Логотип exploitDog
bind:CVE-2024-57849
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-57849

Количество 25

Количество 25

ubuntu логотип

CVE-2024-57849

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove handling triggers the following function call sequence: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() The s390 CPUMF sampling CPU hotplug handler invokes: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled. With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from_context() +--> event_sched_out() +--> cpumsf_pmu_del(...

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2024-57849

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove handling triggers the following function call sequence: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() The s390 CPUMF sampling CPU hotplug handler invokes: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled. With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from_context() +--> event_sched_out() +--> cpumsf_pmu_del(...

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2024-57849

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove handling triggers the following function call sequence: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() The s390 CPUMF sampling CPU hotplug handler invokes: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled. With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from_co

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2024-57849

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: s ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-q4cg-m7j8-ggr6

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove handling triggers the following function call sequence: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() The s390 CPUMF sampling CPU hotplug handler invokes: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled. With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from...

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2025-06153

около 1 года назад

Уязвимость компонентов s390/cpum_sf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0269-1

12 дней назад

Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0154-1

16 дней назад

Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0246-1

13 дней назад

Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0173-1

16 дней назад

Security update for the Linux Kernel (Live Patch 21 for SUSE Linux Enterprise 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0174-1

16 дней назад

Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0166-1

16 дней назад

Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0771-1

11 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0517-1

12 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0576-1

12 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
redos логотип

ROS-20250520-01

9 месяцев назад

Множественные уязвимости kernel-lt

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0236-1

около 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0577-2

11 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0577-1

11 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0428-1

12 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-57849

In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove handling triggers the following function call sequence: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() The s390 CPUMF sampling CPU hotplug handler invokes: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled. With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from_context() +--> event_sched_out() +--> cpumsf_pmu_del(...

CVSS3: 7.8
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-57849

In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove handling triggers the following function call sequence: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() The s390 CPUMF sampling CPU hotplug handler invokes: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled. With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from_context() +--> event_sched_out() +--> cpumsf_pmu_del(...

CVSS3: 5.5
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-57849

In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove handling triggers the following function call sequence: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() The s390 CPUMF sampling CPU hotplug handler invokes: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled. With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from_co

CVSS3: 7.8
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-57849

In the Linux kernel, the following vulnerability has been resolved: s ...

CVSS3: 7.8
0%
Низкий
около 1 года назад
github логотип
GHSA-q4cg-m7j8-ggr6

In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove handling triggers the following function call sequence: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() The s390 CPUMF sampling CPU hotplug handler invokes: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled. With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from...

CVSS3: 7.8
0%
Низкий
около 1 года назад
fstec логотип
BDU:2025-06153

Уязвимость компонентов s390/cpum_sf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.8
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2026:0269-1

Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6)

12 дней назад
suse-cvrf логотип
SUSE-SU-2026:0154-1

Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5)

16 дней назад
suse-cvrf логотип
SUSE-SU-2026:0246-1

Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP5)

13 дней назад
suse-cvrf логотип
SUSE-SU-2026:0173-1

Security update for the Linux Kernel (Live Patch 21 for SUSE Linux Enterprise 15 SP5)

16 дней назад
suse-cvrf логотип
SUSE-SU-2026:0174-1

Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4)

16 дней назад
suse-cvrf логотип
SUSE-SU-2026:0166-1

Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4)

16 дней назад
suse-cvrf логотип
SUSE-SU-2025:0771-1

Security update for the Linux Kernel

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0517-1

Security update for the Linux Kernel

12 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0576-1

Security update for the Linux Kernel

12 месяцев назад
redos логотип
ROS-20250520-01

Множественные уязвимости kernel-lt

CVSS3: 8.8
9 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0236-1

Security update for the Linux Kernel

около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0577-2

Security update for the Linux Kernel

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0577-1

Security update for the Linux Kernel

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0428-1

Security update for the Linux Kernel

12 месяцев назад

Уязвимостей на страницу