Логотип exploitDog
bind:CVE-2024-47674
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-47674

Количество 41

Количество 41

ubuntu логотип

CVE-2024-47674

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2024-47674

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2024-47674

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2024-47674

больше 1 года назад

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2024-47674

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: m ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-qjwp-794r-6x7v

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2025-00021

больше 1 года назад

Уязвимость функции remap_pfn_range_notrack() в модуле mm/memory.c подсистемы управления памятью ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
oracle-oval логотип

ELSA-2024-12845

около 1 года назад

ELSA-2024-12845: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03135-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12830

около 1 года назад

ELSA-2024-12830: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03190-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03181-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03175-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03156-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03130-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03124-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03191-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03186-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12796

больше 1 года назад

ELSA-2024-12796: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03226-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-47674

In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVSS3: 5.5
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-47674

In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVSS3: 5.5
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-47674

In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVSS3: 5.5
0%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 5.5
0%
Низкий
больше 1 года назад
debian логотип
CVE-2024-47674

In the Linux kernel, the following vulnerability has been resolved: m ...

CVSS3: 5.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-qjwp-794r-6x7v

In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

CVSS3: 5.5
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2025-00021

Уязвимость функции remap_pfn_range_notrack() в модуле mm/memory.c подсистемы управления памятью ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
больше 1 года назад
oracle-oval логотип
ELSA-2024-12845

ELSA-2024-12845: Unbreakable Enterprise kernel security update (IMPORTANT)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:03135-1

Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5)

5 месяцев назад
oracle-oval логотип
ELSA-2024-12830

ELSA-2024-12830: Unbreakable Enterprise kernel security update (IMPORTANT)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:03190-1

Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03181-1

Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03175-1

Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03156-1

Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03130-1

Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03124-1

Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03191-1

Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03186-1

Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5)

5 месяцев назад
oracle-oval логотип
ELSA-2024-12796

ELSA-2024-12796: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2025:03226-1

Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6)

5 месяцев назад

Уязвимостей на страницу