Количество 123
Количество 123

CVE-2024-40954
In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe calling the bpf_get_socket_cookie() helper * running traceroute -I 1.1.1.1 on a freshly booted VM A KASAN enabled kernel will log something like below (decoded and stripped): ================================================================== BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Read of size 8 at addr ffff888007110dd8 by task traceroute/299 CPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> dump_stack_lvl (lib/dump_stack.c:...

CVE-2024-40954
In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe calling the bpf_get_socket_cookie() helper * running traceroute -I 1.1.1.1 on a freshly booted VM A KASAN enabled kernel will log something like below (decoded and stripped): ================================================================== BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Read of size 8 at addr ffff888007110dd8 by task traceroute/299 CPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> dump_stack_lvl (lib/dump_stack.c:117 ...

CVE-2024-40954
In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe calling the bpf_get_socket_cookie() helper * running traceroute -I 1.1.1.1 on a freshly booted VM A KASAN enabled kernel will log something like below (decoded and stripped): ================================================================== BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Read of size 8 at addr ffff888007110dd8 by task traceroute/299 CPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> dump_stack_lvl (lib/dump_st
CVE-2024-40954
In the Linux kernel, the following vulnerability has been resolved: n ...
GHSA-68p8-jjxw-w2v4
In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe calling the bpf_get_socket_cookie() helper * running traceroute -I 1.1.1.1 on a freshly booted VM A KASAN enabled kernel will log something like below (decoded and stripped): ================================================================== BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Read of size 8 at addr ffff888007110dd8 by task traceroute/299 CPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> dump_stack_lvl (lib/dump...

BDU:2024-08227
Уязвимость функции sk_common_release() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

SUSE-SU-2024:3708-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)

SUSE-SU-2024:3707-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

SUSE-SU-2024:3680-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

SUSE-SU-2024:3626-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

SUSE-SU-2024:3884-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)

SUSE-SU-2024:3836-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

SUSE-SU-2024:3835-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

SUSE-SU-2024:3627-1
Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5)

SUSE-SU-2024:4262-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

SUSE-SU-2024:3882-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)

SUSE-SU-2024:3881-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

SUSE-SU-2024:3856-1
Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5)

SUSE-SU-2024:3628-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2024:4210-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-40954 In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe calling the bpf_get_socket_cookie() helper * running traceroute -I 1.1.1.1 on a freshly booted VM A KASAN enabled kernel will log something like below (decoded and stripped): ================================================================== BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Read of size 8 at addr ffff888007110dd8 by task traceroute/299 CPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> dump_stack_lvl (lib/dump_stack.c:... | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад |
![]() | CVE-2024-40954 In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe calling the bpf_get_socket_cookie() helper * running traceroute -I 1.1.1.1 on a freshly booted VM A KASAN enabled kernel will log something like below (decoded and stripped): ================================================================== BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Read of size 8 at addr ffff888007110dd8 by task traceroute/299 CPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> dump_stack_lvl (lib/dump_stack.c:117 ... | CVSS3: 5.5 | 0% Низкий | 11 месяцев назад |
![]() | CVE-2024-40954 In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe calling the bpf_get_socket_cookie() helper * running traceroute -I 1.1.1.1 on a freshly booted VM A KASAN enabled kernel will log something like below (decoded and stripped): ================================================================== BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Read of size 8 at addr ffff888007110dd8 by task traceroute/299 CPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> dump_stack_lvl (lib/dump_st | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад |
CVE-2024-40954 In the Linux kernel, the following vulnerability has been resolved: n ... | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад | |
GHSA-68p8-jjxw-w2v4 In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe calling the bpf_get_socket_cookie() helper * running traceroute -I 1.1.1.1 on a freshly booted VM A KASAN enabled kernel will log something like below (decoded and stripped): ================================================================== BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Read of size 8 at addr ffff888007110dd8 by task traceroute/299 CPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: <TASK> dump_stack_lvl (lib/dump... | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад | |
![]() | BDU:2024-08227 Уязвимость функции sk_common_release() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7.8 | 0% Низкий | 12 месяцев назад |
![]() | SUSE-SU-2024:3708-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3707-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3680-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3626-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3884-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3836-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3835-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3627-1 Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:4262-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) | 6 месяцев назад | ||
![]() | SUSE-SU-2024:3882-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3881-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3856-1 Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3628-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:4210-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6) | 7 месяцев назад |
Уязвимостей на страницу