Количество 12
Количество 12
GHSA-qggq-gw32-wcq3
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value.
CVE-2023-52626
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value.
CVE-2023-52626
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value.
CVE-2023-52626
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value.
CVE-2023-52626
In the Linux kernel, the following vulnerability has been resolved: n ...
BDU:2025-14282
Уязвимость функции mlx5e_ptp_handle_ts_cqe() модуля drivers/net/ethernet/mellanox/mlx5/core/en/ptp.c драйвера поддержки сетевых адаптеров Ethernet Mellanox ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
RLSA-2024:4349
Moderate: kernel security and bug fix update
ELSA-2024-4349
ELSA-2024-4349: kernel security and bug fix update (MODERATE)
ELSA-2024-12682
ELSA-2024-12682: Unbreakable Enterprise kernel security update (IMPORTANT)
ROS-20241004-04
Множественные уязвимости kernel-lt
RLSA-2024:4211
Important: kernel security and bug fix update
ELSA-2024-4211
ELSA-2024-4211: kernel security and bug fix update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-qggq-gw32-wcq3 In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value. | CVSS3: 7.1 | 0% Низкий | почти 2 года назад | |
CVE-2023-52626 In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value. | CVSS3: 7.1 | 0% Низкий | почти 2 года назад | |
CVE-2023-52626 In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value. | CVSS3: 6 | 0% Низкий | почти 2 года назад | |
CVE-2023-52626 In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value. | CVSS3: 7.1 | 0% Низкий | почти 2 года назад | |
CVE-2023-52626 In the Linux kernel, the following vulnerability has been resolved: n ... | CVSS3: 7.1 | 0% Низкий | почти 2 года назад | |
BDU:2025-14282 Уязвимость функции mlx5e_ptp_handle_ts_cqe() модуля drivers/net/ethernet/mellanox/mlx5/core/en/ptp.c драйвера поддержки сетевых адаптеров Ethernet Mellanox ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.1 | 0% Низкий | около 2 лет назад | |
RLSA-2024:4349 Moderate: kernel security and bug fix update | больше 1 года назад | |||
ELSA-2024-4349 ELSA-2024-4349: kernel security and bug fix update (MODERATE) | больше 1 года назад | |||
ELSA-2024-12682 ELSA-2024-12682: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 1 года назад | |||
ROS-20241004-04 Множественные уязвимости kernel-lt | CVSS3: 8.8 | около 1 года назад | ||
RLSA-2024:4211 Important: kernel security and bug fix update | больше 1 года назад | |||
ELSA-2024-4211 ELSA-2024-4211: kernel security and bug fix update (IMPORTANT) | больше 1 года назад |
Уязвимостей на страницу