Количество 178
Количество 178

CVE-2024-26828
In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that "bytes_left" is type ssize_t while sizeof() is type size_t. That means that because of type promotion, the comparison is done as an unsigned and if we have negative bytes left the loop continues instead of ending.

CVE-2024-26828
In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that "bytes_left" is type ssize_t while sizeof() is type size_t. That means that because of type promotion, the comparison is done as an unsigned and if we have negative bytes left the loop continues instead of ending.

CVE-2024-26828
In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that "bytes_left" is type ssize_t while sizeof() is type size_t. That means that because of type promotion, the comparison is done as an unsigned and if we have negative bytes left the loop continues instead of ending.
CVE-2024-26828
In the Linux kernel, the following vulnerability has been resolved: c ...
GHSA-q43w-g673-m6f4
In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that "bytes_left" is type ssize_t while sizeof() is type size_t. That means that because of type promotion, the comparison is done as an unsigned and if we have negative bytes left the loop continues instead of ending.

BDU:2025-04405
Уязвимость функции parse_server_interfaces() модуля fs/smb/client/smb2ops.c поддержки клиента SMB ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации или вызвать отказ в обслуживании

SUSE-SU-2024:2480-1
Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5)

SUSE-SU-2024:2474-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5)

SUSE-SU-2024:2410-1
Security update for the Linux Kernel RT (Live Patch 14 for SLE 15 SP5)

SUSE-SU-2024:2407-1
Security update for the Linux Kernel RT (Live Patch 15 for SLE 15 SP5)

SUSE-SU-2024:2852-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5)

SUSE-SU-2024:2726-1
Security update for the Linux Kernel RT (Live Patch 14 for SLE 15 SP5)

SUSE-SU-2024:2723-1
Security update for the Linux Kernel RT (Live Patch 15 for SLE 15 SP5)

SUSE-SU-2024:2487-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5)

SUSE-SU-2024:2338-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5)

SUSE-SU-2024:3349-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5)

SUSE-SU-2024:3334-1
Security update for the Linux Kernel RT (Live Patch 14 for SLE 15 SP5)

SUSE-SU-2024:3320-1
Security update for the Linux Kernel RT (Live Patch 15 for SLE 15 SP5)

SUSE-SU-2024:2530-1
Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5)

SUSE-SU-2024:2488-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-26828 In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that "bytes_left" is type ssize_t while sizeof() is type size_t. That means that because of type promotion, the comparison is done as an unsigned and if we have negative bytes left the loop continues instead of ending. | CVSS3: 6.7 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-26828 In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that "bytes_left" is type ssize_t while sizeof() is type size_t. That means that because of type promotion, the comparison is done as an unsigned and if we have negative bytes left the loop continues instead of ending. | CVSS3: 6.7 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-26828 In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that "bytes_left" is type ssize_t while sizeof() is type size_t. That means that because of type promotion, the comparison is done as an unsigned and if we have negative bytes left the loop continues instead of ending. | CVSS3: 6.7 | 0% Низкий | около 1 года назад |
CVE-2024-26828 In the Linux kernel, the following vulnerability has been resolved: c ... | CVSS3: 6.7 | 0% Низкий | около 1 года назад | |
GHSA-q43w-g673-m6f4 In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that "bytes_left" is type ssize_t while sizeof() is type size_t. That means that because of type promotion, the comparison is done as an unsigned and if we have negative bytes left the loop continues instead of ending. | CVSS3: 6.7 | 0% Низкий | около 1 года назад | |
![]() | BDU:2025-04405 Уязвимость функции parse_server_interfaces() модуля fs/smb/client/smb2ops.c поддержки клиента SMB ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации или вызвать отказ в обслуживании | CVSS3: 6.7 | 0% Низкий | больше 1 года назад |
![]() | SUSE-SU-2024:2480-1 Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2474-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2410-1 Security update for the Linux Kernel RT (Live Patch 14 for SLE 15 SP5) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2407-1 Security update for the Linux Kernel RT (Live Patch 15 for SLE 15 SP5) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2852-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2726-1 Security update for the Linux Kernel RT (Live Patch 14 for SLE 15 SP5) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2723-1 Security update for the Linux Kernel RT (Live Patch 15 for SLE 15 SP5) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2487-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2338-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) | 12 месяцев назад | ||
![]() | SUSE-SU-2024:3349-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3334-1 Security update for the Linux Kernel RT (Live Patch 14 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3320-1 Security update for the Linux Kernel RT (Live Patch 15 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:2530-1 Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2488-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5) | 11 месяцев назад |
Уязвимостей на страницу