Количество 217
Количество 217

CVE-2024-26923
In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect() Garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. If such embryo has a peer that carries SCM_RIGHTS, two consecutive passes of scan_children() may see a different set of children. Leading to an incorrectly elevated inflight count, and then a dangling pointer within the gc_inflight_list. sockets are AF_UNIX/SOCK_STREAM S is an unconnected socket L is a listening in-flight socket bound to addr, not in fdtable V's fd will be passed via sendmsg(), gets inflight count bumped connect(S, addr) sendmsg(S, [V]); close(V) __unix_gc() ---------------- ------------------------- ----------- NS = unix_create1() skb1 = sock_wmalloc(NS) L = unix_find_other(addr) unix_state_lock(L) unix_peer(S) = NS // V count=1 inflight=0 NS = unix_peer(S) skb2 = sock_alloc() skb_queue_tail(NS, skb2[V]) // V became in-flight // V co...

CVE-2024-26923
In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect() Garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. If such embryo has a peer that carries SCM_RIGHTS, two consecutive passes of scan_children() may see a different set of children. Leading to an incorrectly elevated inflight count, and then a dangling pointer within the gc_inflight_list. sockets are AF_UNIX/SOCK_STREAM S is an unconnected socket L is a listening in-flight socket bound to addr, not in fdtable V's fd will be passed via sendmsg(), gets inflight count bumped connect(S, addr)sendmsg(S, [V]); close(V)__unix_gc() ---------------------------------------------------- NS = unix_create1() skb1 = sock_wmalloc(NS) L = unix_find_other(addr) unix_state_lock(L) unix_peer(S) = NS // V count=1 inflight=0 NS = unix_peer(S) skb2 = sock_alloc() skb_queue_tail(NS, skb2[V]) // V became in-flight // V count=...

CVE-2024-26923
In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect() Garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. If such embryo has a peer that carries SCM_RIGHTS, two consecutive passes of scan_children() may see a different set of children. Leading to an incorrectly elevated inflight count, and then a dangling pointer within the gc_inflight_list. sockets are AF_UNIX/SOCK_STREAM S is an unconnected socket L is a listening in-flight socket bound to addr, not in fdtable V's fd will be passed via sendmsg(), gets inflight count bumped connect(S, addr) sendmsg(S, [V]); close(V) __unix_gc() ---------------- ------------------------- ----------- NS = unix_create1() skb1 = sock_wmalloc(NS) L = unix_find_other(addr) unix_state_lock(L) unix_peer(S) = NS // V count=1 inflight=0 NS = unix_peer(S) skb2 = sock_alloc() skb_queue_tail(NS, skb2[V]) // V bec
CVE-2024-26923
In the Linux kernel, the following vulnerability has been resolved: a ...

SUSE-SU-2024:2853-1
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

SUSE-SU-2024:2411-1
Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5)
GHSA-8f6m-26fj-7fm5
In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect() Garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. If such embryo has a peer that carries SCM_RIGHTS, two consecutive passes of scan_children() may see a different set of children. Leading to an incorrectly elevated inflight count, and then a dangling pointer within the gc_inflight_list. sockets are AF_UNIX/SOCK_STREAM S is an unconnected socket L is a listening in-flight socket bound to addr, not in fdtable V's fd will be passed via sendmsg(), gets inflight count bumped connect(S, addr) sendmsg(S, [V]); close(V) __unix_gc() ---------------- ------------------------- ----------- NS = unix_create1() skb1 = sock_wmalloc(NS) L = unix_find_other(addr) unix_state_lock(L) unix_peer(S) = NS // V count=1 inflight=0 NS = unix_peer(S) skb2 = sock_alloc() skb_queue_tail(NS, skb2[V]) // V ...

BDU:2024-03615
Уязвимость функции __unix_gc() в модуле net/unix/garbage.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

SUSE-SU-2024:2823-1
Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4)

SUSE-SU-2024:2797-1
Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3)

SUSE-SU-2024:2480-1
Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5)

SUSE-SU-2024:2474-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5)

SUSE-SU-2024:2410-1
Security update for the Linux Kernel RT (Live Patch 14 for SLE 15 SP5)

SUSE-SU-2024:2407-1
Security update for the Linux Kernel RT (Live Patch 15 for SLE 15 SP5)

SUSE-SU-2024:3365-1
Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4)

SUSE-SU-2024:3350-1
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

SUSE-SU-2024:3319-1
Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5)

SUSE-SU-2024:2874-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2024:2852-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5)

SUSE-SU-2024:2726-1
Security update for the Linux Kernel RT (Live Patch 14 for SLE 15 SP5)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-26923 In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect() Garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. If such embryo has a peer that carries SCM_RIGHTS, two consecutive passes of scan_children() may see a different set of children. Leading to an incorrectly elevated inflight count, and then a dangling pointer within the gc_inflight_list. sockets are AF_UNIX/SOCK_STREAM S is an unconnected socket L is a listening in-flight socket bound to addr, not in fdtable V's fd will be passed via sendmsg(), gets inflight count bumped connect(S, addr) sendmsg(S, [V]); close(V) __unix_gc() ---------------- ------------------------- ----------- NS = unix_create1() skb1 = sock_wmalloc(NS) L = unix_find_other(addr) unix_state_lock(L) unix_peer(S) = NS // V count=1 inflight=0 NS = unix_peer(S) skb2 = sock_alloc() skb_queue_tail(NS, skb2[V]) // V became in-flight // V co... | 0% Низкий | около 1 года назад | |
![]() | CVE-2024-26923 In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect() Garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. If such embryo has a peer that carries SCM_RIGHTS, two consecutive passes of scan_children() may see a different set of children. Leading to an incorrectly elevated inflight count, and then a dangling pointer within the gc_inflight_list. sockets are AF_UNIX/SOCK_STREAM S is an unconnected socket L is a listening in-flight socket bound to addr, not in fdtable V's fd will be passed via sendmsg(), gets inflight count bumped connect(S, addr)sendmsg(S, [V]); close(V)__unix_gc() ---------------------------------------------------- NS = unix_create1() skb1 = sock_wmalloc(NS) L = unix_find_other(addr) unix_state_lock(L) unix_peer(S) = NS // V count=1 inflight=0 NS = unix_peer(S) skb2 = sock_alloc() skb_queue_tail(NS, skb2[V]) // V became in-flight // V count=... | CVSS3: 7 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-26923 In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect() Garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. If such embryo has a peer that carries SCM_RIGHTS, two consecutive passes of scan_children() may see a different set of children. Leading to an incorrectly elevated inflight count, and then a dangling pointer within the gc_inflight_list. sockets are AF_UNIX/SOCK_STREAM S is an unconnected socket L is a listening in-flight socket bound to addr, not in fdtable V's fd will be passed via sendmsg(), gets inflight count bumped connect(S, addr) sendmsg(S, [V]); close(V) __unix_gc() ---------------- ------------------------- ----------- NS = unix_create1() skb1 = sock_wmalloc(NS) L = unix_find_other(addr) unix_state_lock(L) unix_peer(S) = NS // V count=1 inflight=0 NS = unix_peer(S) skb2 = sock_alloc() skb_queue_tail(NS, skb2[V]) // V bec | 0% Низкий | около 1 года назад | |
CVE-2024-26923 In the Linux kernel, the following vulnerability has been resolved: a ... | 0% Низкий | около 1 года назад | ||
![]() | SUSE-SU-2024:2853-1 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) | 0% Низкий | 10 месяцев назад | |
![]() | SUSE-SU-2024:2411-1 Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5) | 0% Низкий | 11 месяцев назад | |
GHSA-8f6m-26fj-7fm5 In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect() Garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. If such embryo has a peer that carries SCM_RIGHTS, two consecutive passes of scan_children() may see a different set of children. Leading to an incorrectly elevated inflight count, and then a dangling pointer within the gc_inflight_list. sockets are AF_UNIX/SOCK_STREAM S is an unconnected socket L is a listening in-flight socket bound to addr, not in fdtable V's fd will be passed via sendmsg(), gets inflight count bumped connect(S, addr) sendmsg(S, [V]); close(V) __unix_gc() ---------------- ------------------------- ----------- NS = unix_create1() skb1 = sock_wmalloc(NS) L = unix_find_other(addr) unix_state_lock(L) unix_peer(S) = NS // V count=1 inflight=0 NS = unix_peer(S) skb2 = sock_alloc() skb_queue_tail(NS, skb2[V]) // V ... | 0% Низкий | около 1 года назад | ||
![]() | BDU:2024-03615 Уязвимость функции __unix_gc() в модуле net/unix/garbage.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7 | 0% Низкий | около 1 года назад |
![]() | SUSE-SU-2024:2823-1 Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4) | 10 месяцев назад | ||
![]() | SUSE-SU-2024:2797-1 Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2480-1 Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2474-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2410-1 Security update for the Linux Kernel RT (Live Patch 14 for SLE 15 SP5) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2407-1 Security update for the Linux Kernel RT (Live Patch 15 for SLE 15 SP5) | 11 месяцев назад | ||
![]() | SUSE-SU-2024:3365-1 Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3350-1 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3319-1 Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:2874-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 10 месяцев назад | ||
![]() | SUSE-SU-2024:2852-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) | 10 месяцев назад | ||
![]() | SUSE-SU-2024:2726-1 Security update for the Linux Kernel RT (Live Patch 14 for SLE 15 SP5) | 11 месяцев назад |
Уязвимостей на страницу