Количество 29
Количество 29

CVE-2024-53125
In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7fffffff 2: w1 = w0 rewrites w1 = w0 3: if w0 < 10 goto +0 --------------> r11 = 0x2f5674a6 (r) 4: r1 >>= 32 r11 <<= 32 (r) 5: r0 = r1 r1 |= r11 (r) 6: exit; if w0 < 0xa goto pc+0 r1 >>= 32 r0 = r1 exit (or zero extension of w1 at (2) is missing for architectures that require zero extension for upper register half). The following happens w/o this patch: - r0 is marked as not a subreg at (0); - w1 is marked as subreg at (2); - w1 subreg_def is overridde...

CVE-2024-53125
In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7fffffff 2: w1 = w0 rewrites w1 = w0 3: if w0 < 10 goto +0 --------------> r11 = 0x2f5674a6 (r) 4: r1 >>= 32 r11 <<= 32 (r) 5: r0 = r1 r1 |= r11 (r) 6: exit; if w0 < 0xa goto pc+0 r1 >>= 32 r0 = r1 exit (or zero extension of w1 at (2) is missing for architectures that require zero extension for upper register half). The following happens w/o this patch: - r0 is marked as not a subreg at (0); - w1 is marked as subreg at (2); - w1 subreg_def is overridde...

CVE-2024-53125
In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7fffffff 2: w1 = w0 rewrites w1 = w0 3: if w0 < 10 goto +0 --------------> r11 = 0x2f5674a6 (r) 4: r1 >>= 32 r11 <<= 32 (r) 5: r0 = r1 r1 |= r11 (r) 6: exit; if w0 < 0xa goto pc+0 r1 >>= 32 r0 = r1 exit (or zero extension of w1 at (2) is missing for architectures that require zero extension for upper reg
CVE-2024-53125
In the Linux kernel, the following vulnerability has been resolved: b ...
GHSA-jgf3-fmmf-vj4h
In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7fffffff 2: w1 = w0 rewrites w1 = w0 3: if w0 < 10 goto +0 --------------> r11 = 0x2f5674a6 (r) 4: r1 >>= 32 r11 <<= 32 (r) 5: r0 = r1 r1 |= r11 (r) 6: exit; if w0 < 0xa goto pc+0 r1 >>= 32 r0 = r1 exit (or zero extension of w1 at (2) is missing for architectures that require zero extension for upper ...

BDU:2025-03303
Уязвимость компонента bpf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2025:02708-1
Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP4)

SUSE-SU-2025:02647-1
Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4)

SUSE-SU-2025:02611-1
Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP4)

SUSE-SU-2025:02698-1
Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP5)

SUSE-SU-2025:02688-1
Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)

SUSE-SU-2025:02652-1
Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5)

SUSE-SU-2025:02638-1
Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6)

SUSE-SU-2025:02610-1
Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4)

SUSE-SU-2025:02636-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

SUSE-SU-2025:02632-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

SUSE-SU-2025:02691-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)

SUSE-SU-2025:02601-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

ROS-20250320-01
Множественные уязвимости kernel-lt

SUSE-SU-2025:0201-2
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-53125 In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7fffffff 2: w1 = w0 rewrites w1 = w0 3: if w0 < 10 goto +0 --------------> r11 = 0x2f5674a6 (r) 4: r1 >>= 32 r11 <<= 32 (r) 5: r0 = r1 r1 |= r11 (r) 6: exit; if w0 < 0xa goto pc+0 r1 >>= 32 r0 = r1 exit (or zero extension of w1 at (2) is missing for architectures that require zero extension for upper register half). The following happens w/o this patch: - r0 is marked as not a subreg at (0); - w1 is marked as subreg at (2); - w1 subreg_def is overridde... | 0% Низкий | 10 месяцев назад | |
![]() | CVE-2024-53125 In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7fffffff 2: w1 = w0 rewrites w1 = w0 3: if w0 < 10 goto +0 --------------> r11 = 0x2f5674a6 (r) 4: r1 >>= 32 r11 <<= 32 (r) 5: r0 = r1 r1 |= r11 (r) 6: exit; if w0 < 0xa goto pc+0 r1 >>= 32 r0 = r1 exit (or zero extension of w1 at (2) is missing for architectures that require zero extension for upper register half). The following happens w/o this patch: - r0 is marked as not a subreg at (0); - w1 is marked as subreg at (2); - w1 subreg_def is overridde... | CVSS3: 4.4 | 0% Низкий | 10 месяцев назад |
![]() | CVE-2024-53125 In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7fffffff 2: w1 = w0 rewrites w1 = w0 3: if w0 < 10 goto +0 --------------> r11 = 0x2f5674a6 (r) 4: r1 >>= 32 r11 <<= 32 (r) 5: r0 = r1 r1 |= r11 (r) 6: exit; if w0 < 0xa goto pc+0 r1 >>= 32 r0 = r1 exit (or zero extension of w1 at (2) is missing for architectures that require zero extension for upper reg | 0% Низкий | 10 месяцев назад | |
CVE-2024-53125 In the Linux kernel, the following vulnerability has been resolved: b ... | 0% Низкий | 10 месяцев назад | ||
GHSA-jgf3-fmmf-vj4h In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7fffffff 2: w1 = w0 rewrites w1 = w0 3: if w0 < 10 goto +0 --------------> r11 = 0x2f5674a6 (r) 4: r1 >>= 32 r11 <<= 32 (r) 5: r0 = r1 r1 |= r11 (r) 6: exit; if w0 < 0xa goto pc+0 r1 >>= 32 r0 = r1 exit (or zero extension of w1 at (2) is missing for architectures that require zero extension for upper ... | 0% Низкий | 10 месяцев назад | ||
![]() | BDU:2025-03303 Уязвимость компонента bpf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | около 1 года назад |
![]() | SUSE-SU-2025:02708-1 Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP4) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02647-1 Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02611-1 Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP4) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02698-1 Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP5) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02688-1 Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02652-1 Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02638-1 Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02610-1 Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02636-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02632-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02691-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02601-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 2 месяца назад | ||
![]() | ROS-20250320-01 Множественные уязвимости kernel-lt | CVSS3: 7.8 | 7 месяцев назад | |
![]() | SUSE-SU-2025:0201-2 Security update for the Linux Kernel | 7 месяцев назад |
Уязвимостей на страницу