Количество 171
Количество 171

CVE-2022-48651
In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header If an AF_PACKET socket is used to send packets through ipvlan and the default xmit function of the AF_PACKET socket is changed from dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option name of PACKET_QDISC_BYPASS, the skb->mac_header may not be reset and remains as the initial value of 65535, this may trigger slab-out-of-bounds bugs as following: ================================================================= UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6 ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 all Trace: print_address_description.constprop.0+0x1d/0x160 print_report.cold+0x4f/0x112 kasan_report+0xa3/0x130 ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] ipvlan_start_xmit+0x29/0xa0 [ipvlan] __dev_direct_xmit+0x2e2/...

CVE-2022-48651
In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header If an AF_PACKET socket is used to send packets through ipvlan and the default xmit function of the AF_PACKET socket is changed from dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option name of PACKET_QDISC_BYPASS, the skb->mac_header may not be reset and remains as the initial value of 65535, this may trigger slab-out-of-bounds bugs as following: ================================================================= UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6 ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 all Trace: print_address_description.constprop.0+0x1d/0x160 print_report.cold+0x4f/0x112 kasan_report+0xa3/0x130 ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] ipvlan_start_xmit+0x29/0xa0 [ipvlan] __dev_direct_xmit+0x2e2/...

CVE-2022-48651
In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header If an AF_PACKET socket is used to send packets through ipvlan and the default xmit function of the AF_PACKET socket is changed from dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option name of PACKET_QDISC_BYPASS, the skb->mac_header may not be reset and remains as the initial value of 65535, this may trigger slab-out-of-bounds bugs as following: ================================================================= UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6 ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 all Trace: print_address_description.constprop.0+0x1d/0x160 print_report.cold+0x4f/0x112 kasan_report+0xa3/0x130 ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] ipvlan_start_xmit+0x29/0xa0 [ipvlan] __dev_direct_xmit+0x2e2/
CVE-2022-48651
In the Linux kernel, the following vulnerability has been resolved: i ...
GHSA-vgv5-6j9r-qr9f
In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header If an AF_PACKET socket is used to send packets through ipvlan and the default xmit function of the AF_PACKET socket is changed from dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option name of PACKET_QDISC_BYPASS, the skb->mac_header may not be reset and remains as the initial value of 65535, this may trigger slab-out-of-bounds bugs as following: ================================================================= UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6 ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 all Trace: print_address_description.constprop.0+0x1d/0x160 print_report.cold+0x4f/0x112 kasan_report+0xa3/0x130 ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] ipvlan_start_xmit+0x29/0xa0 [ipvlan] __dev_direct_xmit+0x2...

BDU:2024-06336
Уязвимость компонента ipvlan ядра операционной системы Linux, позволяющая нарушителю оказывать воздействие на целостность и доступность системы

SUSE-SU-2024:1760-1
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5)

SUSE-SU-2024:1730-1
Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2)

SUSE-SU-2024:1683-1
Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5)

SUSE-SU-2024:2209-1
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5)

SUSE-SU-2024:2101-1
Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5)

SUSE-SU-2024:1750-1
Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

SUSE-SU-2024:1738-1
Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3)

SUSE-SU-2024:1694-1
Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5)

SUSE-SU-2024:2191-1
Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

SUSE-SU-2024:2121-1
Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2)

SUSE-SU-2024:1731-1
Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5)

SUSE-SU-2024:1723-1
Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5)

SUSE-SU-2024:1719-1
Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP2)

SUSE-SU-2024:1713-1
Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP2)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2022-48651 In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header If an AF_PACKET socket is used to send packets through ipvlan and the default xmit function of the AF_PACKET socket is changed from dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option name of PACKET_QDISC_BYPASS, the skb->mac_header may not be reset and remains as the initial value of 65535, this may trigger slab-out-of-bounds bugs as following: ================================================================= UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6 ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 all Trace: print_address_description.constprop.0+0x1d/0x160 print_report.cold+0x4f/0x112 kasan_report+0xa3/0x130 ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] ipvlan_start_xmit+0x29/0xa0 [ipvlan] __dev_direct_xmit+0x2e2/... | CVSS3: 7.7 | 0% Низкий | около 1 года назад |
![]() | CVE-2022-48651 In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header If an AF_PACKET socket is used to send packets through ipvlan and the default xmit function of the AF_PACKET socket is changed from dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option name of PACKET_QDISC_BYPASS, the skb->mac_header may not be reset and remains as the initial value of 65535, this may trigger slab-out-of-bounds bugs as following: ================================================================= UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6 ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 all Trace: print_address_description.constprop.0+0x1d/0x160 print_report.cold+0x4f/0x112 kasan_report+0xa3/0x130 ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] ipvlan_start_xmit+0x29/0xa0 [ipvlan] __dev_direct_xmit+0x2e2/... | CVSS3: 5.8 | 0% Низкий | около 1 года назад |
![]() | CVE-2022-48651 In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header If an AF_PACKET socket is used to send packets through ipvlan and the default xmit function of the AF_PACKET socket is changed from dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option name of PACKET_QDISC_BYPASS, the skb->mac_header may not be reset and remains as the initial value of 65535, this may trigger slab-out-of-bounds bugs as following: ================================================================= UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6 ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 all Trace: print_address_description.constprop.0+0x1d/0x160 print_report.cold+0x4f/0x112 kasan_report+0xa3/0x130 ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] ipvlan_start_xmit+0x29/0xa0 [ipvlan] __dev_direct_xmit+0x2e2/ | CVSS3: 7.7 | 0% Низкий | около 1 года назад |
CVE-2022-48651 In the Linux kernel, the following vulnerability has been resolved: i ... | CVSS3: 7.7 | 0% Низкий | около 1 года назад | |
GHSA-vgv5-6j9r-qr9f In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header If an AF_PACKET socket is used to send packets through ipvlan and the default xmit function of the AF_PACKET socket is changed from dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option name of PACKET_QDISC_BYPASS, the skb->mac_header may not be reset and remains as the initial value of 65535, this may trigger slab-out-of-bounds bugs as following: ================================================================= UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6 ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 all Trace: print_address_description.constprop.0+0x1d/0x160 print_report.cold+0x4f/0x112 kasan_report+0xa3/0x130 ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] ipvlan_start_xmit+0x29/0xa0 [ipvlan] __dev_direct_xmit+0x2... | CVSS3: 7.7 | 0% Низкий | около 1 года назад | |
![]() | BDU:2024-06336 Уязвимость компонента ipvlan ядра операционной системы Linux, позволяющая нарушителю оказывать воздействие на целостность и доступность системы | CVSS3: 7.7 | 0% Низкий | почти 3 года назад |
![]() | SUSE-SU-2024:1760-1 Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:1730-1 Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2) | около 1 года назад | ||
![]() | SUSE-SU-2024:1683-1 Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:2209-1 Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:2101-1 Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:1750-1 Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) | около 1 года назад | ||
![]() | SUSE-SU-2024:1738-1 Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3) | около 1 года назад | ||
![]() | SUSE-SU-2024:1694-1 Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:2191-1 Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) | около 1 года назад | ||
![]() | SUSE-SU-2024:2121-1 Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2) | около 1 года назад | ||
![]() | SUSE-SU-2024:1731-1 Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:1723-1 Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:1719-1 Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP2) | около 1 года назад | ||
![]() | SUSE-SU-2024:1713-1 Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP2) | около 1 года назад |
Уязвимостей на страницу