Количество 99
Количество 99

CVE-2024-36899
In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Fix use after free in lineinfo_changed_notify The use-after-free issue occurs as follows: when the GPIO chip device file is being closed by invoking gpio_chrdev_release(), watched_lines is freed by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier chain failed due to waiting write rwsem. Additionally, one of the GPIO chip's lines is also in the release process and holds the notifier chain's read rwsem. Consequently, a race condition leads to the use-after-free of watched_lines. Here is the typical stack when issue happened: [free] gpio_chrdev_release() --> bitmap_free(cdev->watched_lines) <-- freed --> blocking_notifier_chain_unregister() --> down_write(&nh->rwsem) <-- waiting rwsem --> __down_write_common() --> rwsem_down_write_slowpath() --> schedule_preempt_disabled() --> schedule() [use] st54spi_gpio_dev_release() --> gpio_free() --> gpiod_free() --> gpiod_free_commit() --> gpi...

CVE-2024-36899
In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Fix use after free in lineinfo_changed_notify The use-after-free issue occurs as follows: when the GPIO chip device file is being closed by invoking gpio_chrdev_release(), watched_lines is freed by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier chain failed due to waiting write rwsem. Additionally, one of the GPIO chip's lines is also in the release process and holds the notifier chain's read rwsem. Consequently, a race condition leads to the use-after-free of watched_lines. Here is the typical stack when issue happened: [free] gpio_chrdev_release() --> bitmap_free(cdev->watched_lines) <-- freed --> blocking_notifier_chain_unregister() --> down_write(&nh->rwsem) <-- waiting rwsem --> __down_write_common() --> rwsem_down_write_slowpath() --> schedule_preempt_disabled() --> schedule() [use] st54spi_gpio_dev_release() --> gpio_free() --> gp...

CVE-2024-36899
In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Fix use after free in lineinfo_changed_notify The use-after-free issue occurs as follows: when the GPIO chip device file is being closed by invoking gpio_chrdev_release(), watched_lines is freed by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier chain failed due to waiting write rwsem. Additionally, one of the GPIO chip's lines is also in the release process and holds the notifier chain's read rwsem. Consequently, a race condition leads to the use-after-free of watched_lines. Here is the typical stack when issue happened: [free] gpio_chrdev_release() --> bitmap_free(cdev->watched_lines) <-- freed --> blocking_notifier_chain_unregister() --> down_write(&nh->rwsem) <-- waiting rwsem --> __down_write_common() --> rwsem_down_write_slowpath() --> schedule_preempt_disabled() -
CVE-2024-36899
In the Linux kernel, the following vulnerability has been resolved: g ...

BDU:2024-04554
Уязвимость функции gpio_chrdev_release() драйвера gpio ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

SUSE-SU-2024:3680-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

SUSE-SU-2024:3881-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

SUSE-SU-2024:3628-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2024:3706-1
Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5)

SUSE-SU-2024:3670-1
Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)

SUSE-SU-2024:3655-1
Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5)

SUSE-SU-2024:3643-1
Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP4)

SUSE-SU-2024:3638-1
Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP5)

SUSE-SU-2024:3635-1
Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5)

SUSE-SU-2024:3624-1
Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5)

SUSE-SU-2024:3702-1
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

SUSE-SU-2024:3666-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2024:3636-1
Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5)

SUSE-SU-2024:4208-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

SUSE-SU-2025:0187-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-36899 In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Fix use after free in lineinfo_changed_notify The use-after-free issue occurs as follows: when the GPIO chip device file is being closed by invoking gpio_chrdev_release(), watched_lines is freed by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier chain failed due to waiting write rwsem. Additionally, one of the GPIO chip's lines is also in the release process and holds the notifier chain's read rwsem. Consequently, a race condition leads to the use-after-free of watched_lines. Here is the typical stack when issue happened: [free] gpio_chrdev_release() --> bitmap_free(cdev->watched_lines) <-- freed --> blocking_notifier_chain_unregister() --> down_write(&nh->rwsem) <-- waiting rwsem --> __down_write_common() --> rwsem_down_write_slowpath() --> schedule_preempt_disabled() --> schedule() [use] st54spi_gpio_dev_release() --> gpio_free() --> gpiod_free() --> gpiod_free_commit() --> gpi... | CVSS3: 7 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-36899 In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Fix use after free in lineinfo_changed_notify The use-after-free issue occurs as follows: when the GPIO chip device file is being closed by invoking gpio_chrdev_release(), watched_lines is freed by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier chain failed due to waiting write rwsem. Additionally, one of the GPIO chip's lines is also in the release process and holds the notifier chain's read rwsem. Consequently, a race condition leads to the use-after-free of watched_lines. Here is the typical stack when issue happened: [free] gpio_chrdev_release() --> bitmap_free(cdev->watched_lines) <-- freed --> blocking_notifier_chain_unregister() --> down_write(&nh->rwsem) <-- waiting rwsem --> __down_write_common() --> rwsem_down_write_slowpath() --> schedule_preempt_disabled() --> schedule() [use] st54spi_gpio_dev_release() --> gpio_free() --> gp... | CVSS3: 6.7 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-36899 In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Fix use after free in lineinfo_changed_notify The use-after-free issue occurs as follows: when the GPIO chip device file is being closed by invoking gpio_chrdev_release(), watched_lines is freed by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier chain failed due to waiting write rwsem. Additionally, one of the GPIO chip's lines is also in the release process and holds the notifier chain's read rwsem. Consequently, a race condition leads to the use-after-free of watched_lines. Here is the typical stack when issue happened: [free] gpio_chrdev_release() --> bitmap_free(cdev->watched_lines) <-- freed --> blocking_notifier_chain_unregister() --> down_write(&nh->rwsem) <-- waiting rwsem --> __down_write_common() --> rwsem_down_write_slowpath() --> schedule_preempt_disabled() - | CVSS3: 7 | 0% Низкий | около 1 года назад |
CVE-2024-36899 In the Linux kernel, the following vulnerability has been resolved: g ... | CVSS3: 7 | 0% Низкий | около 1 года назад | |
![]() | BDU:2024-04554 Уязвимость функции gpio_chrdev_release() драйвера gpio ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7 | 0% Низкий | около 1 года назад |
![]() | SUSE-SU-2024:3680-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3881-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3628-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3706-1 Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3670-1 Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3655-1 Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3643-1 Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP4) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3638-1 Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP5) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3635-1 Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3624-1 Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3702-1 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3666-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3636-1 Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:4208-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) | 7 месяцев назад | ||
![]() | SUSE-SU-2025:0187-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) | 5 месяцев назад |
Уязвимостей на страницу