Количество 31
Количество 31

CVE-2024-53208
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 Read of size 8 at addr ffff888029b4dd18 by task kworker/u9:0/54 CPU: 1 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-01155-gf723224742fc #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: hci0 hci_cmd_sync_work Call Trace: <TASK> __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119 print_address_description mm/kasan/report.c:377 [inline] print_report+0x169/0x550 mm/kasan/report.c:488 q kasan_report+0x143/0x180 mm/kasan/report.c:601 set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:328 process_one_w...

CVE-2024-53208
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 Read of size 8 at addr ffff888029b4dd18 by task kworker/u9:0/54 CPU: 1 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-01155-gf723224742fc #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: hci0 hci_cmd_sync_work Call Trace: <TASK> __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119 print_address_description mm/kasan/report.c:377 [inline] print_report+0x169/0x550 mm/kasan/report.c:488 q kasan_report+0x143/0x180 mm/kasan/report.c:601 set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:328 process_one_work ...

CVE-2024-53208
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 Read of size 8 at addr ffff888029b4dd18 by task kworker/u9:0/54 CPU: 1 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-01155-gf723224742fc #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: hci0 hci_cmd_sync_work Call Trace: <TASK> __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119 print_address_description mm/kasan/report.c:377 [inline] print_report+0x169/0x550 mm/kasan/report.c:488 q kasan_report+0x143/0x180 mm/kasan/report.c:601 set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:328 process_

CVE-2024-53208
CVE-2024-53208
In the Linux kernel, the following vulnerability has been resolved: B ...
GHSA-fghf-x6v5-95fg
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 Read of size 8 at addr ffff888029b4dd18 by task kworker/u9:0/54 CPU: 1 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-01155-gf723224742fc #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: hci0 hci_cmd_sync_work Call Trace: <TASK> __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119 print_address_description mm/kasan/report.c:377 [inline] print_report+0x169/0x550 mm/kasan/report.c:488 q kasan_report+0x143/0x180 mm/kasan/report.c:601 set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:328 proce...

BDU:2025-04555
Уязвимость функции mgmt_set_powered_complete() модуля net/bluetooth/mgmt.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

SUSE-SU-2025:02171-1
Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5)

SUSE-SU-2025:02113-1
Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5)

SUSE-SU-2025:02107-1
Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)

SUSE-SU-2025:02157-1
Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5)

SUSE-SU-2025:02106-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5)

SUSE-SU-2025:02076-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

SUSE-SU-2025:02071-1
Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6)

SUSE-SU-2025:02162-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)

SUSE-SU-2025:02127-1
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6)

SUSE-SU-2025:02126-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)

SUSE-SU-2025:02117-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2025:02116-1
Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)

SUSE-SU-2025:02077-1
Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-53208 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 Read of size 8 at addr ffff888029b4dd18 by task kworker/u9:0/54 CPU: 1 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-01155-gf723224742fc #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: hci0 hci_cmd_sync_work Call Trace: <TASK> __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119 print_address_description mm/kasan/report.c:377 [inline] print_report+0x169/0x550 mm/kasan/report.c:488 q kasan_report+0x143/0x180 mm/kasan/report.c:601 set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:328 process_one_w... | CVSS3: 7.8 | 0% Низкий | 7 месяцев назад |
![]() | CVE-2024-53208 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 Read of size 8 at addr ffff888029b4dd18 by task kworker/u9:0/54 CPU: 1 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-01155-gf723224742fc #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: hci0 hci_cmd_sync_work Call Trace: <TASK> __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119 print_address_description mm/kasan/report.c:377 [inline] print_report+0x169/0x550 mm/kasan/report.c:488 q kasan_report+0x143/0x180 mm/kasan/report.c:601 set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:328 process_one_work ... | CVSS3: 6.8 | 0% Низкий | 7 месяцев назад |
![]() | CVE-2024-53208 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 Read of size 8 at addr ffff888029b4dd18 by task kworker/u9:0/54 CPU: 1 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-01155-gf723224742fc #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: hci0 hci_cmd_sync_work Call Trace: <TASK> __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119 print_address_description mm/kasan/report.c:377 [inline] print_report+0x169/0x550 mm/kasan/report.c:488 q kasan_report+0x143/0x180 mm/kasan/report.c:601 set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:328 process_ | CVSS3: 7.8 | 0% Низкий | 7 месяцев назад |
![]() | CVSS3: 7.8 | 0% Низкий | 6 месяцев назад | |
CVE-2024-53208 In the Linux kernel, the following vulnerability has been resolved: B ... | CVSS3: 7.8 | 0% Низкий | 7 месяцев назад | |
GHSA-fghf-x6v5-95fg In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 Read of size 8 at addr ffff888029b4dd18 by task kworker/u9:0/54 CPU: 1 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-01155-gf723224742fc #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: hci0 hci_cmd_sync_work Call Trace: <TASK> __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119 print_address_description mm/kasan/report.c:377 [inline] print_report+0x169/0x550 mm/kasan/report.c:488 q kasan_report+0x143/0x180 mm/kasan/report.c:601 set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:328 proce... | CVSS3: 7.8 | 0% Низкий | 7 месяцев назад | |
![]() | BDU:2025-04555 Уязвимость функции mgmt_set_powered_complete() модуля net/bluetooth/mgmt.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7.8 | 0% Низкий | 8 месяцев назад |
![]() | SUSE-SU-2025:02171-1 Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02113-1 Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02107-1 Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02157-1 Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02106-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02076-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02071-1 Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02162-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02127-1 Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02126-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02117-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02116-1 Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02077-1 Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6) | около 1 месяца назад |
Уязвимостей на страницу