Количество 163
Количество 163

CVE-2024-26852
In the Linux kernel, the following vulnerability has been resolved: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() syzbot found another use-after-free in ip6_route_mpath_notify() [1] Commit f7225172f25a ("net/ipv6: prevent use after free in ip6_route_mpath_notify") was not able to fix the root cause. We need to defer the fib6_info_release() calls after ip6_route_mpath_notify(), in the cleanup phase. [1] BUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0 Read of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037 CPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:377 [inline] print_report+0x167/0x540 mm/kasan/report.c:488 kasan_report+0x142/0x180 mm/kasan/report.c:601 rt6_...

CVE-2024-26852
In the Linux kernel, the following vulnerability has been resolved: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() syzbot found another use-after-free in ip6_route_mpath_notify() [1] Commit f7225172f25a ("net/ipv6: prevent use after free in ip6_route_mpath_notify") was not able to fix the root cause. We need to defer the fib6_info_release() calls after ip6_route_mpath_notify(), in the cleanup phase. [1] BUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0 Read of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037 CPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:377 [inline] print_report+0x167/0x540 mm/kasan/report.c:488 kasan_report+0x142/0x180 mm/kasan/report.c:601 rt6_...

CVE-2024-26852
In the Linux kernel, the following vulnerability has been resolved: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() syzbot found another use-after-free in ip6_route_mpath_notify() [1] Commit f7225172f25a ("net/ipv6: prevent use after free in ip6_route_mpath_notify") was not able to fix the root cause. We need to defer the fib6_info_release() calls after ip6_route_mpath_notify(), in the cleanup phase. [1] BUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0 Read of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037 CPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:377 [inline] print_report+0x167/0x540 mm/kasan/report.c:488 kasan_report+0x142/0x180 mm/kasan/rep
CVE-2024-26852
In the Linux kernel, the following vulnerability has been resolved: n ...

SUSE-SU-2024:2221-1
Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5)

SUSE-SU-2024:2165-1
Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP4)

SUSE-SU-2024:2160-1
Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4)

SUSE-SU-2024:2096-1
Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP5)
GHSA-7j5c-w63j-h48p
In the Linux kernel, the following vulnerability has been resolved: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() syzbot found another use-after-free in ip6_route_mpath_notify() [1] Commit f7225172f25a ("net/ipv6: prevent use after free in ip6_route_mpath_notify") was not able to fix the root cause. We need to defer the fib6_info_release() calls after ip6_route_mpath_notify(), in the cleanup phase. [1] BUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0 Read of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037 CPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:377 [inline] print_report+0x167/0x540 mm/kasan/report.c:488 kasan_report+0x142/0x180 mm/kasan/...

BDU:2024-09160
Уязвимость компонента ipv6 ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе

SUSE-SU-2024:2217-1
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5)

SUSE-SU-2024:2205-1
Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)

SUSE-SU-2024:2166-1
Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4)

SUSE-SU-2024:2164-1
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP4)

SUSE-SU-2024:2156-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP4)

SUSE-SU-2024:2143-1
Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP3)

SUSE-SU-2024:2123-1
Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP2)

SUSE-SU-2024:2099-1
Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5)

SUSE-SU-2024:2094-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5)

SUSE-SU-2024:2216-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-26852 In the Linux kernel, the following vulnerability has been resolved: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() syzbot found another use-after-free in ip6_route_mpath_notify() [1] Commit f7225172f25a ("net/ipv6: prevent use after free in ip6_route_mpath_notify") was not able to fix the root cause. We need to defer the fib6_info_release() calls after ip6_route_mpath_notify(), in the cleanup phase. [1] BUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0 Read of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037 CPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:377 [inline] print_report+0x167/0x540 mm/kasan/report.c:488 kasan_report+0x142/0x180 mm/kasan/report.c:601 rt6_... | CVSS3: 7.8 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-26852 In the Linux kernel, the following vulnerability has been resolved: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() syzbot found another use-after-free in ip6_route_mpath_notify() [1] Commit f7225172f25a ("net/ipv6: prevent use after free in ip6_route_mpath_notify") was not able to fix the root cause. We need to defer the fib6_info_release() calls after ip6_route_mpath_notify(), in the cleanup phase. [1] BUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0 Read of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037 CPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:377 [inline] print_report+0x167/0x540 mm/kasan/report.c:488 kasan_report+0x142/0x180 mm/kasan/report.c:601 rt6_... | CVSS3: 7 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-26852 In the Linux kernel, the following vulnerability has been resolved: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() syzbot found another use-after-free in ip6_route_mpath_notify() [1] Commit f7225172f25a ("net/ipv6: prevent use after free in ip6_route_mpath_notify") was not able to fix the root cause. We need to defer the fib6_info_release() calls after ip6_route_mpath_notify(), in the cleanup phase. [1] BUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0 Read of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037 CPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:377 [inline] print_report+0x167/0x540 mm/kasan/report.c:488 kasan_report+0x142/0x180 mm/kasan/rep | CVSS3: 7.8 | 0% Низкий | около 1 года назад |
CVE-2024-26852 In the Linux kernel, the following vulnerability has been resolved: n ... | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:2221-1 Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5) | 0% Низкий | 12 месяцев назад | |
![]() | SUSE-SU-2024:2165-1 Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP4) | 0% Низкий | 12 месяцев назад | |
![]() | SUSE-SU-2024:2160-1 Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4) | 0% Низкий | 12 месяцев назад | |
![]() | SUSE-SU-2024:2096-1 Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP5) | 0% Низкий | около 1 года назад | |
GHSA-7j5c-w63j-h48p In the Linux kernel, the following vulnerability has been resolved: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() syzbot found another use-after-free in ip6_route_mpath_notify() [1] Commit f7225172f25a ("net/ipv6: prevent use after free in ip6_route_mpath_notify") was not able to fix the root cause. We need to defer the fib6_info_release() calls after ip6_route_mpath_notify(), in the cleanup phase. [1] BUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0 Read of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037 CPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:377 [inline] print_report+0x167/0x540 mm/kasan/report.c:488 kasan_report+0x142/0x180 mm/kasan/... | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
![]() | BDU:2024-09160 Уязвимость компонента ipv6 ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе | CVSS3: 8.8 | 0% Низкий | больше 1 года назад |
![]() | SUSE-SU-2024:2217-1 Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5) | 12 месяцев назад | ||
![]() | SUSE-SU-2024:2205-1 Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5) | 12 месяцев назад | ||
![]() | SUSE-SU-2024:2166-1 Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4) | 12 месяцев назад | ||
![]() | SUSE-SU-2024:2164-1 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP4) | 12 месяцев назад | ||
![]() | SUSE-SU-2024:2156-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP4) | 12 месяцев назад | ||
![]() | SUSE-SU-2024:2143-1 Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP3) | 12 месяцев назад | ||
![]() | SUSE-SU-2024:2123-1 Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP2) | 12 месяцев назад | ||
![]() | SUSE-SU-2024:2099-1 Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:2094-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:2216-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5) | 12 месяцев назад |
Уязвимостей на страницу