE-SU-2024:2939-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2024-11564 Уязвимость компонента arm_scpi ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.8 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-47609 In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Fix string overflow in SCPI genpd driver Without the bound checks for scpi_pd->name, it could result in the buffer overflow when copying the SCPI device name from the corresponding device tree node as the name string is set at maximum size of 30. Let us fix it by using devm_kasprintf so that the string buffer is allocated dynamically. | CVSS3: 7.8 | 0% Низкий | больше 1 года назад |
![]() | CVE-2021-47609 In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Fix string overflow in SCPI genpd driver Without the bound checks for scpi_pd->name, it could result in the buffer overflow when copying the SCPI device name from the corresponding device tree node as the name string is set at maximum size of 30. Let us fix it by using devm_kasprintf so that the string buffer is allocated dynamically. | CVSS3: 6.7 | 0% Низкий | больше 1 года назад |
![]() | CVE-2021-47609 In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Fix string overflow in SCPI genpd driver Without the bound checks for scpi_pd->name, it could result in the buffer overflow when copying the SCPI device name from the corresponding device tree node as the name string is set at maximum size of 30. Let us fix it by using devm_kasprintf so that the string buffer is allocated dynamically. | CVSS3: 7.8 | 0% Низкий | больше 1 года назад |
CVE-2021-47609 In the Linux kernel, the following vulnerability has been resolved: f ... | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
GHSA-75vg-83r4-pmmq In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Fix string overflow in SCPI genpd driver Without the bound checks for scpi_pd->name, it could result in the buffer overflow when copying the SCPI device name from the corresponding device tree node as the name string is set at maximum size of 30. Let us fix it by using devm_kasprintf so that the string buffer is allocated dynamically. | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
![]() | ROS-20241202-02 Множественные уязвимости kernel-lt | CVSS3: 8.8 | 10 месяцев назад | |
![]() | SUSE-SU-2024:2362-1 Security update for the Linux Kernel | около 1 года назад | ||
![]() | SUSE-SU-2024:2381-1 Security update for the Linux Kernel | около 1 года назад | ||
ELSA-2024-7000 ELSA-2024-7000: kernel security update (IMPORTANT) | около 1 года назад | |||
![]() | RLSA-2024:7000 Important: kernel security update | 5 месяцев назад | ||
![]() | SUSE-SU-2024:2360-1 Security update for the Linux Kernel | около 1 года назад | ||
![]() | SUSE-SU-2024:2561-1 Security update for the Linux Kernel | около 1 года назад | ||
![]() | SUSE-SU-2024:2929-1 Security update for the Linux Kernel | около 1 года назад | ||
![]() | SUSE-SU-2024:2394-1 Security update for the Linux Kernel | около 1 года назад | ||
![]() | SUSE-SU-2024:2372-1 Security update for the Linux Kernel | около 1 года назад | ||
![]() | SUSE-SU-2024:2939-1 Security update for the Linux Kernel | около 1 года назад |
Уязвимостей на страницу