Количество 30
Количество 30

CVE-2024-56548
In the Linux kernel, the following vulnerability has been resolved: hfsplus: don't query the device logical block size multiple times Devices block sizes may change. One of these cases is a loop device by using ioctl LOOP_SET_BLOCK_SIZE. While this may cause other issues like IO being rejected, in the case of hfsplus, it will allocate a block by using that size and potentially write out-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the latter function reads a different io_size. Using a new min_io_size initally set to sb_min_blocksize works for the purposes of the original fix, since it will be set to the max between HFSPLUS_SECTOR_SIZE and the first seen logical block size. We still use the max between HFSPLUS_SECTOR_SIZE and min_io_size in case the latter is not initialized. Tested by mounting an hfsplus filesystem with loop block sizes 512, 1024 and 4096. The produced KASAN report before the fix looks like this: [ 419.944641] ============================...

CVE-2024-56548
In the Linux kernel, the following vulnerability has been resolved: hfsplus: don't query the device logical block size multiple times Devices block sizes may change. One of these cases is a loop device by using ioctl LOOP_SET_BLOCK_SIZE. While this may cause other issues like IO being rejected, in the case of hfsplus, it will allocate a block by using that size and potentially write out-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the latter function reads a different io_size. Using a new min_io_size initally set to sb_min_blocksize works for the purposes of the original fix, since it will be set to the max between HFSPLUS_SECTOR_SIZE and the first seen logical block size. We still use the max between HFSPLUS_SECTOR_SIZE and min_io_size in case the latter is not initialized. Tested by mounting an hfsplus filesystem with loop block sizes 512, 1024 and 4096. The produced KASAN report before the fix looks like this: [ 419.944641] ===================================...

CVE-2024-56548
In the Linux kernel, the following vulnerability has been resolved: hfsplus: don't query the device logical block size multiple times Devices block sizes may change. One of these cases is a loop device by using ioctl LOOP_SET_BLOCK_SIZE. While this may cause other issues like IO being rejected, in the case of hfsplus, it will allocate a block by using that size and potentially write out-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the latter function reads a different io_size. Using a new min_io_size initally set to sb_min_blocksize works for the purposes of the original fix, since it will be set to the max between HFSPLUS_SECTOR_SIZE and the first seen logical block size. We still use the max between HFSPLUS_SECTOR_SIZE and min_io_size in case the latter is not initialized. Tested by mounting an hfsplus filesystem with loop block sizes 512, 1024 and 4096. The produced KASAN report before the fix looks like this: [ 419.944641] ===============================

CVE-2024-56548
CVE-2024-56548
In the Linux kernel, the following vulnerability has been resolved: h ...
GHSA-64p7-wm49-vgg4
In the Linux kernel, the following vulnerability has been resolved: hfsplus: don't query the device logical block size multiple times Devices block sizes may change. One of these cases is a loop device by using ioctl LOOP_SET_BLOCK_SIZE. While this may cause other issues like IO being rejected, in the case of hfsplus, it will allocate a block by using that size and potentially write out-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the latter function reads a different io_size. Using a new min_io_size initally set to sb_min_blocksize works for the purposes of the original fix, since it will be set to the max between HFSPLUS_SECTOR_SIZE and the first seen logical block size. We still use the max between HFSPLUS_SECTOR_SIZE and min_io_size in case the latter is not initialized. Tested by mounting an hfsplus filesystem with loop block sizes 512, 1024 and 4096. The produced KASAN report before the fix looks like this: [ 419.944641] ============================...

BDU:2025-04454
Уязвимость компонента hfsplus ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2025:0603-1
Security update for the Linux Kernel

SUSE-SU-2025:0855-1
Security update for the Linux Kernel

SUSE-SU-2025:0152-1
Security update for the Linux Kernel

SUSE-SU-2025:0835-1
Security update for the Linux Kernel

SUSE-SU-2025:0833-2
Security update for the Linux Kernel

SUSE-SU-2025:0833-1
Security update for the Linux Kernel

SUSE-SU-2025:0202-1
Security update for the Linux Kernel

SUSE-SU-2025:0203-1
Security update for the Linux Kernel

SUSE-SU-2025:0784-1
Security update for the Linux Kernel

ROS-20250325-01
Множественные уязвимости kernel-lt

SUSE-SU-2025:0955-1
Security update for the Linux Kernel

SUSE-SU-2025:0834-1
Security update for the Linux Kernel

SUSE-SU-2025:0856-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-56548 In the Linux kernel, the following vulnerability has been resolved: hfsplus: don't query the device logical block size multiple times Devices block sizes may change. One of these cases is a loop device by using ioctl LOOP_SET_BLOCK_SIZE. While this may cause other issues like IO being rejected, in the case of hfsplus, it will allocate a block by using that size and potentially write out-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the latter function reads a different io_size. Using a new min_io_size initally set to sb_min_blocksize works for the purposes of the original fix, since it will be set to the max between HFSPLUS_SECTOR_SIZE and the first seen logical block size. We still use the max between HFSPLUS_SECTOR_SIZE and min_io_size in case the latter is not initialized. Tested by mounting an hfsplus filesystem with loop block sizes 512, 1024 and 4096. The produced KASAN report before the fix looks like this: [ 419.944641] ============================... | CVSS3: 7.8 | 0% Низкий | 6 месяцев назад |
![]() | CVE-2024-56548 In the Linux kernel, the following vulnerability has been resolved: hfsplus: don't query the device logical block size multiple times Devices block sizes may change. One of these cases is a loop device by using ioctl LOOP_SET_BLOCK_SIZE. While this may cause other issues like IO being rejected, in the case of hfsplus, it will allocate a block by using that size and potentially write out-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the latter function reads a different io_size. Using a new min_io_size initally set to sb_min_blocksize works for the purposes of the original fix, since it will be set to the max between HFSPLUS_SECTOR_SIZE and the first seen logical block size. We still use the max between HFSPLUS_SECTOR_SIZE and min_io_size in case the latter is not initialized. Tested by mounting an hfsplus filesystem with loop block sizes 512, 1024 and 4096. The produced KASAN report before the fix looks like this: [ 419.944641] ===================================... | CVSS3: 6.7 | 0% Низкий | 6 месяцев назад |
![]() | CVE-2024-56548 In the Linux kernel, the following vulnerability has been resolved: hfsplus: don't query the device logical block size multiple times Devices block sizes may change. One of these cases is a loop device by using ioctl LOOP_SET_BLOCK_SIZE. While this may cause other issues like IO being rejected, in the case of hfsplus, it will allocate a block by using that size and potentially write out-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the latter function reads a different io_size. Using a new min_io_size initally set to sb_min_blocksize works for the purposes of the original fix, since it will be set to the max between HFSPLUS_SECTOR_SIZE and the first seen logical block size. We still use the max between HFSPLUS_SECTOR_SIZE and min_io_size in case the latter is not initialized. Tested by mounting an hfsplus filesystem with loop block sizes 512, 1024 and 4096. The produced KASAN report before the fix looks like this: [ 419.944641] =============================== | CVSS3: 7.8 | 0% Низкий | 6 месяцев назад |
![]() | CVSS3: 7.8 | 0% Низкий | 3 месяца назад | |
CVE-2024-56548 In the Linux kernel, the following vulnerability has been resolved: h ... | CVSS3: 7.8 | 0% Низкий | 6 месяцев назад | |
GHSA-64p7-wm49-vgg4 In the Linux kernel, the following vulnerability has been resolved: hfsplus: don't query the device logical block size multiple times Devices block sizes may change. One of these cases is a loop device by using ioctl LOOP_SET_BLOCK_SIZE. While this may cause other issues like IO being rejected, in the case of hfsplus, it will allocate a block by using that size and potentially write out-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the latter function reads a different io_size. Using a new min_io_size initally set to sb_min_blocksize works for the purposes of the original fix, since it will be set to the max between HFSPLUS_SECTOR_SIZE and the first seen logical block size. We still use the max between HFSPLUS_SECTOR_SIZE and min_io_size in case the latter is not initialized. Tested by mounting an hfsplus filesystem with loop block sizes 512, 1024 and 4096. The produced KASAN report before the fix looks like this: [ 419.944641] ============================... | CVSS3: 7.8 | 0% Низкий | 6 месяцев назад | |
![]() | BDU:2025-04454 Уязвимость компонента hfsplus ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | 6 месяцев назад |
![]() | SUSE-SU-2025:0603-1 Security update for the Linux Kernel | 4 месяца назад | ||
![]() | SUSE-SU-2025:0855-1 Security update for the Linux Kernel | 3 месяца назад | ||
![]() | SUSE-SU-2025:0152-1 Security update for the Linux Kernel | 5 месяцев назад | ||
![]() | SUSE-SU-2025:0835-1 Security update for the Linux Kernel | 3 месяца назад | ||
![]() | SUSE-SU-2025:0833-2 Security update for the Linux Kernel | 3 месяца назад | ||
![]() | SUSE-SU-2025:0833-1 Security update for the Linux Kernel | 3 месяца назад | ||
![]() | SUSE-SU-2025:0202-1 Security update for the Linux Kernel | 5 месяцев назад | ||
![]() | SUSE-SU-2025:0203-1 Security update for the Linux Kernel | 5 месяцев назад | ||
![]() | SUSE-SU-2025:0784-1 Security update for the Linux Kernel | 4 месяца назад | ||
![]() | ROS-20250325-01 Множественные уязвимости kernel-lt | CVSS3: 7.8 | 3 месяца назад | |
![]() | SUSE-SU-2025:0955-1 Security update for the Linux Kernel | 3 месяца назад | ||
![]() | SUSE-SU-2025:0834-1 Security update for the Linux Kernel | 3 месяца назад | ||
![]() | SUSE-SU-2025:0856-1 Security update for the Linux Kernel | 3 месяца назад |
Уязвимостей на страницу