Количество 69
Количество 69
GHSA-wm8x-c4gv-vvw5
In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error Unfortunately the commit `fd8958efe877` introduced another error causing the `descs` array to overflow. This reults in further crashes easily reproducible by `sendmsg` system call. [ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI [ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1] -- [ 1080.974535] Call Trace: [ 1080.976990] <TASK> [ 1081.021929] hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1] [ 1081.027364] hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1] [ 1081.032633] hfi1_ipoib_send+0x112/0x300 [hfi1] [ 1081.042001] ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib] [ 1081.046978] dev_hard_start_xmit+0xc4/0x210 -- [ 1081.148347] __sys_sendmsg+0x59/0xa0 crash> ipoib_txreq 0xffff9cfeba229f00 struct ipoib_txreq { txreq = { list = { next = 0xffff9cfeba229f00...

CVE-2024-26766
In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error Unfortunately the commit `fd8958efe877` introduced another error causing the `descs` array to overflow. This reults in further crashes easily reproducible by `sendmsg` system call. [ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI [ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1] -- [ 1080.974535] Call Trace: [ 1080.976990] <TASK> [ 1081.021929] hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1] [ 1081.027364] hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1] [ 1081.032633] hfi1_ipoib_send+0x112/0x300 [hfi1] [ 1081.042001] ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib] [ 1081.046978] dev_hard_start_xmit+0xc4/0x210 -- [ 1081.148347] __sys_sendmsg+0x59/0xa0 crash> ipoib_txreq 0xffff9cfeba229f00 struct ipoib_txreq { txreq = { list = { next = 0xffff9cfeba229f00, prev = 0xffff9cfeba22...

CVE-2024-26766
In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error Unfortunately the commit `fd8958efe877` introduced another error causing the `descs` array to overflow. This reults in further crashes easily reproducible by `sendmsg` system call. [ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI [ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1] -- [ 1080.974535] Call Trace: [ 1080.976990] <TASK> [ 1081.021929] hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1] [ 1081.027364] hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1] [ 1081.032633] hfi1_ipoib_send+0x112/0x300 [hfi1] [ 1081.042001] ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib] [ 1081.046978] dev_hard_start_xmit+0xc4/0x210 -- [ 1081.148347] __sys_sendmsg+0x59/0xa0 crash> ipoib_txreq 0xffff9cfeba229f00 struct ipoib_txreq { txreq = { list = { next = 0xffff9cfeba229f00, prev = 0xffff9...

CVE-2024-26766
In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error Unfortunately the commit `fd8958efe877` introduced another error causing the `descs` array to overflow. This reults in further crashes easily reproducible by `sendmsg` system call. [ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI [ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1] -- [ 1080.974535] Call Trace: [ 1080.976990] <TASK> [ 1081.021929] hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1] [ 1081.027364] hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1] [ 1081.032633] hfi1_ipoib_send+0x112/0x300 [hfi1] [ 1081.042001] ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib] [ 1081.046978] dev_hard_start_xmit+0xc4/0x210 -- [ 1081.148347] __sys_sendmsg+0x59/0xa0 crash> ipoib_txreq 0xffff9cfeba229f00 struct ipoib_txreq { txreq = { list = { next = 0xffff9cfeba229f00,
CVE-2024-26766
In the Linux kernel, the following vulnerability has been resolved: I ...

BDU:2024-08661
Уязвимость компонентов IB/hfi1 ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код и повысить свои привилегии

SUSE-SU-2024:1750-1
Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

SUSE-SU-2024:2191-1
Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

SUSE-SU-2024:1753-1
Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4)

SUSE-SU-2024:2163-1
Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4)

SUSE-SU-2024:1759-1
Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)

SUSE-SU-2024:1740-1
Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4)

SUSE-SU-2024:1705-1
Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)

SUSE-SU-2024:1685-1
Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP5)

SUSE-SU-2024:1679-1
Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5)

SUSE-SU-2024:1757-1
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5)

SUSE-SU-2024:1748-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP5)

SUSE-SU-2024:1739-1
Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4)

SUSE-SU-2024:1726-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5)

SUSE-SU-2024:1695-1
Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-wm8x-c4gv-vvw5 In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error Unfortunately the commit `fd8958efe877` introduced another error causing the `descs` array to overflow. This reults in further crashes easily reproducible by `sendmsg` system call. [ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI [ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1] -- [ 1080.974535] Call Trace: [ 1080.976990] <TASK> [ 1081.021929] hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1] [ 1081.027364] hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1] [ 1081.032633] hfi1_ipoib_send+0x112/0x300 [hfi1] [ 1081.042001] ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib] [ 1081.046978] dev_hard_start_xmit+0xc4/0x210 -- [ 1081.148347] __sys_sendmsg+0x59/0xa0 crash> ipoib_txreq 0xffff9cfeba229f00 struct ipoib_txreq { txreq = { list = { next = 0xffff9cfeba229f00... | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
![]() | CVE-2024-26766 In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error Unfortunately the commit `fd8958efe877` introduced another error causing the `descs` array to overflow. This reults in further crashes easily reproducible by `sendmsg` system call. [ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI [ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1] -- [ 1080.974535] Call Trace: [ 1080.976990] <TASK> [ 1081.021929] hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1] [ 1081.027364] hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1] [ 1081.032633] hfi1_ipoib_send+0x112/0x300 [hfi1] [ 1081.042001] ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib] [ 1081.046978] dev_hard_start_xmit+0xc4/0x210 -- [ 1081.148347] __sys_sendmsg+0x59/0xa0 crash> ipoib_txreq 0xffff9cfeba229f00 struct ipoib_txreq { txreq = { list = { next = 0xffff9cfeba229f00, prev = 0xffff9cfeba22... | CVSS3: 5.5 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-26766 In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error Unfortunately the commit `fd8958efe877` introduced another error causing the `descs` array to overflow. This reults in further crashes easily reproducible by `sendmsg` system call. [ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI [ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1] -- [ 1080.974535] Call Trace: [ 1080.976990] <TASK> [ 1081.021929] hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1] [ 1081.027364] hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1] [ 1081.032633] hfi1_ipoib_send+0x112/0x300 [hfi1] [ 1081.042001] ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib] [ 1081.046978] dev_hard_start_xmit+0xc4/0x210 -- [ 1081.148347] __sys_sendmsg+0x59/0xa0 crash> ipoib_txreq 0xffff9cfeba229f00 struct ipoib_txreq { txreq = { list = { next = 0xffff9cfeba229f00, prev = 0xffff9... | CVSS3: 4.4 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-26766 In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error Unfortunately the commit `fd8958efe877` introduced another error causing the `descs` array to overflow. This reults in further crashes easily reproducible by `sendmsg` system call. [ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI [ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1] -- [ 1080.974535] Call Trace: [ 1080.976990] <TASK> [ 1081.021929] hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1] [ 1081.027364] hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1] [ 1081.032633] hfi1_ipoib_send+0x112/0x300 [hfi1] [ 1081.042001] ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib] [ 1081.046978] dev_hard_start_xmit+0xc4/0x210 -- [ 1081.148347] __sys_sendmsg+0x59/0xa0 crash> ipoib_txreq 0xffff9cfeba229f00 struct ipoib_txreq { txreq = { list = { next = 0xffff9cfeba229f00, | CVSS3: 5.5 | 0% Низкий | около 1 года назад |
CVE-2024-26766 In the Linux kernel, the following vulnerability has been resolved: I ... | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
![]() | BDU:2024-08661 Уязвимость компонентов IB/hfi1 ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код и повысить свои привилегии | CVSS3: 7.8 | 0% Низкий | больше 1 года назад |
![]() | SUSE-SU-2024:1750-1 Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) | около 1 года назад | ||
![]() | SUSE-SU-2024:2191-1 Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) | 12 месяцев назад | ||
![]() | SUSE-SU-2024:1753-1 Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4) | около 1 года назад | ||
![]() | SUSE-SU-2024:2163-1 Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4) | 12 месяцев назад | ||
![]() | SUSE-SU-2024:1759-1 Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:1740-1 Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4) | около 1 года назад | ||
![]() | SUSE-SU-2024:1705-1 Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:1685-1 Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:1679-1 Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:1757-1 Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:1748-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:1739-1 Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4) | около 1 года назад | ||
![]() | SUSE-SU-2024:1726-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:1695-1 Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5) | около 1 года назад |
Уязвимостей на страницу