Логотип exploitDog
bind:CVE-2024-36899
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-36899

Количество 99

Количество 99

ubuntu логотип

CVE-2024-36899

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Fix use after free in lineinfo_changed_notify The use-after-free issue occurs as follows: when the GPIO chip device file is being closed by invoking gpio_chrdev_release(), watched_lines is freed by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier chain failed due to waiting write rwsem. Additionally, one of the GPIO chip's lines is also in the release process and holds the notifier chain's read rwsem. Consequently, a race condition leads to the use-after-free of watched_lines. Here is the typical stack when issue happened: [free] gpio_chrdev_release() --> bitmap_free(cdev->watched_lines) <-- freed --> blocking_notifier_chain_unregister() --> down_write(&nh->rwsem) <-- waiting rwsem --> __down_write_common() --> rwsem_down_write_slowpath() --> schedule_preempt_disabled() --> schedule() [use] st54spi_gpio_dev_release() --> gpio_free() --> gpiod_free() --> gpiod_free_commit() --> gpi...

CVSS3: 7
EPSS: Низкий
redhat логотип

CVE-2024-36899

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Fix use after free in lineinfo_changed_notify The use-after-free issue occurs as follows: when the GPIO chip device file is being closed by invoking gpio_chrdev_release(), watched_lines is freed by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier chain failed due to waiting write rwsem. Additionally, one of the GPIO chip's lines is also in the release process and holds the notifier chain's read rwsem. Consequently, a race condition leads to the use-after-free of watched_lines. Here is the typical stack when issue happened: [free] gpio_chrdev_release() --> bitmap_free(cdev->watched_lines) <-- freed --> blocking_notifier_chain_unregister() --> down_write(&nh->rwsem) <-- waiting rwsem --> __down_write_common() --> rwsem_down_write_slowpath() --> schedule_preempt_disabled() --> schedule() [use] st54spi_gpio_dev_release() --> gpio_free() --> gp...

CVSS3: 6.7
EPSS: Низкий
nvd логотип

CVE-2024-36899

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Fix use after free in lineinfo_changed_notify The use-after-free issue occurs as follows: when the GPIO chip device file is being closed by invoking gpio_chrdev_release(), watched_lines is freed by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier chain failed due to waiting write rwsem. Additionally, one of the GPIO chip's lines is also in the release process and holds the notifier chain's read rwsem. Consequently, a race condition leads to the use-after-free of watched_lines. Here is the typical stack when issue happened: [free] gpio_chrdev_release() --> bitmap_free(cdev->watched_lines) <-- freed --> blocking_notifier_chain_unregister() --> down_write(&nh->rwsem) <-- waiting rwsem --> __down_write_common() --> rwsem_down_write_slowpath() --> schedule_preempt_disabled() -

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2024-36899

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: g ...

CVSS3: 7
EPSS: Низкий
fstec логотип

BDU:2024-04554

около 1 года назад

Уязвимость функции gpio_chrdev_release() драйвера gpio ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3680-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3881-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3628-1

8 месяцев назад

Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3706-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3670-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3655-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3643-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3638-1

8 месяцев назад

Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3635-1

8 месяцев назад

Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3624-1

8 месяцев назад

Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3702-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3666-1

8 месяцев назад

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3636-1

8 месяцев назад

Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4208-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0187-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-36899

In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Fix use after free in lineinfo_changed_notify The use-after-free issue occurs as follows: when the GPIO chip device file is being closed by invoking gpio_chrdev_release(), watched_lines is freed by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier chain failed due to waiting write rwsem. Additionally, one of the GPIO chip's lines is also in the release process and holds the notifier chain's read rwsem. Consequently, a race condition leads to the use-after-free of watched_lines. Here is the typical stack when issue happened: [free] gpio_chrdev_release() --> bitmap_free(cdev->watched_lines) <-- freed --> blocking_notifier_chain_unregister() --> down_write(&nh->rwsem) <-- waiting rwsem --> __down_write_common() --> rwsem_down_write_slowpath() --> schedule_preempt_disabled() --> schedule() [use] st54spi_gpio_dev_release() --> gpio_free() --> gpiod_free() --> gpiod_free_commit() --> gpi...

CVSS3: 7
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-36899

In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Fix use after free in lineinfo_changed_notify The use-after-free issue occurs as follows: when the GPIO chip device file is being closed by invoking gpio_chrdev_release(), watched_lines is freed by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier chain failed due to waiting write rwsem. Additionally, one of the GPIO chip's lines is also in the release process and holds the notifier chain's read rwsem. Consequently, a race condition leads to the use-after-free of watched_lines. Here is the typical stack when issue happened: [free] gpio_chrdev_release() --> bitmap_free(cdev->watched_lines) <-- freed --> blocking_notifier_chain_unregister() --> down_write(&nh->rwsem) <-- waiting rwsem --> __down_write_common() --> rwsem_down_write_slowpath() --> schedule_preempt_disabled() --> schedule() [use] st54spi_gpio_dev_release() --> gpio_free() --> gp...

CVSS3: 6.7
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-36899

In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Fix use after free in lineinfo_changed_notify The use-after-free issue occurs as follows: when the GPIO chip device file is being closed by invoking gpio_chrdev_release(), watched_lines is freed by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier chain failed due to waiting write rwsem. Additionally, one of the GPIO chip's lines is also in the release process and holds the notifier chain's read rwsem. Consequently, a race condition leads to the use-after-free of watched_lines. Here is the typical stack when issue happened: [free] gpio_chrdev_release() --> bitmap_free(cdev->watched_lines) <-- freed --> blocking_notifier_chain_unregister() --> down_write(&nh->rwsem) <-- waiting rwsem --> __down_write_common() --> rwsem_down_write_slowpath() --> schedule_preempt_disabled() -

CVSS3: 7
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-36899

In the Linux kernel, the following vulnerability has been resolved: g ...

CVSS3: 7
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-04554

Уязвимость функции gpio_chrdev_release() драйвера gpio ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3680-1

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3881-1

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3628-1

Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3706-1

Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3670-1

Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3655-1

Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3643-1

Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP4)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3638-1

Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP5)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3635-1

Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3624-1

Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3702-1

Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3666-1

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3636-1

Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4208-1

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0187-1

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

5 месяцев назад

Уязвимостей на страницу