Логотип exploitDog
bind:"CVE-2024-53125"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-53125"

Количество 29

Количество 29

ubuntu логотип

CVE-2024-53125

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7fffffff 2: w1 = w0 rewrites w1 = w0 3: if w0 < 10 goto +0 --------------> r11 = 0x2f5674a6 (r) 4: r1 >>= 32 r11 <<= 32 (r) 5: r0 = r1 r1 |= r11 (r) 6: exit; if w0 < 0xa goto pc+0 r1 >>= 32 r0 = r1 exit (or zero extension of w1 at (2) is missing for architectures that require zero extension for upper register half). The following happens w/o this patch: - r0 is marked as not a subreg at (0); - w1 is marked as subreg at (2); - w1 subreg_def is overridde...

EPSS: Низкий
redhat логотип

CVE-2024-53125

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7fffffff 2: w1 = w0 rewrites w1 = w0 3: if w0 < 10 goto +0 --------------> r11 = 0x2f5674a6 (r) 4: r1 >>= 32 r11 <<= 32 (r) 5: r0 = r1 r1 |= r11 (r) 6: exit; if w0 < 0xa goto pc+0 r1 >>= 32 r0 = r1 exit (or zero extension of w1 at (2) is missing for architectures that require zero extension for upper register half). The following happens w/o this patch: - r0 is marked as not a subreg at (0); - w1 is marked as subreg at (2); - w1 subreg_def is overridde...

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2024-53125

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7fffffff 2: w1 = w0 rewrites w1 = w0 3: if w0 < 10 goto +0 --------------> r11 = 0x2f5674a6 (r) 4: r1 >>= 32 r11 <<= 32 (r) 5: r0 = r1 r1 |= r11 (r) 6: exit; if w0 < 0xa goto pc+0 r1 >>= 32 r0 = r1 exit (or zero extension of w1 at (2) is missing for architectures that require zero extension for upper reg

EPSS: Низкий
debian логотип

CVE-2024-53125

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: b ...

EPSS: Низкий
github логотип

GHSA-jgf3-fmmf-vj4h

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7fffffff 2: w1 = w0 rewrites w1 = w0 3: if w0 < 10 goto +0 --------------> r11 = 0x2f5674a6 (r) 4: r1 >>= 32 r11 <<= 32 (r) 5: r0 = r1 r1 |= r11 (r) 6: exit; if w0 < 0xa goto pc+0 r1 >>= 32 r0 = r1 exit (or zero extension of w1 at (2) is missing for architectures that require zero extension for upper ...

EPSS: Низкий
fstec логотип

BDU:2025-03303

около 1 года назад

Уязвимость компонента bpf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02708-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02647-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02611-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02698-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02688-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02652-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02638-1

около 2 месяцев назад

Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02610-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02636-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02632-1

около 2 месяцев назад

Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02691-1

около 2 месяцев назад

Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02601-1

2 месяца назад

Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

EPSS: Низкий
redos логотип

ROS-20250320-01

7 месяцев назад

Множественные уязвимости kernel-lt

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0201-2

7 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-53125

In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7fffffff 2: w1 = w0 rewrites w1 = w0 3: if w0 < 10 goto +0 --------------> r11 = 0x2f5674a6 (r) 4: r1 >>= 32 r11 <<= 32 (r) 5: r0 = r1 r1 |= r11 (r) 6: exit; if w0 < 0xa goto pc+0 r1 >>= 32 r0 = r1 exit (or zero extension of w1 at (2) is missing for architectures that require zero extension for upper register half). The following happens w/o this patch: - r0 is marked as not a subreg at (0); - w1 is marked as subreg at (2); - w1 subreg_def is overridde...

0%
Низкий
10 месяцев назад
redhat логотип
CVE-2024-53125

In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7fffffff 2: w1 = w0 rewrites w1 = w0 3: if w0 < 10 goto +0 --------------> r11 = 0x2f5674a6 (r) 4: r1 >>= 32 r11 <<= 32 (r) 5: r0 = r1 r1 |= r11 (r) 6: exit; if w0 < 0xa goto pc+0 r1 >>= 32 r0 = r1 exit (or zero extension of w1 at (2) is missing for architectures that require zero extension for upper register half). The following happens w/o this patch: - r0 is marked as not a subreg at (0); - w1 is marked as subreg at (2); - w1 subreg_def is overridde...

CVSS3: 4.4
0%
Низкий
10 месяцев назад
nvd логотип
CVE-2024-53125

In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7fffffff 2: w1 = w0 rewrites w1 = w0 3: if w0 < 10 goto +0 --------------> r11 = 0x2f5674a6 (r) 4: r1 >>= 32 r11 <<= 32 (r) 5: r0 = r1 r1 |= r11 (r) 6: exit; if w0 < 0xa goto pc+0 r1 >>= 32 r0 = r1 exit (or zero extension of w1 at (2) is missing for architectures that require zero extension for upper reg

0%
Низкий
10 месяцев назад
debian логотип
CVE-2024-53125

In the Linux kernel, the following vulnerability has been resolved: b ...

0%
Низкий
10 месяцев назад
github логотип
GHSA-jgf3-fmmf-vj4h

In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7fffffff 2: w1 = w0 rewrites w1 = w0 3: if w0 < 10 goto +0 --------------> r11 = 0x2f5674a6 (r) 4: r1 >>= 32 r11 <<= 32 (r) 5: r0 = r1 r1 |= r11 (r) 6: exit; if w0 < 0xa goto pc+0 r1 >>= 32 r0 = r1 exit (or zero extension of w1 at (2) is missing for architectures that require zero extension for upper ...

0%
Низкий
10 месяцев назад
fstec логотип
BDU:2025-03303

Уязвимость компонента bpf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:02708-1

Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP4)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02647-1

Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02611-1

Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP4)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02698-1

Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP5)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02688-1

Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02652-1

Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02638-1

Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02610-1

Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02636-1

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02632-1

Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02691-1

Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02601-1

Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

2 месяца назад
redos логотип
ROS-20250320-01

Множественные уязвимости kernel-lt

CVSS3: 7.8
7 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0201-2

Security update for the Linux Kernel

7 месяцев назад

Уязвимостей на страницу