Количество 88
Количество 88

CVE-2024-36904
In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique() with nice analysis. Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket's sk_refcnt after putting it into ehash and releasing the bucket lock. Thus, there is a small race window where other threads could try to reuse the port during connect() and call sock_hold() in tcp_twsk_unique() for the TIME-WAIT socket with zero refcnt. If that happens, the refcnt taken by tcp_twsk_unique() is overwritten and sock_put() will cause underflow, triggering a real use-after-free somewhere else. To avoid the use-after-free, we need to use refcount_inc_not_zero() in tcp_twsk_unique() and give up on reusing the port if it returns false. [0]: refcount_t: addition on 0; use-after-free. WARNING: CPU: 0 PID: 1039313 at lib/refcount...

CVE-2024-36904
In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique() with nice analysis. Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket's sk_refcnt after putting it into ehash and releasing the bucket lock. Thus, there is a small race window where other threads could try to reuse the port during connect() and call sock_hold() in tcp_twsk_unique() for the TIME-WAIT socket with zero refcnt. If that happens, the refcnt taken by tcp_twsk_unique() is overwritten and sock_put() will cause underflow, triggering a real use-after-free somewhere else. To avoid the use-after-free, we need to use refcount_inc_not_zero() in tcp_twsk_unique() and give up on reusing the port if it returns false. [0]: refcount_t: addition on 0; use-after-free. WARNING: CPU: 0 PID: 1039313 at lib/refcount...

CVE-2024-36904
In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique() with nice analysis. Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket's sk_refcnt after putting it into ehash and releasing the bucket lock. Thus, there is a small race window where other threads could try to reuse the port during connect() and call sock_hold() in tcp_twsk_unique() for the TIME-WAIT socket with zero refcnt. If that happens, the refcnt taken by tcp_twsk_unique() is overwritten and sock_put() will cause underflow, triggering a real use-after-free somewhere else. To avoid the use-after-free, we need to use refcount_inc_not_zero() in tcp_twsk_unique() and give up on reusing the port if it returns false. [0]: refcount_t: addition on 0; use-after-free. WARNING: CPU: 0 PID: 1039313 at lib/refc
CVE-2024-36904
In the Linux kernel, the following vulnerability has been resolved: t ...

BDU:2024-04557
Уязвимость функции tcp_twsk_unique() реализации протокола IPv4 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

SUSE-SU-2024:4276-1
Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4)

SUSE-SU-2024:4265-1
Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4)

SUSE-SU-2024:4241-1
Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP2)

SUSE-SU-2024:4230-1
Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3)

SUSE-SU-2024:4179-1
Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP3)

SUSE-SU-2024:4177-1
Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3)

SUSE-SU-2024:4217-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2024:4129-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2024:4227-1
Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)

SUSE-SU-2024:4220-1
Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5)

SUSE-SU-2024:4206-1
Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)

SUSE-SU-2024:4141-1
Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5)

SUSE-SU-2024:4120-1
Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5)

SUSE-SU-2024:4208-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

SUSE-SU-2025:0187-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-36904 In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique() with nice analysis. Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket's sk_refcnt after putting it into ehash and releasing the bucket lock. Thus, there is a small race window where other threads could try to reuse the port during connect() and call sock_hold() in tcp_twsk_unique() for the TIME-WAIT socket with zero refcnt. If that happens, the refcnt taken by tcp_twsk_unique() is overwritten and sock_put() will cause underflow, triggering a real use-after-free somewhere else. To avoid the use-after-free, we need to use refcount_inc_not_zero() in tcp_twsk_unique() and give up on reusing the port if it returns false. [0]: refcount_t: addition on 0; use-after-free. WARNING: CPU: 0 PID: 1039313 at lib/refcount... | 1% Низкий | около 1 года назад | |
![]() | CVE-2024-36904 In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique() with nice analysis. Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket's sk_refcnt after putting it into ehash and releasing the bucket lock. Thus, there is a small race window where other threads could try to reuse the port during connect() and call sock_hold() in tcp_twsk_unique() for the TIME-WAIT socket with zero refcnt. If that happens, the refcnt taken by tcp_twsk_unique() is overwritten and sock_put() will cause underflow, triggering a real use-after-free somewhere else. To avoid the use-after-free, we need to use refcount_inc_not_zero() in tcp_twsk_unique() and give up on reusing the port if it returns false. [0]: refcount_t: addition on 0; use-after-free. WARNING: CPU: 0 PID: 1039313 at lib/refcount... | CVSS3: 7 | 1% Низкий | около 1 года назад |
![]() | CVE-2024-36904 In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique() with nice analysis. Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket's sk_refcnt after putting it into ehash and releasing the bucket lock. Thus, there is a small race window where other threads could try to reuse the port during connect() and call sock_hold() in tcp_twsk_unique() for the TIME-WAIT socket with zero refcnt. If that happens, the refcnt taken by tcp_twsk_unique() is overwritten and sock_put() will cause underflow, triggering a real use-after-free somewhere else. To avoid the use-after-free, we need to use refcount_inc_not_zero() in tcp_twsk_unique() and give up on reusing the port if it returns false. [0]: refcount_t: addition on 0; use-after-free. WARNING: CPU: 0 PID: 1039313 at lib/refc | 1% Низкий | около 1 года назад | |
CVE-2024-36904 In the Linux kernel, the following vulnerability has been resolved: t ... | 1% Низкий | около 1 года назад | ||
![]() | BDU:2024-04557 Уязвимость функции tcp_twsk_unique() реализации протокола IPv4 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 6.6 | 1% Низкий | около 1 года назад |
![]() | SUSE-SU-2024:4276-1 Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4) | 6 месяцев назад | ||
![]() | SUSE-SU-2024:4265-1 Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4) | 6 месяцев назад | ||
![]() | SUSE-SU-2024:4241-1 Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP2) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4230-1 Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4179-1 Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP3) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4177-1 Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4217-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4129-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4227-1 Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4220-1 Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4206-1 Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4141-1 Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4120-1 Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5) | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4208-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) | 7 месяцев назад | ||
![]() | SUSE-SU-2025:0187-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) | 5 месяцев назад |
Уязвимостей на страницу