Количество 12
Количество 12

BDU:2025-03031
Уязвимость функции ep93xx_div_recalc_rate() модуля arch/arm/mach-ep93xx/clock.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации

CVE-2024-47686
In the Linux kernel, the following vulnerability has been resolved: ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() The psc->div[] array has psc->num_div elements. These values come from when we call clk_hw_register_div(). It's adc_divisors and ARRAY_SIZE(adc_divisors)) and so on. So this condition needs to be >= instead of > to prevent an out of bounds read.

CVE-2024-47686
In the Linux kernel, the following vulnerability has been resolved: ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() The psc->div[] array has psc->num_div elements. These values come from when we call clk_hw_register_div(). It's adc_divisors and ARRAY_SIZE(adc_divisors)) and so on. So this condition needs to be >= instead of > to prevent an out of bounds read.

CVE-2024-47686
In the Linux kernel, the following vulnerability has been resolved: ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() The psc->div[] array has psc->num_div elements. These values come from when we call clk_hw_register_div(). It's adc_divisors and ARRAY_SIZE(adc_divisors)) and so on. So this condition needs to be >= instead of > to prevent an out of bounds read.

CVE-2024-47686
CVE-2024-47686
In the Linux kernel, the following vulnerability has been resolved: e ...
GHSA-vvmc-4gqr-h5j4
In the Linux kernel, the following vulnerability has been resolved: ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() The psc->div[] array has psc->num_div elements. These values come from when we call clk_hw_register_div(). It's adc_divisors and ARRAY_SIZE(adc_divisors)) and so on. So this condition needs to be >= instead of > to prevent an out of bounds read.

ROS-20250311-01
Множественные уязвимости kernel-lt

SUSE-SU-2024:3986-1
Security update for the Linux Kernel

SUSE-SU-2024:3984-1
Security update for the Linux Kernel

SUSE-SU-2024:4387-1
Security update for the Linux Kernel

SUSE-SU-2024:4318-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2025-03031 Уязвимость функции ep93xx_div_recalc_rate() модуля arch/arm/mach-ep93xx/clock.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации | CVSS3: 7.1 | 0% Низкий | 9 месяцев назад |
![]() | CVE-2024-47686 In the Linux kernel, the following vulnerability has been resolved: ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() The psc->div[] array has psc->num_div elements. These values come from when we call clk_hw_register_div(). It's adc_divisors and ARRAY_SIZE(adc_divisors)) and so on. So this condition needs to be >= instead of > to prevent an out of bounds read. | CVSS3: 7.1 | 0% Низкий | 8 месяцев назад |
![]() | CVE-2024-47686 In the Linux kernel, the following vulnerability has been resolved: ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() The psc->div[] array has psc->num_div elements. These values come from when we call clk_hw_register_div(). It's adc_divisors and ARRAY_SIZE(adc_divisors)) and so on. So this condition needs to be >= instead of > to prevent an out of bounds read. | CVSS3: 7.1 | 0% Низкий | 8 месяцев назад |
![]() | CVE-2024-47686 In the Linux kernel, the following vulnerability has been resolved: ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() The psc->div[] array has psc->num_div elements. These values come from when we call clk_hw_register_div(). It's adc_divisors and ARRAY_SIZE(adc_divisors)) and so on. So this condition needs to be >= instead of > to prevent an out of bounds read. | CVSS3: 7.1 | 0% Низкий | 8 месяцев назад |
![]() | CVSS3: 7.1 | 0% Низкий | 7 месяцев назад | |
CVE-2024-47686 In the Linux kernel, the following vulnerability has been resolved: e ... | CVSS3: 7.1 | 0% Низкий | 8 месяцев назад | |
GHSA-vvmc-4gqr-h5j4 In the Linux kernel, the following vulnerability has been resolved: ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() The psc->div[] array has psc->num_div elements. These values come from when we call clk_hw_register_div(). It's adc_divisors and ARRAY_SIZE(adc_divisors)) and so on. So this condition needs to be >= instead of > to prevent an out of bounds read. | CVSS3: 7.1 | 0% Низкий | 8 месяцев назад | |
![]() | ROS-20250311-01 Множественные уязвимости kernel-lt | CVSS3: 9.1 | 3 месяца назад | |
![]() | SUSE-SU-2024:3986-1 Security update for the Linux Kernel | 7 месяцев назад | ||
![]() | SUSE-SU-2024:3984-1 Security update for the Linux Kernel | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4387-1 Security update for the Linux Kernel | 6 месяцев назад | ||
![]() | SUSE-SU-2024:4318-1 Security update for the Linux Kernel | 6 месяцев назад |
Уязвимостей на страницу