Количество 28
Количество 28

CVE-2024-36974
In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided, taprio_parse_mqprio_opt() must validate it, or userspace can inject arbitrary data to the kernel, the second time taprio_change() is called. First call (with valid attributes) sets dev->num_tc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprio_parse_mqprio_opt() and bad things can happen.

CVE-2024-36974
In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided, taprio_parse_mqprio_opt() must validate it, or userspace can inject arbitrary data to the kernel, the second time taprio_change() is called. First call (with valid attributes) sets dev->num_tc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprio_parse_mqprio_opt() and bad things can happen.

CVE-2024-36974
In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided, taprio_parse_mqprio_opt() must validate it, or userspace can inject arbitrary data to the kernel, the second time taprio_change() is called. First call (with valid attributes) sets dev->num_tc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprio_parse_mqprio_opt() and bad things can happen.
CVE-2024-36974
In the Linux kernel, the following vulnerability has been resolved: n ...
GHSA-rx99-hq7r-6g3r
In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided, taprio_parse_mqprio_opt() must validate it, or userspace can inject arbitrary data to the kernel, the second time taprio_change() is called. First call (with valid attributes) sets dev->num_tc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprio_parse_mqprio_opt() and bad things can happen.

BDU:2024-06048
Уязвимость функции taprio_parse_mqprio_opt() подсистемы управления трафиком net/sched ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность и доступность защищаемой информации

SUSE-SU-2025:0669-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)

SUSE-SU-2025:0703-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5)

SUSE-SU-2025:0687-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

SUSE-SU-2025:0656-1
Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5)

SUSE-SU-2025:0709-1
Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP4)

SUSE-SU-2025:0708-1
Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)

SUSE-SU-2025:0698-1
Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

SUSE-SU-2025:0681-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2025:0652-1
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5)

SUSE-SU-2024:2923-1
Security update for the Linux Kernel

SUSE-SU-2024:2948-1
Security update for the Linux Kernel

ROS-20241129-01
Множественные уязвимости kernel-lt
ELSA-2024-12612
ELSA-2024-12612: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2024-12610
ELSA-2024-12610: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-36974 In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided, taprio_parse_mqprio_opt() must validate it, or userspace can inject arbitrary data to the kernel, the second time taprio_change() is called. First call (with valid attributes) sets dev->num_tc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprio_parse_mqprio_opt() and bad things can happen. | 0% Низкий | около 1 года назад | |
![]() | CVE-2024-36974 In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided, taprio_parse_mqprio_opt() must validate it, or userspace can inject arbitrary data to the kernel, the second time taprio_change() is called. First call (with valid attributes) sets dev->num_tc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprio_parse_mqprio_opt() and bad things can happen. | CVSS3: 6.1 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-36974 In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided, taprio_parse_mqprio_opt() must validate it, or userspace can inject arbitrary data to the kernel, the second time taprio_change() is called. First call (with valid attributes) sets dev->num_tc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprio_parse_mqprio_opt() and bad things can happen. | 0% Низкий | около 1 года назад | |
CVE-2024-36974 In the Linux kernel, the following vulnerability has been resolved: n ... | 0% Низкий | около 1 года назад | ||
GHSA-rx99-hq7r-6g3r In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided, taprio_parse_mqprio_opt() must validate it, or userspace can inject arbitrary data to the kernel, the second time taprio_change() is called. First call (with valid attributes) sets dev->num_tc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprio_parse_mqprio_opt() and bad things can happen. | 0% Низкий | около 1 года назад | ||
![]() | BDU:2024-06048 Уязвимость функции taprio_parse_mqprio_opt() подсистемы управления трафиком net/sched ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность и доступность защищаемой информации | CVSS3: 6.1 | 0% Низкий | около 1 года назад |
![]() | SUSE-SU-2025:0669-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0703-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0687-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0656-1 Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0709-1 Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP4) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0708-1 Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0698-1 Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0681-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0652-1 Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5) | 4 месяца назад | ||
![]() | SUSE-SU-2024:2923-1 Security update for the Linux Kernel | 10 месяцев назад | ||
![]() | SUSE-SU-2024:2948-1 Security update for the Linux Kernel | 10 месяцев назад | ||
![]() | ROS-20241129-01 Множественные уязвимости kernel-lt | CVSS3: 8.8 | 7 месяцев назад | |
ELSA-2024-12612 ELSA-2024-12612: Unbreakable Enterprise kernel-container security update (IMPORTANT) | 9 месяцев назад | |||
ELSA-2024-12610 ELSA-2024-12610: Unbreakable Enterprise kernel security update (IMPORTANT) | 9 месяцев назад |
Уязвимостей на страницу