Количество 13
Количество 13

CVE-2024-36890
In the Linux kernel, the following vulnerability has been resolved: mm/slab: make __free(kfree) accept error pointers Currently, if an automatically freed allocation is an error pointer that will lead to a crash. An example of this is in wm831x_gpio_dbg_show(). 171 char *label __free(kfree) = gpiochip_dup_line_label(chip, i); 172 if (IS_ERR(label)) { 173 dev_err(wm831x->dev, "Failed to duplicate label\n"); 174 continue; 175 } The auto clean up function should check for error pointers as well, otherwise we're going to keep hitting issues like this.

CVE-2024-36890
In the Linux kernel, the following vulnerability has been resolved: mm/slab: make __free(kfree) accept error pointers Currently, if an automatically freed allocation is an error pointer that will lead to a crash. An example of this is in wm831x_gpio_dbg_show(). 171char *label __free(kfree) = gpiochip_dup_line_label(chip, i); 172if (IS_ERR(label)) { 173dev_err(wm831x->dev, "Failed to duplicate label\n"); 174continue; 175 } The auto clean up function should check for error pointers as well, otherwise we're going to keep hitting issues like this.

CVE-2024-36890
In the Linux kernel, the following vulnerability has been resolved: mm/slab: make __free(kfree) accept error pointers Currently, if an automatically freed allocation is an error pointer that will lead to a crash. An example of this is in wm831x_gpio_dbg_show(). 171 char *label __free(kfree) = gpiochip_dup_line_label(chip, i); 172 if (IS_ERR(label)) { 173 dev_err(wm831x->dev, "Failed to duplicate label\n"); 174 continue; 175 } The auto clean up function should check for error pointers as well, otherwise we're going to keep hitting issues like this.
CVE-2024-36890
In the Linux kernel, the following vulnerability has been resolved: m ...

BDU:2024-10705
Уязвимость компонентов mm/slab ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2024-12682
ELSA-2024-12682: Unbreakable Enterprise kernel security update (IMPORTANT)

ROS-20241127-03
Множественные уязвимости kernel-lt

SUSE-SU-2024:2394-1
Security update for the Linux Kernel

SUSE-SU-2024:2372-1
Security update for the Linux Kernel

SUSE-SU-2024:2203-1
Security update for the Linux Kernel

SUSE-SU-2024:2135-1
Security update for the Linux Kernel

SUSE-SU-2024:2939-1
Security update for the Linux Kernel

SUSE-SU-2024:2973-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-36890 In the Linux kernel, the following vulnerability has been resolved: mm/slab: make __free(kfree) accept error pointers Currently, if an automatically freed allocation is an error pointer that will lead to a crash. An example of this is in wm831x_gpio_dbg_show(). 171 char *label __free(kfree) = gpiochip_dup_line_label(chip, i); 172 if (IS_ERR(label)) { 173 dev_err(wm831x->dev, "Failed to duplicate label\n"); 174 continue; 175 } The auto clean up function should check for error pointers as well, otherwise we're going to keep hitting issues like this. | 0% Низкий | около 1 года назад | |
![]() | CVE-2024-36890 In the Linux kernel, the following vulnerability has been resolved: mm/slab: make __free(kfree) accept error pointers Currently, if an automatically freed allocation is an error pointer that will lead to a crash. An example of this is in wm831x_gpio_dbg_show(). 171char *label __free(kfree) = gpiochip_dup_line_label(chip, i); 172if (IS_ERR(label)) { 173dev_err(wm831x->dev, "Failed to duplicate label\n"); 174continue; 175 } The auto clean up function should check for error pointers as well, otherwise we're going to keep hitting issues like this. | CVSS3: 5.5 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-36890 In the Linux kernel, the following vulnerability has been resolved: mm/slab: make __free(kfree) accept error pointers Currently, if an automatically freed allocation is an error pointer that will lead to a crash. An example of this is in wm831x_gpio_dbg_show(). 171 char *label __free(kfree) = gpiochip_dup_line_label(chip, i); 172 if (IS_ERR(label)) { 173 dev_err(wm831x->dev, "Failed to duplicate label\n"); 174 continue; 175 } The auto clean up function should check for error pointers as well, otherwise we're going to keep hitting issues like this. | 0% Низкий | около 1 года назад | |
CVE-2024-36890 In the Linux kernel, the following vulnerability has been resolved: m ... | 0% Низкий | около 1 года назад | ||
![]() | BDU:2024-10705 Уязвимость компонентов mm/slab ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | около 1 года назад |
ELSA-2024-12682 ELSA-2024-12682: Unbreakable Enterprise kernel security update (IMPORTANT) | 9 месяцев назад | |||
![]() | ROS-20241127-03 Множественные уязвимости kernel-lt | CVSS3: 7.8 | 7 месяцев назад | |
![]() | SUSE-SU-2024:2394-1 Security update for the Linux Kernel | 11 месяцев назад | ||
![]() | SUSE-SU-2024:2372-1 Security update for the Linux Kernel | 12 месяцев назад | ||
![]() | SUSE-SU-2024:2203-1 Security update for the Linux Kernel | 12 месяцев назад | ||
![]() | SUSE-SU-2024:2135-1 Security update for the Linux Kernel | 12 месяцев назад | ||
![]() | SUSE-SU-2024:2939-1 Security update for the Linux Kernel | 10 месяцев назад | ||
![]() | SUSE-SU-2024:2973-1 Security update for the Linux Kernel | 10 месяцев назад |
Уязвимостей на страницу