Количество 35
Количество 35

CVE-2024-47684
In the Linux kernel, the following vulnerability has been resolved: tcp: check skb is non-NULL in tcp_rto_delta_us() We have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic kernel that are running ceph and recently hit a null ptr dereference in tcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also saw it getting hit from the RACK case as well. Here are examples of the oops messages we saw in each of those cases: Jul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020 Jul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode Jul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page Jul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0 Jul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI Jul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu Jul 26 15:05:02 rx [11061395.81499...

CVE-2024-47684
In the Linux kernel, the following vulnerability has been resolved: tcp: check skb is non-NULL in tcp_rto_delta_us() We have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic kernel that are running ceph and recently hit a null ptr dereference in tcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also saw it getting hit from the RACK case as well. Here are examples of the oops messages we saw in each of those cases: Jul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020 Jul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode Jul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page Jul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0 Jul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI Jul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu Jul 26 15:05:02 rx [11061395.814996] ...

CVE-2024-47684
In the Linux kernel, the following vulnerability has been resolved: tcp: check skb is non-NULL in tcp_rto_delta_us() We have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic kernel that are running ceph and recently hit a null ptr dereference in tcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also saw it getting hit from the RACK case as well. Here are examples of the oops messages we saw in each of those cases: Jul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020 Jul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode Jul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page Jul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0 Jul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI Jul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu Jul 26 15:05:02 rx [11061395.814996]

CVE-2024-47684
CVE-2024-47684
In the Linux kernel, the following vulnerability has been resolved: t ...
GHSA-9pmf-47vc-x2x8
In the Linux kernel, the following vulnerability has been resolved: tcp: check skb is non-NULL in tcp_rto_delta_us() We have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic kernel that are running ceph and recently hit a null ptr dereference in tcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also saw it getting hit from the RACK case as well. Here are examples of the oops messages we saw in each of those cases: Jul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020 Jul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode Jul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page Jul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0 Jul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI Jul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu Jul 26 15:05:02 rx [11061395.81499...

BDU:2025-03297
Уязвимость компонента tcp ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2025:0494-1
Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5)

SUSE-SU-2025:0476-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)

SUSE-SU-2025:0452-1
Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)

SUSE-SU-2025:0440-1
Security update for the Linux Kernel (Live Patch 52 for SLE 12 SP5)

SUSE-SU-2025:0426-1
Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6)

SUSE-SU-2025:0410-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2025:0487-1
Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)

SUSE-SU-2025:0486-1
Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4)

SUSE-SU-2025:0465-1
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

SUSE-SU-2025:0449-1
Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)

SUSE-SU-2025:0489-1
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5)

SUSE-SU-2025:0462-1
Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)

SUSE-SU-2025:0455-1
Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP4)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-47684 In the Linux kernel, the following vulnerability has been resolved: tcp: check skb is non-NULL in tcp_rto_delta_us() We have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic kernel that are running ceph and recently hit a null ptr dereference in tcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also saw it getting hit from the RACK case as well. Here are examples of the oops messages we saw in each of those cases: Jul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020 Jul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode Jul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page Jul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0 Jul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI Jul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu Jul 26 15:05:02 rx [11061395.81499... | CVSS3: 5.5 | 0% Низкий | 8 месяцев назад |
![]() | CVE-2024-47684 In the Linux kernel, the following vulnerability has been resolved: tcp: check skb is non-NULL in tcp_rto_delta_us() We have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic kernel that are running ceph and recently hit a null ptr dereference in tcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also saw it getting hit from the RACK case as well. Here are examples of the oops messages we saw in each of those cases: Jul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020 Jul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode Jul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page Jul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0 Jul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI Jul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu Jul 26 15:05:02 rx [11061395.814996] ... | CVSS3: 5.5 | 0% Низкий | 8 месяцев назад |
![]() | CVE-2024-47684 In the Linux kernel, the following vulnerability has been resolved: tcp: check skb is non-NULL in tcp_rto_delta_us() We have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic kernel that are running ceph and recently hit a null ptr dereference in tcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also saw it getting hit from the RACK case as well. Here are examples of the oops messages we saw in each of those cases: Jul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020 Jul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode Jul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page Jul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0 Jul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI Jul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu Jul 26 15:05:02 rx [11061395.814996] | CVSS3: 5.5 | 0% Низкий | 8 месяцев назад |
![]() | CVSS3: 5.5 | 0% Низкий | 7 месяцев назад | |
CVE-2024-47684 In the Linux kernel, the following vulnerability has been resolved: t ... | CVSS3: 5.5 | 0% Низкий | 8 месяцев назад | |
GHSA-9pmf-47vc-x2x8 In the Linux kernel, the following vulnerability has been resolved: tcp: check skb is non-NULL in tcp_rto_delta_us() We have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic kernel that are running ceph and recently hit a null ptr dereference in tcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also saw it getting hit from the RACK case as well. Here are examples of the oops messages we saw in each of those cases: Jul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020 Jul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode Jul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page Jul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0 Jul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI Jul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu Jul 26 15:05:02 rx [11061395.81499... | CVSS3: 5.5 | 0% Низкий | 8 месяцев назад | |
![]() | BDU:2025-03297 Уязвимость компонента tcp ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | 9 месяцев назад |
![]() | SUSE-SU-2025:0494-1 Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0476-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0452-1 Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0440-1 Security update for the Linux Kernel (Live Patch 52 for SLE 12 SP5) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0426-1 Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0410-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0487-1 Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0486-1 Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0465-1 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0449-1 Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0489-1 Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0462-1 Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5) | 4 месяца назад | ||
![]() | SUSE-SU-2025:0455-1 Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP4) | 4 месяца назад |
Уязвимостей на страницу