Action not permitted
Modal body text goes here.
wid-sec-w-2024-1722
Vulnerability from csaf_certbund
Published
2024-07-29 22:00
Modified
2024-12-04 23:00
Summary
Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1722 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1722.json" }, { "category": "self", "summary": "WID-SEC-2024-1722 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1722" }, { "category": "external", "summary": "Linuc CVE Announce vom 2024-07-29", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6952-1 vom 2024-08-09", "url": "https://ubuntu.com/security/notices/USN-6952-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6949-1 vom 2024-08-09", "url": "https://ubuntu.com/security/notices/USN-6949-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6955-1 vom 2024-08-12", "url": "https://ubuntu.com/security/notices/USN-6955-1" }, { "category": "external", "summary": "Debian Security Advisory DSA-5747 vom 2024-08-12", "url": "https://security-tracker.debian.org/tracker/DSA-5747-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2892-1 vom 2024-08-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6949-2 vom 2024-08-13", "url": "https://ubuntu.com/security/notices/USN-6949-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2894-1 vom 2024-08-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019182.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2895-1 vom 2024-08-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2893-1 vom 2024-08-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6952-2 vom 2024-08-13", "url": "https://ubuntu.com/security/notices/USN-6952-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2901-1 vom 2024-08-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019194.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2902-1 vom 2024-08-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019193.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2923-1 vom 2024-08-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2929-1 vom 2024-08-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019209.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2939-1 vom 2024-08-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2947-1 vom 2024-08-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019220.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2948-1 vom 2024-08-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2940-1 vom 2024-08-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019212.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5673 vom 2024-08-21", "url": "https://access.redhat.com/errata/RHSA-2024:5673" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2622 vom 2024-08-21", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2622.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5672 vom 2024-08-21", "url": "https://access.redhat.com/errata/RHSA-2024:5672" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-081 vom 2024-08-21", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-081.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5928 vom 2024-08-28", "url": "https://access.redhat.com/errata/RHSA-2024:5928" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5928 vom 2024-08-29", "url": "https://linux.oracle.com/errata/ELSA-2024-5928.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6206 vom 2024-09-03", "url": "https://access.redhat.com/errata/RHSA-2024:6206" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6267 vom 2024-09-04", "url": "https://access.redhat.com/errata/RHSA-2024:6267" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6268 vom 2024-09-04", "url": "https://access.redhat.com/errata/RHSA-2024:6268" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3190-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3194-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019400.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3189-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3195-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019407.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6567 vom 2024-09-11", "url": "https://access.redhat.com/errata/RHSA-2024:6567" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6406 vom 2024-09-12", "url": "https://access.redhat.com/errata/RHSA-2024:6406" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12612 vom 2024-09-12", "url": "https://linux.oracle.com/errata/ELSA-2024-12612.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12610 vom 2024-09-12", "url": "https://linux.oracle.com/errata/ELSA-2024-12610.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6999-1 vom 2024-09-11", "url": "https://ubuntu.com/security/notices/USN-6999-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12618 vom 2024-09-12", "url": "https://linux.oracle.com/errata/ELSA-2024-12618.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3209-1 vom 2024-09-11", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNWVZVIFSX7PLBJX3I3PDZ4MIBERTN2Y/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-6567 vom 2024-09-12", "url": "https://linux.oracle.com/errata/ELSA-2024-6567.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-1 vom 2024-09-12", "url": "https://ubuntu.com/security/notices/USN-7003-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-2 vom 2024-09-12", "url": "https://ubuntu.com/security/notices/USN-7003-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7006-1 vom 2024-09-12", "url": "https://ubuntu.com/security/notices/USN-7006-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3227-1 vom 2024-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019430.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3225-1 vom 2024-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019432.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7004-1 vom 2024-09-12", "url": "https://ubuntu.com/security/notices/USN-7004-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7005-1 vom 2024-09-12", "url": "https://ubuntu.com/security/notices/USN-7005-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-3 vom 2024-09-13", "url": "https://ubuntu.com/security/notices/USN-7003-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7007-1 vom 2024-09-13", "url": "https://ubuntu.com/security/notices/USN-7007-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7008-1 vom 2024-09-13", "url": "https://ubuntu.com/security/notices/USN-7008-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7009-1 vom 2024-09-13", "url": "https://ubuntu.com/security/notices/USN-7009-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7005-2 vom 2024-09-13", "url": "https://ubuntu.com/security/notices/USN-7005-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3251-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019435.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:6567 vom 2024-09-17", "url": "https://errata.build.resf.org/RLSA-2024:6567" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3249-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019438.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3252-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019436.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6745 vom 2024-09-18", "url": "https://access.redhat.com/errata/RHSA-2024:6745" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6744 vom 2024-09-18", "url": "https://access.redhat.com/errata/RHSA-2024:6744" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-085 vom 2024-09-18", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-085.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-052 vom 2024-09-18", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-052.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-053 vom 2024-09-18", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-053.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-084 vom 2024-09-18", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-084.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-190 vom 2024-09-18", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-190.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-191 vom 2024-09-18", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-191.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7020-1 vom 2024-09-18", "url": "https://ubuntu.com/security/notices/USN-7020-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7021-1 vom 2024-09-18", "url": "https://ubuntu.com/security/notices/USN-7021-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7022-1 vom 2024-09-18", "url": "https://ubuntu.com/security/notices/USN-7022-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7007-2 vom 2024-09-23", "url": "https://ubuntu.com/security/notices/USN-7007-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7020-2 vom 2024-09-23", "url": "https://ubuntu.com/security/notices/USN-7020-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7028-1 vom 2024-09-23", "url": "https://ubuntu.com/security/notices/USN-7028-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7001" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6991 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6991" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6997 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6997" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3383-1 vom 2024-09-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7004 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7004" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7007-3 vom 2024-09-23", "url": "https://ubuntu.com/security/notices/USN-7007-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6993 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6993" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6994 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6994" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6995 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6995" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6999 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6999" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7029-1 vom 2024-09-23", "url": "https://ubuntu.com/security/notices/USN-7029-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7005 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7005" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7002 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7002" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6992 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6992" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7021-2 vom 2024-09-23", "url": "https://ubuntu.com/security/notices/USN-7021-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7003 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7003" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6990 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6990" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6999-2 vom 2024-09-23", "url": "https://ubuntu.com/security/notices/USN-6999-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6998 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6998" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7000" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3408-1 vom 2024-09-24", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TGC7PQ5QNGEZWYIHCKH2KPZMGYJ4VN6B/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7009-2 vom 2024-09-25", "url": "https://ubuntu.com/security/notices/USN-7009-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7000 vom 2024-09-26", "url": "https://linux.oracle.com/errata/ELSA-2024-7000.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-6997 vom 2024-09-26", "url": "https://linux.oracle.com/errata/ELSA-2024-6997.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-4 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7003-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7020-3 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7020-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7227 vom 2024-09-26", "url": "https://access.redhat.com/errata/RHSA-2024:7227" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7039-1 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7039-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7021-3 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7021-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:7001 vom 2024-09-30", "url": "https://errata.build.resf.org/RLSA-2024:7001" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3499-1 vom 2024-09-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019536.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7429 vom 2024-10-01", "url": "https://access.redhat.com/errata/RHSA-2024:7429" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12682 vom 2024-09-30", "url": "http://linux.oracle.com/errata/ELSA-2024-12682.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7428 vom 2024-10-01", "url": "https://access.redhat.com/errata/RHSA-2024:7428" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7430 vom 2024-10-01", "url": "https://access.redhat.com/errata/RHSA-2024:7430" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7431 vom 2024-10-01", "url": "https://access.redhat.com/errata/RHSA-2024:7431" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7432 vom 2024-10-01", "url": "https://access.redhat.com/errata/RHSA-2024:7432" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7433 vom 2024-10-01", "url": "https://access.redhat.com/errata/RHSA-2024:7433" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7427 vom 2024-10-01", "url": "https://access.redhat.com/errata/RHSA-2024:7427" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-6994 vom 2024-09-30", "url": "https://linux.oracle.com/errata/ELSA-2024-6994.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-5 vom 2024-10-01", "url": "https://ubuntu.com/security/notices/USN-7003-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7022-2 vom 2024-10-01", "url": "https://ubuntu.com/security/notices/USN-7022-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7021-4 vom 2024-10-03", "url": "https://ubuntu.com/security/notices/USN-7021-4" }, { "category": "external", "summary": "Debian Security Advisory DSA-5782 vom 2024-10-03", "url": "https://lists.debian.org/debian-security-announce/2024/msg00195.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3912 vom 2024-10-07", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q7MIMQMCXNGMVS32KLTADYTPQCKF5HWU/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3547-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019566.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3559-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019575.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3566-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7022-3 vom 2024-10-10", "url": "https://ubuntu.com/security/notices/USN-7022-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3569-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GBL67LQ3MUSYQCQRQH2AZH3XWILTO5A/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3565-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-422 vom 2024-10-10", "url": "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3587-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3585-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019586.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3591-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3592-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019589.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7020-4 vom 2024-10-11", "url": "https://ubuntu.com/security/notices/USN-7020-4" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12782 vom 2024-10-14", "url": "https://linux.oracle.com/errata/ELSA-2024-12782.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3617-1 vom 2024-10-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019595.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12780 vom 2024-10-14", "url": "https://linux.oracle.com/errata/ELSA-2024-12780.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8107 vom 2024-10-15", "url": "https://access.redhat.com/errata/RHSA-2024:8107" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12779 vom 2024-10-14", "url": "https://linux.oracle.com/errata/ELSA-2024-12779.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3627-1 vom 2024-10-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/EDC3MOOYJCFLEYCPOKSPUCADNYIO3EGI/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3625-1 vom 2024-10-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XCWDJ4VQNWRMZU52FZIMVKO3ZX7QR3L7/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3624-1 vom 2024-10-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/V4GVQWREKLT3NIX5GMPMO26GXLKRGTXJ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3623-1 vom 2024-10-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TF6OKVTF5VSUGWWYIUXLV2YZK7NYELIN/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3640-1 vom 2024-10-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019609.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3636-1 vom 2024-10-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6PEVJU5FBJP53YMNJCB4SQC2P7VOWDEQ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3639-1 vom 2024-10-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QREDIZHMC5MCDU7XHJHAPFFVPPIKTHWD/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3632-1 vom 2024-10-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IMA2L435Y3DOAG6IL6IEIK2SUGPOUZXD/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8162 vom 2024-10-16", "url": "https://access.redhat.com/errata/RHSA-2024:8162" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3638-1 vom 2024-10-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/G5I2ZVAM4BJDGCYJE64AKFTDGHVIU5SH/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3635-1 vom 2024-10-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BL3RXEW5VDVX6HS5GR4KUH6GDRT5OFQF/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3631-1 vom 2024-10-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VBN5S6CN75ZWGV3ZNRLZRMQ5DF3HMBZE/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-1 vom 2024-10-16", "url": "https://ubuntu.com/security/notices/USN-7069-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8158 vom 2024-10-16", "url": "https://access.redhat.com/errata/RHSA-2024:8158" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3642-1 vom 2024-10-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8157 vom 2024-10-16", "url": "https://access.redhat.com/errata/RHSA-2024:8157" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3643-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VPMT5STAWY6BTO5OI2PZ7CG4AXOIQKZN/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3696-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YYPGEHXE3QJ5NBRD57VSRTM36AC5DISM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3670-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JVBPTC5SNYDIYERI2QA3SDI56HZRXTU4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3674-1 vom 2024-10-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019642.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3672-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MGSVPDAL2ET3FWE6YAGBX3UOQOVXTPXB/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3649-1 vom 2024-10-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019619.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3652-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XAOP5G7ENALTQ2BLIJROCRJ3STRXQOFY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3663-1 vom 2024-10-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3651-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VLAP2QXVEHLNNWBLHF53IAVX5KBCFJGW/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3662-1 vom 2024-10-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3660-1 vom 2024-10-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019627.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3698-1 vom 2024-10-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019633.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3648-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YCRSFR3VCO3HMO5RI5MPP5LW6AJRWVBW/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3697-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/A6BRGXRVSUAODD2ZZSX5GJCV46W4N5YB/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3690-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TJEVBYA7IDQFKVP2IAJ5BZJLYZD7EOVP/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3701-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SVZDNTNDPAUIILRXFRA47BDSDZ3IUQTH/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3702-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BPAXFMRC3YVPDHRGBWET3RB7YTYFYLZW/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3687-1 vom 2024-10-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019637.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3685-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S7NJHO236TM7NPYYRIFT2WLSXRC4WECV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3694-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Y2P3R5HQ4Z7AYZLBXUGXBJMITFENT5NV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3679-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RDWWWR2VCADWSQCCZNNFB4VWOMZDOC63/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3676-1 vom 2024-10-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019641.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3661-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LI6Q2FNQZMLDTI4OK3SIOBF2CXJW5I56/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3655-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/P4LIA2SNUYEEYDFH7Q72CHUMA7X4NIY3/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3695-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MOG44NUGCSJS6Q3AKMCV3X4IK2DN6CLL/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3700-1 vom 2024-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/G3EDKBVPHAPKDJ45CNEJLJ4KGJAHJ4R7/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3706-1 vom 2024-10-17", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IUM757WJ43K7PF2K6A3UQHWG2QALK24F/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3710-1 vom 2024-10-17", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CLMHYECK5YKZDDXZ7XKEL3G5JXCF5QRM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3707-1 vom 2024-10-17", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/7J6ZDLOHRJMVHJRG2ZXV377LZA73SWRG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3704-1 vom 2024-10-17", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/5ESWDH77MSPQVMPKEX33DCOZ5ZWWTEUO/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-2 vom 2024-10-17", "url": "https://ubuntu.com/security/notices/USN-7069-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7028-2 vom 2024-10-17", "url": "https://ubuntu.com/security/notices/USN-7028-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23", "url": "https://access.redhat.com/errata/RHSA-2024:8318" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:8162 vom 2024-10-25", "url": "https://errata.build.resf.org/RLSA-2024:8162" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3768-1 vom 2024-10-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019681.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8614 vom 2024-10-30", "url": "https://access.redhat.com/errata/RHSA-2024:8614" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3774-1 vom 2024-10-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3780-1 vom 2024-10-30", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ZRFC54YJNAIE647NXDXGDHFV6UDF5EPM/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8613 vom 2024-10-30", "url": "https://access.redhat.com/errata/RHSA-2024:8613" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3780-1 vom 2024-10-30", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRFC54YJNAIE647NXDXGDHFV6UDF5EPM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3779-1 vom 2024-10-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DKYHT4QW67UZKMENITQO7T5OANUXGOIM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3800-1 vom 2024-10-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3798-1 vom 2024-10-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3796-1 vom 2024-10-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3820-1 vom 2024-10-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3821-1 vom 2024-10-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3822-1 vom 2024-10-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3833-1 vom 2024-10-30", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/46CHUG3NHK74I7NL4E3MYL6M7O72UAE6/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3830-1 vom 2024-10-30", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/5FIXDPPFE66BKRWS3X45YHODJJ57FQRT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3834-1 vom 2024-10-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3803-1 vom 2024-10-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3837-1 vom 2024-10-30", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VHXZ2BQRCVWQY2AVSULS6AN56SITZ273/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3829-1 vom 2024-10-30", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RMOWLUMWUZKBWNWZRVPCJY43YUOMCMJ7/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3814-1 vom 2024-10-30", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QW54KPSGGX7Q3N4CIMSAGZRZY4WGZV2D/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3831-1 vom 2024-10-30", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QK6PZZGVJB6TX4W6LKJNJW74SGTITNGD/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3815-1 vom 2024-10-30", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JIUM76237NQIAK3CP7ENKHD5EOEBDHZH/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3806-1 vom 2024-10-30", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/I22FOLEFZIBTJBTIPHH5GXPKMIXVDSDI/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3836-1 vom 2024-10-30", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/766TFTKXVWJJPZQXXTFUC5YHPETQW3AH/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3793-1 vom 2024-10-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3842-1 vom 2024-10-31", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VVJDY73ZQLYG6XTLPXQKV6DOXIBCWQNH/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3840-1 vom 2024-10-31", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/O2CG2OGLBEZR2LX5UI6PTT5NVZOFNGQH/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7021-5 vom 2024-10-31", "url": "https://ubuntu.com/security/notices/USN-7021-5" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3860-1 vom 2024-10-31", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/UFUASUPHAEZFWXKIMGZLIZD4LHGMJ5YW/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3852-1 vom 2024-10-31", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CJCHUFTBOJTQRE24NTRP6WMCK5BGPZ3N/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3856-1 vom 2024-10-31", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2LSLV3QQQYIAV376IANSLYZETKMXDLVZ/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31", "url": "https://ubuntu.com/security/notices/USN-7088-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3854-1 vom 2024-10-31", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6DKQ4KINQ5TXHK6JA63O3YINMJXE2QVJ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3849-1 vom 2024-10-31", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3851-1 vom 2024-10-31", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/7YDAYBSAUUUZVVIKYWRRX5O6ZCOQ2K46/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3855-1 vom 2024-10-31", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HVT4PHTMBZOBVPW2CI26GVIVJNWCBTVN/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3857-1 vom 2024-10-31", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DM3QIZHKHG7AW6EAKKMMWCCUOYK4JU3R/" }, { "category": "external", "summary": "IBM Security Bulletin", "url": "https://www.ibm.com/support/pages/node/7174634" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-1 vom 2024-11-01", "url": "https://ubuntu.com/security/notices/USN-7089-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7090-1 vom 2024-11-01", "url": "https://ubuntu.com/security/notices/USN-7090-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3877-1 vom 2024-11-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019753.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3882-1 vom 2024-11-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GBH24SQSCU7UKVSH3JGQ4YLAU2LAG7KC/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3880-1 vom 2024-11-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4FKA7N5AUZ6CDGAARMRU76MNKUZHMPAH/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3881-1 vom 2024-11-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ZOOTWA362J2SG2EX2CE3LPBWPJ7GVK2B/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7088-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7089-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8870 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8870" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8856 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8856" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06", "url": "https://linux.oracle.com/errata/ELSA-2024-8856.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06", "url": "https://ubuntu.com/security/notices/USN-7088-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7095-1 vom 2024-11-07", "url": "https://ubuntu.com/security/notices/USN-7095-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-3 vom 2024-11-07", "url": "https://ubuntu.com/security/notices/USN-7089-3" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:8870 vom 2024-11-08", "url": "https://errata.build.resf.org/RLSA-2024:8870" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", "url": "https://ubuntu.com/security/notices/USN-7100-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9497 vom 2024-11-13", "url": "https://access.redhat.com/errata/RHSA-2024:9497" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9498 vom 2024-11-13", "url": "https://access.redhat.com/errata/RHSA-2024:9498" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", "url": "https://ubuntu.com/security/notices/USN-7100-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12814 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12814.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12", "url": "https://access.redhat.com/errata/RHSA-2024:9315" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12813.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-4 vom 2024-11-13", "url": "https://ubuntu.com/security/notices/USN-7089-4" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12815.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9546 vom 2024-11-13", "url": "https://access.redhat.com/errata/RHSA-2024:9546" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7088-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7110-1 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7110-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7089-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-6 vom 2024-11-15", "url": "https://ubuntu.com/security/notices/USN-7089-6" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2698 vom 2024-11-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2698.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-7 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7089-7" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7119-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4038-1 vom 2024-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-2 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7123-1" }, { "category": "external", "summary": "Debian Security Advisory DSA-5818 vom 2024-11-24", "url": "https://lists.debian.org/debian-security-announce/2024/msg00233.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-3 vom 2024-11-25", "url": "https://ubuntu.com/security/notices/USN-7121-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10262 vom 2024-11-26", "url": "https://access.redhat.com/errata/RHSA-2024:10262" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4082-1 vom 2024-11-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4081-1 vom 2024-11-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4103-1 vom 2024-11-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4122-1 vom 2024-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4127-1 vom 2024-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4131-1 vom 2024-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4128-1 vom 2024-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4140-1 vom 2024-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4125-1 vom 2024-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4123-1 vom 2024-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4124-1 vom 2024-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10772 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10772" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10773 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10773" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10771 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10771" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4161-1 vom 2024-12-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R6RFOLIFPTX44BLCDCF6HLSN7S4I4YXH/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4180-1 vom 2024-12-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/3ACAYSLQECATBMYSIXEOONW3SJQYVWGD/" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff", "tracking": { "current_release_date": "2024-12-04T23:00:00.000+00:00", "generator": { "date": "2024-12-05T10:12:03.900+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-1722", "initial_release_date": "2024-07-29T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-08-08T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-12T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu und Debian aufgenommen" }, { "date": "2024-08-13T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2024-08-14T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-15T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-18T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-20T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat und Amazon aufgenommen" }, { "date": "2024-08-21T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-08-28T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-29T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-03T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-10T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2024-09-11T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat, Oracle Linux, Ubuntu und SUSE aufgenommen" }, { "date": "2024-09-12T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-09-15T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-16T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE und Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-09-17T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-18T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Amazon und Ubuntu aufgenommen" }, { "date": "2024-09-22T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-23T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat, SUSE und Ubuntu aufgenommen" }, { "date": "2024-09-24T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-25T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-26T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-29T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-30T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Rocky Enterprise Software Foundation, SUSE, Red Hat und Oracle Linux aufgenommen" }, { "date": "2024-10-01T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Ubuntu und Debian aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-10-08T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2024-10-10T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-14T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Oracle Linux, SUSE und Red Hat aufgenommen" }, { "date": "2024-10-15T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von SUSE, Red Hat und Ubuntu aufgenommen" }, { "date": "2024-10-16T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-23T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-27T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-10-28T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-29T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2024-10-30T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2024-11-03T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-06T23:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-10T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Red Hat, Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2024-11-14T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-17T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-11-19T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "54", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-24T23:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-11-25T23:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen" }, { "date": "2024-11-27T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-28T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-02T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-03T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2024-12-04T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "61" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01", "product_id": "T038741" } }, { "category": "product_version", "name": "7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM 7.5.0 UP10 IF01", "product_id": "T038741-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T036489", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-52887", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2023-52887" }, { "cve": "CVE-2024-41020", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41020" }, { "cve": "CVE-2024-41021", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41021" }, { "cve": "CVE-2024-41022", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41022" }, { "cve": "CVE-2024-41023", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41023" }, { "cve": "CVE-2024-41024", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41024" }, { "cve": "CVE-2024-41025", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41025" }, { "cve": "CVE-2024-41026", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41026" }, { "cve": "CVE-2024-41027", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41027" }, { "cve": "CVE-2024-41028", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41028" }, { "cve": "CVE-2024-41029", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41029" }, { "cve": "CVE-2024-41030", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41030" }, { "cve": "CVE-2024-41031", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41031" }, { "cve": "CVE-2024-41032", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41032" }, { "cve": "CVE-2024-41033", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41033" }, { "cve": "CVE-2024-41034", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41034" }, { "cve": "CVE-2024-41035", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41035" }, { "cve": "CVE-2024-41036", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41036" }, { "cve": "CVE-2024-41037", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41037" }, { "cve": "CVE-2024-41038", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41038" }, { "cve": "CVE-2024-41039", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41039" }, { "cve": "CVE-2024-41040", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41040" }, { "cve": "CVE-2024-41041", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41041" }, { "cve": "CVE-2024-41042", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41042" }, { "cve": "CVE-2024-41043", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41043" }, { "cve": "CVE-2024-41044", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41044" }, { "cve": "CVE-2024-41045", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41045" }, { "cve": "CVE-2024-41046", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41046" }, { "cve": "CVE-2024-41047", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41047" }, { "cve": "CVE-2024-41048", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41048" }, { "cve": "CVE-2024-41049", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41049" }, { "cve": "CVE-2024-41050", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41050" }, { "cve": "CVE-2024-41051", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41051" }, { "cve": "CVE-2024-41052", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41052" }, { "cve": "CVE-2024-41053", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41053" }, { "cve": "CVE-2024-41054", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41054" }, { "cve": "CVE-2024-41055", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41055" }, { "cve": "CVE-2024-41056", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41056" }, { "cve": "CVE-2024-41057", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41057" }, { "cve": "CVE-2024-41058", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41058" }, { "cve": "CVE-2024-41059", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41059" }, { "cve": "CVE-2024-41060", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41060" }, { "cve": "CVE-2024-41061", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41061" }, { "cve": "CVE-2024-41062", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41062" }, { "cve": "CVE-2024-41063", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41063" }, { "cve": "CVE-2024-41064", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41064" }, { "cve": "CVE-2024-41065", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41065" }, { "cve": "CVE-2024-41066", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41066" }, { "cve": "CVE-2024-41067", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41067" }, { "cve": "CVE-2024-41068", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41068" }, { "cve": "CVE-2024-41069", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41069" }, { "cve": "CVE-2024-41070", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41070" }, { "cve": "CVE-2024-41071", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41071" }, { "cve": "CVE-2024-41072", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41072" }, { "cve": "CVE-2024-41073", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41073" }, { "cve": "CVE-2024-41074", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41074" }, { "cve": "CVE-2024-41075", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41075" }, { "cve": "CVE-2024-41076", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41076" }, { "cve": "CVE-2024-41077", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41077" }, { "cve": "CVE-2024-41078", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41078" }, { "cve": "CVE-2024-41079", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41079" }, { "cve": "CVE-2024-41080", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41080" }, { "cve": "CVE-2024-41081", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41081" }, { "cve": "CVE-2024-41082", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41082" }, { "cve": "CVE-2024-41083", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41083" }, { "cve": "CVE-2024-41084", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41084" }, { "cve": "CVE-2024-41085", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41085" }, { "cve": "CVE-2024-41086", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41086" }, { "cve": "CVE-2024-41087", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41087" }, { "cve": "CVE-2024-41088", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41088" }, { "cve": "CVE-2024-41089", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41089" }, { "cve": "CVE-2024-41092", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41092" }, { "cve": "CVE-2024-41093", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41093" }, { "cve": "CVE-2024-41094", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41094" }, { "cve": "CVE-2024-41095", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41095" }, { "cve": "CVE-2024-41096", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41096" }, { "cve": "CVE-2024-41097", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41097" }, { "cve": "CVE-2024-41098", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-41098" }, { "cve": "CVE-2024-42063", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42063" }, { "cve": "CVE-2024-42064", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42064" }, { "cve": "CVE-2024-42065", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42065" }, { "cve": "CVE-2024-42066", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42066" }, { "cve": "CVE-2024-42067", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42067" }, { "cve": "CVE-2024-42068", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42068" }, { "cve": "CVE-2024-42069", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42069" }, { "cve": "CVE-2024-42070", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42070" }, { "cve": "CVE-2024-42071", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42071" }, { "cve": "CVE-2024-42072", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42072" }, { "cve": "CVE-2024-42073", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42073" }, { "cve": "CVE-2024-42074", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42074" }, { "cve": "CVE-2024-42075", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42075" }, { "cve": "CVE-2024-42076", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42076" }, { "cve": "CVE-2024-42077", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42077" }, { "cve": "CVE-2024-42078", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42078" }, { "cve": "CVE-2024-42079", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42079" }, { "cve": "CVE-2024-42080", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42080" }, { "cve": "CVE-2024-42081", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42081" }, { "cve": "CVE-2024-42082", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42082" }, { "cve": "CVE-2024-42083", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42083" }, { "cve": "CVE-2024-42084", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42084" }, { "cve": "CVE-2024-42085", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42085" }, { "cve": "CVE-2024-42086", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42086" }, { "cve": "CVE-2024-42087", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42087" }, { "cve": "CVE-2024-42088", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42088" }, { "cve": "CVE-2024-42089", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42089" }, { "cve": "CVE-2024-42090", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42090" }, { "cve": "CVE-2024-42091", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42091" }, { "cve": "CVE-2024-42092", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42092" }, { "cve": "CVE-2024-42093", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42093" }, { "cve": "CVE-2024-42094", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42094" }, { "cve": "CVE-2024-42095", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42095" }, { "cve": "CVE-2024-42096", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42096" }, { "cve": "CVE-2024-42097", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42097" }, { "cve": "CVE-2024-42098", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42098" }, { "cve": "CVE-2024-42099", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42099" }, { "cve": "CVE-2024-42100", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42100" }, { "cve": "CVE-2024-42101", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42101" }, { "cve": "CVE-2024-42102", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42102" }, { "cve": "CVE-2024-42103", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42103" }, { "cve": "CVE-2024-42104", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42104" }, { "cve": "CVE-2024-42105", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42105" }, { "cve": "CVE-2024-42106", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42106" }, { "cve": "CVE-2024-42107", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42107" }, { "cve": "CVE-2024-42108", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42108" }, { "cve": "CVE-2024-42109", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42109" }, { "cve": "CVE-2024-42110", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42110" }, { "cve": "CVE-2024-42111", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42111" }, { "cve": "CVE-2024-42112", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42112" }, { "cve": "CVE-2024-42113", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42113" }, { "cve": "CVE-2024-42114", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42114" }, { "cve": "CVE-2024-42115", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42115" }, { "cve": "CVE-2024-42116", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42116" }, { "cve": "CVE-2024-42117", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42117" }, { "cve": "CVE-2024-42118", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42118" }, { "cve": "CVE-2024-42119", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42119" }, { "cve": "CVE-2024-42120", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42120" }, { "cve": "CVE-2024-42121", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42121" }, { "cve": "CVE-2024-42122", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42122" }, { "cve": "CVE-2024-42123", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42123" }, { "cve": "CVE-2024-42124", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42124" }, { "cve": "CVE-2024-42125", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42125" }, { "cve": "CVE-2024-42126", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42126" }, { "cve": "CVE-2024-42127", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42127" }, { "cve": "CVE-2024-42128", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42128" }, { "cve": "CVE-2024-42129", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42129" }, { "cve": "CVE-2024-42130", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42130" }, { "cve": "CVE-2024-42131", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42131" }, { "cve": "CVE-2024-42132", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42132" }, { "cve": "CVE-2024-42133", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42133" }, { "cve": "CVE-2024-42134", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42134" }, { "cve": "CVE-2024-42135", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42135" }, { "cve": "CVE-2024-42136", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42136" }, { "cve": "CVE-2024-42137", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42137" }, { "cve": "CVE-2024-42138", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42138" }, { "cve": "CVE-2024-42139", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42139" }, { "cve": "CVE-2024-42140", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42140" }, { "cve": "CVE-2024-42141", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42141" }, { "cve": "CVE-2024-42142", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42142" }, { "cve": "CVE-2024-42143", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42143" }, { "cve": "CVE-2024-42144", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42144" }, { "cve": "CVE-2024-42145", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42145" }, { "cve": "CVE-2024-42146", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42146" }, { "cve": "CVE-2024-42147", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42147" }, { "cve": "CVE-2024-42148", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42148" }, { "cve": "CVE-2024-42149", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42149" }, { "cve": "CVE-2024-42150", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42150" }, { "cve": "CVE-2024-42151", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42151" }, { "cve": "CVE-2024-42152", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42152" }, { "cve": "CVE-2024-42153", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42153" }, { "cve": "CVE-2024-42154", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42154" }, { "cve": "CVE-2024-42155", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42155" }, { "cve": "CVE-2024-42156", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42156" }, { "cve": "CVE-2024-42157", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42157" }, { "cve": "CVE-2024-42158", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42158" }, { "cve": "CVE-2024-42159", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42159" }, { "cve": "CVE-2024-42160", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42160" }, { "cve": "CVE-2024-42161", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42161" }, { "cve": "CVE-2024-42162", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42162" }, { "cve": "CVE-2024-42223", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42223" }, { "cve": "CVE-2024-42224", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42224" }, { "cve": "CVE-2024-42225", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42225" }, { "cve": "CVE-2024-42226", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42226" }, { "cve": "CVE-2024-42227", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42227" }, { "cve": "CVE-2024-42228", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42228" }, { "cve": "CVE-2024-42229", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42229" }, { "cve": "CVE-2024-42230", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42230" }, { "cve": "CVE-2024-42231", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Diese Schwachstellen umfassen eine Vielzahl von Sicherheitsproblemen, die haupts\u00e4chlich mit der Speicherverwaltung und der Datenverarbeitung im Linux-Kernel und den zugeh\u00f6rigen Treibern und Subsystemen zusammenh\u00e4ngen. Ein Angreifer kann diese Sicherheitsl\u00fccken ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T036489", "T004914", "T032255", "T038741" ] }, "release_date": "2024-07-29T22:00:00.000+00:00", "title": "CVE-2024-42231" } ] }
cve-2024-42135
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
vhost_task: Handle SIGKILL by flushing work and exiting
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.448Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/abe067dc3a662eef7d5cddbbc41ed50a0b68b0af" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/dec987fe2df670827eb53b97c9552ed8dfc63ad4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/db5247d9bf5c6ade9fd70b4e4897441e0269b233" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42135", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:12.775085Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:36.049Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/vhost/vhost.c", "drivers/vhost/vhost.h", "include/linux/sched/vhost_task.h", "kernel/vhost_task.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "abe067dc3a66", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "dec987fe2df6", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "db5247d9bf5c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/vhost/vhost.c", "drivers/vhost/vhost.h", "include/linux/sched/vhost_task.h", "kernel/vhost_task.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost_task: Handle SIGKILL by flushing work and exiting\n\nInstead of lingering until the device is closed, this has us handle\nSIGKILL by:\n\n1. marking the worker as killed so we no longer try to use it with\n new virtqueues and new flush operations.\n2. setting the virtqueue to worker mapping so no new works are queued.\n3. running all the exiting works." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:04.860Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/abe067dc3a662eef7d5cddbbc41ed50a0b68b0af" }, { "url": "https://git.kernel.org/stable/c/dec987fe2df670827eb53b97c9552ed8dfc63ad4" }, { "url": "https://git.kernel.org/stable/c/db5247d9bf5c6ade9fd70b4e4897441e0269b233" } ], "title": "vhost_task: Handle SIGKILL by flushing work and exiting", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42135", "datePublished": "2024-07-30T07:46:30.271Z", "dateReserved": "2024-07-29T15:50:41.187Z", "dateUpdated": "2024-11-05T09:38:04.860Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42227
Vulnerability from cvelistv5
Published
2024-07-30 07:47
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
drm/amd/display: Fix overlapping copy within dml_core_mode_programming
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9342da15f2491d8600eca89c8e0da08876fb969b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f1fd8a0a54e6d23a6d16ee29159f247862460fd1" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42227", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:14:34.746071Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:33.198Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/dml2/display_mode_core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "9342da15f249", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "f1fd8a0a54e6", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/dml2/display_mode_core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix overlapping copy within dml_core_mode_programming\n\n[WHY]\n\u0026mode_lib-\u003emp.Watermark and \u0026locals-\u003eWatermark are\nthe same address. memcpy may lead to unexpected behavior.\n\n[HOW]\nmemmove should be used." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:38.275Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/9342da15f2491d8600eca89c8e0da08876fb969b" }, { "url": "https://git.kernel.org/stable/c/f1fd8a0a54e6d23a6d16ee29159f247862460fd1" } ], "title": "drm/amd/display: Fix overlapping copy within dml_core_mode_programming", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42227", "datePublished": "2024-07-30T07:47:08.132Z", "dateReserved": "2024-07-30T07:40:12.250Z", "dateUpdated": "2024-11-05T09:38:38.275Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42100
Vulnerability from cvelistv5
Published
2024-07-30 07:45
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
clk: sunxi-ng: common: Don't call hw_to_ccu_common on hw without common
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.811Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/14c78d69dbca6a28af14095f639ec4318ec07fdc" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7a0e2738cb6da5a55c9908dff333600aeb263e07" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ea977d742507e534d9fe4f4d74256f6b7f589338" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42100", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:18:05.695345Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:59.660Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/clk/sunxi-ng/ccu_common.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "14c78d69dbca", "status": "affected", "version": "547263745e15", "versionType": "git" }, { "lessThan": "7a0e2738cb6d", "status": "affected", "version": "b914ec33b391", "versionType": "git" }, { "lessThan": "ea977d742507", "status": "affected", "version": "b914ec33b391", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/clk/sunxi-ng/ccu_common.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.9" }, { "lessThan": "6.9", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: sunxi-ng: common: Don\u0027t call hw_to_ccu_common on hw without common\n\nIn order to set the rate range of a hw sunxi_ccu_probe calls\nhw_to_ccu_common() assuming all entries in desc-\u003eccu_clks are contained\nin a ccu_common struct. This assumption is incorrect and, in\nconsequence, causes invalid pointer de-references.\n\nRemove the faulty call. Instead, add one more loop that iterates over\nthe ccu_clks and sets the rate range, if required." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:24.320Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/14c78d69dbca6a28af14095f639ec4318ec07fdc" }, { "url": "https://git.kernel.org/stable/c/7a0e2738cb6da5a55c9908dff333600aeb263e07" }, { "url": "https://git.kernel.org/stable/c/ea977d742507e534d9fe4f4d74256f6b7f589338" } ], "title": "clk: sunxi-ng: common: Don\u0027t call hw_to_ccu_common on hw without common", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42100", "datePublished": "2024-07-30T07:45:56.462Z", "dateReserved": "2024-07-29T15:50:41.173Z", "dateUpdated": "2024-11-05T09:37:24.320Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42096
Vulnerability from cvelistv5
Published
2024-07-29 17:39
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
x86: stop playing stack games in profile_pc()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.567Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/65ebdde16e7f5da99dbf8a548fb635837d78384e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/27c3be840911b15a3f24ed623f86153c825b6b29" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/49c09ca35a5f521d7fa18caf62fdf378f15e8aa4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2d07fea561d64357fb7b3f3751e653bf20306d77" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/161cef818545ecf980f0e2ebaf8ba7326ce53c2b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/16222beb9f8e5ceb0beeb5cbe54bef16df501a92" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a3b65c8cbc139bfce9541bc81c1bb766e5ba3f68" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/093d9603b60093a9aaae942db56107f6432a5dca" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42096", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:18:21.628470Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:00.264Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "arch/x86/kernel/time.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "65ebdde16e7f", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "27c3be840911", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "49c09ca35a5f", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "2d07fea561d6", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "161cef818545", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "16222beb9f8e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "a3b65c8cbc13", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "093d9603b600", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "arch/x86/kernel/time.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.317", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.279", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86: stop playing stack games in profile_pc()\n\nThe \u0027profile_pc()\u0027 function is used for timer-based profiling, which\nisn\u0027t really all that relevant any more to begin with, but it also ends\nup making assumptions based on the stack layout that aren\u0027t necessarily\nvalid.\n\nBasically, the code tries to account the time spent in spinlocks to the\ncaller rather than the spinlock, and while I support that as a concept,\nit\u0027s not worth the code complexity or the KASAN warnings when no serious\nprofiling is done using timers anyway these days.\n\nAnd the code really does depend on stack layout that is only true in the\nsimplest of cases. We\u0027ve lost the comment at some point (I think when\nthe 32-bit and 64-bit code was unified), but it used to say:\n\n\tAssume the lock function has either no stack frame or a copy\n\tof eflags from PUSHF.\n\nwhich explains why it just blindly loads a word or two straight off the\nstack pointer and then takes a minimal look at the values to just check\nif they might be eflags or the return pc:\n\n\tEflags always has bits 22 and up cleared unlike kernel addresses\n\nbut that basic stack layout assumption assumes that there isn\u0027t any lock\ndebugging etc going on that would complicate the code and cause a stack\nframe.\n\nIt causes KASAN unhappiness reported for years by syzkaller [1] and\nothers [2].\n\nWith no real practical reason for this any more, just remove the code.\n\nJust for historical interest, here\u0027s some background commits relating to\nthis code from 2006:\n\n 0cb91a229364 (\"i386: Account spinlocks to the caller during profiling for !FP kernels\")\n 31679f38d886 (\"Simplify profile_pc on x86-64\")\n\nand a code unification from 2009:\n\n ef4512882dbe (\"x86: time_32/64.c unify profile_pc\")\n\nbut the basics of this thing actually goes back to before the git tree." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:19.720Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/65ebdde16e7f5da99dbf8a548fb635837d78384e" }, { "url": "https://git.kernel.org/stable/c/27c3be840911b15a3f24ed623f86153c825b6b29" }, { "url": "https://git.kernel.org/stable/c/49c09ca35a5f521d7fa18caf62fdf378f15e8aa4" }, { "url": "https://git.kernel.org/stable/c/2d07fea561d64357fb7b3f3751e653bf20306d77" }, { "url": "https://git.kernel.org/stable/c/161cef818545ecf980f0e2ebaf8ba7326ce53c2b" }, { "url": "https://git.kernel.org/stable/c/16222beb9f8e5ceb0beeb5cbe54bef16df501a92" }, { "url": "https://git.kernel.org/stable/c/a3b65c8cbc139bfce9541bc81c1bb766e5ba3f68" }, { "url": "https://git.kernel.org/stable/c/093d9603b60093a9aaae942db56107f6432a5dca" } ], "title": "x86: stop playing stack games in profile_pc()", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42096", "datePublished": "2024-07-29T17:39:31.620Z", "dateReserved": "2024-07-29T15:50:41.173Z", "dateUpdated": "2024-11-05T09:37:19.720Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41062
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
bluetooth/l2cap: sync sock recv cb and release
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.343Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/605572e64cd9cebb05ed609d96cff05b50d18cdf" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b803f30ea23e0968b6c8285c42adf0d862ab2bf6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3b732449b78183d17178db40be3a4401cf3cd629" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/89e856e124f9ae548572c56b1b70c2255705f8fe" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41062", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:05.690775Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:59.338Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/bluetooth/l2cap_sock.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "605572e64cd9", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "b803f30ea23e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "3b732449b781", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "89e856e124f9", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/bluetooth/l2cap_sock.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbluetooth/l2cap: sync sock recv cb and release\n\nThe problem occurs between the system call to close the sock and hci_rx_work,\nwhere the former releases the sock and the latter accesses it without lock protection.\n\n CPU0 CPU1\n ---- ----\n sock_close hci_rx_work\n\t l2cap_sock_release hci_acldata_packet\n\t l2cap_sock_kill l2cap_recv_frame\n\t sk_free l2cap_conless_channel\n\t l2cap_sock_recv_cb\n\nIf hci_rx_work processes the data that needs to be received before the sock is\nclosed, then everything is normal; Otherwise, the work thread may access the\nreleased sock when receiving data.\n\nAdd a chan mutex in the rx callback of the sock to achieve synchronization between\nthe sock release and recv cb.\n\nSock is dead, so set chan data to NULL, avoid others use invalid sock pointer." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:58.891Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/605572e64cd9cebb05ed609d96cff05b50d18cdf" }, { "url": "https://git.kernel.org/stable/c/b803f30ea23e0968b6c8285c42adf0d862ab2bf6" }, { "url": "https://git.kernel.org/stable/c/3b732449b78183d17178db40be3a4401cf3cd629" }, { "url": "https://git.kernel.org/stable/c/89e856e124f9ae548572c56b1b70c2255705f8fe" } ], "title": "bluetooth/l2cap: sync sock recv cb and release", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41062", "datePublished": "2024-07-29T14:57:24.352Z", "dateReserved": "2024-07-12T12:17:45.627Z", "dateUpdated": "2024-11-05T09:35:58.891Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42149
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
fs: don't misleadingly warn during thaw operations
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.566Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/25b1e3906e050d452427bc51620bb7f0a591373a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2ae4db5647d807efb6a87c09efaa6d1db9c905d7" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42149", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:31.286320Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:34.789Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/super.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "25b1e3906e05", "status": "affected", "version": "49ef8832fb1a", "versionType": "git" }, { "lessThan": "2ae4db5647d8", "status": "affected", "version": "49ef8832fb1a", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/super.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.8" }, { "lessThan": "6.8", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: don\u0027t misleadingly warn during thaw operations\n\nThe block device may have been frozen before it was claimed by a\nfilesystem. Concurrently another process might try to mount that\nfrozen block device and has temporarily claimed the block device for\nthat purpose causing a concurrent fs_bdev_thaw() to end up here. The\nmounter is already about to abort mounting because they still saw an\nelevanted bdev-\u003ebd_fsfreeze_count so get_bdev_super() will return\nNULL in that case.\n\nFor example, P1 calls dm_suspend() which calls into bdev_freeze() before\nthe block device has been claimed by the filesystem. This brings\nbdev-\u003ebd_fsfreeze_count to 1 and no call into fs_bdev_freeze() is\nrequired.\n\nNow P2 tries to mount that frozen block device. It claims it and checks\nbdev-\u003ebd_fsfreeze_count. As it\u0027s elevated it aborts mounting.\n\nIn the meantime P3 called dm_resume(). P3 sees that the block device is\nalready claimed by a filesystem and calls into fs_bdev_thaw().\n\nP3 takes a passive reference and realizes that the filesystem isn\u0027t\nready yet. P3 puts itself to sleep to wait for the filesystem to become\nready.\n\nP2 now puts the last active reference to the filesystem and marks it as\ndying. P3 gets woken, sees that the filesystem is dying and\nget_bdev_super() fails." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:19.227Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/25b1e3906e050d452427bc51620bb7f0a591373a" }, { "url": "https://git.kernel.org/stable/c/2ae4db5647d807efb6a87c09efaa6d1db9c905d7" } ], "title": "fs: don\u0027t misleadingly warn during thaw operations", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42149", "datePublished": "2024-07-30T07:46:42.133Z", "dateReserved": "2024-07-29T15:50:41.191Z", "dateUpdated": "2024-11-05T09:38:19.227Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41033
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
cachestat: do not flush stats in recency check
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.232Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1d1ba14e00d290b1ed616ed78c8c49bf897ce390" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5a4d8944d6b1e1aaaa83ea42c116b520b4ed0394" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41033", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:23:40.809079Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:03.683Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "include/linux/swap.h", "mm/filemap.c", "mm/workingset.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "1d1ba14e00d2", "status": "affected", "version": "b00684722262", "versionType": "git" }, { "lessThan": "5a4d8944d6b1", "status": "affected", "version": "b00684722262", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "include/linux/swap.h", "mm/filemap.c", "mm/workingset.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.8" }, { "lessThan": "6.8", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachestat: do not flush stats in recency check\n\nsyzbot detects that cachestat() is flushing stats, which can sleep, in its\nRCU read section (see [1]). This is done in the workingset_test_recent()\nstep (which checks if the folio\u0027s eviction is recent).\n\nMove the stat flushing step to before the RCU read section of cachestat,\nand skip stat flushing during the recency check.\n\n[1]: https://lore.kernel.org/cgroups/000000000000f71227061bdf97e0@google.com/" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:22.006Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/1d1ba14e00d290b1ed616ed78c8c49bf897ce390" }, { "url": "https://git.kernel.org/stable/c/5a4d8944d6b1e1aaaa83ea42c116b520b4ed0394" } ], "title": "cachestat: do not flush stats in recency check", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41033", "datePublished": "2024-07-29T14:31:48.256Z", "dateReserved": "2024-07-12T12:17:45.619Z", "dateUpdated": "2024-11-05T09:35:22.006Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42071
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
ionic: use dev_consume_skb_any outside of napi
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.247Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ef7646ed49fff962e97b276f4ab91327a67eeb5a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/84b767f9e34fdb143c09e66a2a20722fc2921821" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42071", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:43.105233Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:58.060Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/pensando/ionic/ionic_dev.h", "drivers/net/ethernet/pensando/ionic/ionic_lif.c", "drivers/net/ethernet/pensando/ionic/ionic_txrx.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "ef7646ed49ff", "status": "affected", "version": "386e69865311", "versionType": "git" }, { "lessThan": "84b767f9e34f", "status": "affected", "version": "386e69865311", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/pensando/ionic/ionic_dev.h", "drivers/net/ethernet/pensando/ionic/ionic_lif.c", "drivers/net/ethernet/pensando/ionic/ionic_txrx.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.9" }, { "lessThan": "6.9", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nionic: use dev_consume_skb_any outside of napi\n\nIf we\u0027re not in a NAPI softirq context, we need to be careful\nabout how we call napi_consume_skb(), specifically we need to\ncall it with budget==0 to signal to it that we\u0027re not in a\nsafe context.\n\nThis was found while running some configuration stress testing\nof traffic and a change queue config loop running, and this\ncurious note popped out:\n\n[ 4371.402645] BUG: using smp_processor_id() in preemptible [00000000] code: ethtool/20545\n[ 4371.402897] caller is napi_skb_cache_put+0x16/0x80\n[ 4371.403120] CPU: 25 PID: 20545 Comm: ethtool Kdump: loaded Tainted: G OE 6.10.0-rc3-netnext+ #8\n[ 4371.403302] Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 01/23/2021\n[ 4371.403460] Call Trace:\n[ 4371.403613] \u003cTASK\u003e\n[ 4371.403758] dump_stack_lvl+0x4f/0x70\n[ 4371.403904] check_preemption_disabled+0xc1/0xe0\n[ 4371.404051] napi_skb_cache_put+0x16/0x80\n[ 4371.404199] ionic_tx_clean+0x18a/0x240 [ionic]\n[ 4371.404354] ionic_tx_cq_service+0xc4/0x200 [ionic]\n[ 4371.404505] ionic_tx_flush+0x15/0x70 [ionic]\n[ 4371.404653] ? ionic_lif_qcq_deinit.isra.23+0x5b/0x70 [ionic]\n[ 4371.404805] ionic_txrx_deinit+0x71/0x190 [ionic]\n[ 4371.404956] ionic_reconfigure_queues+0x5f5/0xff0 [ionic]\n[ 4371.405111] ionic_set_ringparam+0x2e8/0x3e0 [ionic]\n[ 4371.405265] ethnl_set_rings+0x1f1/0x300\n[ 4371.405418] ethnl_default_set_doit+0xbb/0x160\n[ 4371.405571] genl_family_rcv_msg_doit+0xff/0x130\n\t[...]\n\nI found that ionic_tx_clean() calls napi_consume_skb() which calls\nnapi_skb_cache_put(), but before that last call is the note\n /* Zero budget indicate non-NAPI context called us, like netpoll */\nand\n DEBUG_NET_WARN_ON_ONCE(!in_softirq());\n\nThose are pretty big hints that we\u0027re doing it wrong. We can pass a\ncontext hint down through the calls to let ionic_tx_clean() know what\nwe\u0027re doing so it can call napi_consume_skb() correctly." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:50.296Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/ef7646ed49fff962e97b276f4ab91327a67eeb5a" }, { "url": "https://git.kernel.org/stable/c/84b767f9e34fdb143c09e66a2a20722fc2921821" } ], "title": "ionic: use dev_consume_skb_any outside of napi", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42071", "datePublished": "2024-07-29T15:52:34.714Z", "dateReserved": "2024-07-29T15:50:41.168Z", "dateUpdated": "2024-11-05T09:36:50.296Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42226
Vulnerability from cvelistv5
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Show details on NVD website{ "containers": { "cna": { "providerMetadata": { "dateUpdated": "2024-08-11T15:33:01.397Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "rejectedReasons": [ { "lang": "en", "value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42226", "datePublished": "2024-07-30T07:47:07.319Z", "dateRejected": "2024-08-11T15:33:01.397Z", "dateReserved": "2024-07-30T07:40:12.250Z", "dateUpdated": "2024-08-11T15:33:01.397Z", "state": "REJECTED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42150
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
net: txgbe: remove separate irq request for MSI and INTx
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.253Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/850103ebe6b062ee0ab0f6670205f861acc76ace" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/bd07a98178462e7a02ed2bf7dec90a00944c1da5" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42150", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:28.119432Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:34.677Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/wangxun/libwx/wx_hw.c", "drivers/net/ethernet/wangxun/libwx/wx_lib.c", "drivers/net/ethernet/wangxun/libwx/wx_type.h", "drivers/net/ethernet/wangxun/txgbe/txgbe_irq.c", "drivers/net/ethernet/wangxun/txgbe/txgbe_irq.h", "drivers/net/ethernet/wangxun/txgbe/txgbe_main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "850103ebe6b0", "status": "affected", "version": "aefd013624a1", "versionType": "git" }, { "lessThan": "bd07a9817846", "status": "affected", "version": "aefd013624a1", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/wangxun/libwx/wx_hw.c", "drivers/net/ethernet/wangxun/libwx/wx_lib.c", "drivers/net/ethernet/wangxun/libwx/wx_type.h", "drivers/net/ethernet/wangxun/txgbe/txgbe_irq.c", "drivers/net/ethernet/wangxun/txgbe/txgbe_irq.h", "drivers/net/ethernet/wangxun/txgbe/txgbe_main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.9" }, { "lessThan": "6.9", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: txgbe: remove separate irq request for MSI and INTx\n\nWhen using MSI or INTx interrupts, request_irq() for pdev-\u003eirq will\nconflict with request_threaded_irq() for txgbe-\u003emisc.irq, to cause\nsystem crash. So remove txgbe_request_irq() for MSI/INTx case, and\nrename txgbe_request_msix_irqs() since it only request for queue irqs.\n\nAdd wx-\u003emisc_irq_domain to determine whether the driver creates an IRQ\ndomain and threaded request the IRQs." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:20.308Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/850103ebe6b062ee0ab0f6670205f861acc76ace" }, { "url": "https://git.kernel.org/stable/c/bd07a98178462e7a02ed2bf7dec90a00944c1da5" } ], "title": "net: txgbe: remove separate irq request for MSI and INTx", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42150", "datePublished": "2024-07-30T07:46:43.031Z", "dateReserved": "2024-07-29T15:50:41.191Z", "dateUpdated": "2024-11-05T09:38:20.308Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42105
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
nilfs2: fix inode number range checks
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.550Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/57235c3c88bb430043728d0d02f44a4efe386476" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/08cab183a624ba71603f3754643ae11cab34dbc4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/731011ac6c37cbe97ece229fc6daa486276052c5" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3be4dcc8d7bea52ea41f87aa4bbf959efe7a5987" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/fae1959d6ab2c52677b113935e36ab4e25df37ea" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9194f8ca57527958bee207919458e372d638d783" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1c91058425a01131ea30dda6cf43c67b17884d6a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e2fec219a36e0993642844be0f345513507031f4" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42105", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:49.299547Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:45.818Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/nilfs2/nilfs.h", "fs/nilfs2/the_nilfs.c", "fs/nilfs2/the_nilfs.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "57235c3c88bb", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "08cab183a624", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "731011ac6c37", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "3be4dcc8d7be", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "fae1959d6ab2", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "9194f8ca5752", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "1c91058425a0", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "e2fec219a36e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/nilfs2/nilfs.h", "fs/nilfs2/the_nilfs.c", "fs/nilfs2/the_nilfs.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix inode number range checks\n\nPatch series \"nilfs2: fix potential issues related to reserved inodes\".\n\nThis series fixes one use-after-free issue reported by syzbot, caused by\nnilfs2\u0027s internal inode being exposed in the namespace on a corrupted\nfilesystem, and a couple of flaws that cause problems if the starting\nnumber of non-reserved inodes written in the on-disk super block is\nintentionally (or corruptly) changed from its default value. \n\n\nThis patch (of 3):\n\nIn the current implementation of nilfs2, \"nilfs-\u003ens_first_ino\", which\ngives the first non-reserved inode number, is read from the superblock,\nbut its lower limit is not checked.\n\nAs a result, if a number that overlaps with the inode number range of\nreserved inodes such as the root directory or metadata files is set in the\nsuper block parameter, the inode number test macros (NILFS_MDT_INODE and\nNILFS_VALID_INODE) will not function properly.\n\nIn addition, these test macros use left bit-shift calculations using with\nthe inode number as the shift count via the BIT macro, but the result of a\nshift calculation that exceeds the bit width of an integer is undefined in\nthe C specification, so if \"ns_first_ino\" is set to a large value other\nthan the default value NILFS_USER_INO (=11), the macros may potentially\nmalfunction depending on the environment.\n\nFix these issues by checking the lower bound of \"nilfs-\u003ens_first_ino\" and\nby preventing bit shifts equal to or greater than the NILFS_USER_INO\nconstant in the inode number test macros.\n\nAlso, change the type of \"ns_first_ino\" from signed integer to unsigned\ninteger to avoid the need for type casting in comparisons such as the\nlower bound check introduced this time." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:30.302Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/57235c3c88bb430043728d0d02f44a4efe386476" }, { "url": "https://git.kernel.org/stable/c/08cab183a624ba71603f3754643ae11cab34dbc4" }, { "url": "https://git.kernel.org/stable/c/731011ac6c37cbe97ece229fc6daa486276052c5" }, { "url": "https://git.kernel.org/stable/c/3be4dcc8d7bea52ea41f87aa4bbf959efe7a5987" }, { "url": "https://git.kernel.org/stable/c/fae1959d6ab2c52677b113935e36ab4e25df37ea" }, { "url": "https://git.kernel.org/stable/c/9194f8ca57527958bee207919458e372d638d783" }, { "url": "https://git.kernel.org/stable/c/1c91058425a01131ea30dda6cf43c67b17884d6a" }, { "url": "https://git.kernel.org/stable/c/e2fec219a36e0993642844be0f345513507031f4" } ], "title": "nilfs2: fix inode number range checks", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42105", "datePublished": "2024-07-30T07:46:01.061Z", "dateReserved": "2024-07-29T15:50:41.175Z", "dateUpdated": "2024-11-05T09:37:30.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41068
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
s390/sclp: Fix sclp_init() cleanup on failure
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.367Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a778987afc36d5dc02a1f82d352a81edcaf7eb83" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/455a6653d8700a81aa8ed2b6442a3be476007090" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2e51db7ab71b89dc5a17068f5e201c69f13a4c9a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/cf521049fcd07071ed42dc9758fce7d5ee120ec6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/79b4be70d5a160969b805f638ac5b4efd0aac7a3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0a31b3fdc7e735c4f8c65fe4339945c717ed6808" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/be0259796d0b76bbc7461e12c186814a9e58244c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6434b33faaa063df500af355ee6c3942e0f8d982" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41068", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:46.444784Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:01.200Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/s390/char/sclp.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "a778987afc36", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "455a6653d870", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "2e51db7ab71b", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "cf521049fcd0", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "79b4be70d5a1", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "0a31b3fdc7e7", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "be0259796d0b", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "6434b33faaa0", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/s390/char/sclp.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.319", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.281", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.223", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.164", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/sclp: Fix sclp_init() cleanup on failure\n\nIf sclp_init() fails it only partially cleans up: if there are multiple\nfailing calls to sclp_init() sclp_state_change_event will be added several\ntimes to sclp_reg_list, which results in the following warning:\n\n------------[ cut here ]------------\nlist_add double add: new=000003ffe1598c10, prev=000003ffe1598bf0, next=000003ffe1598c10.\nWARNING: CPU: 0 PID: 1 at lib/list_debug.c:35 __list_add_valid_or_report+0xde/0xf8\nCPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.10.0-rc3\nKrnl PSW : 0404c00180000000 000003ffe0d6076a (__list_add_valid_or_report+0xe2/0xf8)\n R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3\n...\nCall Trace:\n [\u003c000003ffe0d6076a\u003e] __list_add_valid_or_report+0xe2/0xf8\n([\u003c000003ffe0d60766\u003e] __list_add_valid_or_report+0xde/0xf8)\n [\u003c000003ffe0a8d37e\u003e] sclp_init+0x40e/0x450\n [\u003c000003ffe00009f2\u003e] do_one_initcall+0x42/0x1e0\n [\u003c000003ffe15b77a6\u003e] do_initcalls+0x126/0x150\n [\u003c000003ffe15b7a0a\u003e] kernel_init_freeable+0x1ba/0x1f8\n [\u003c000003ffe0d6650e\u003e] kernel_init+0x2e/0x180\n [\u003c000003ffe000301c\u003e] __ret_from_fork+0x3c/0x60\n [\u003c000003ffe0d759ca\u003e] ret_from_fork+0xa/0x30\n\nFix this by removing sclp_state_change_event from sclp_reg_list when\nsclp_init() fails." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:06.203Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/a778987afc36d5dc02a1f82d352a81edcaf7eb83" }, { "url": "https://git.kernel.org/stable/c/455a6653d8700a81aa8ed2b6442a3be476007090" }, { "url": "https://git.kernel.org/stable/c/2e51db7ab71b89dc5a17068f5e201c69f13a4c9a" }, { "url": "https://git.kernel.org/stable/c/cf521049fcd07071ed42dc9758fce7d5ee120ec6" }, { "url": "https://git.kernel.org/stable/c/79b4be70d5a160969b805f638ac5b4efd0aac7a3" }, { "url": "https://git.kernel.org/stable/c/0a31b3fdc7e735c4f8c65fe4339945c717ed6808" }, { "url": "https://git.kernel.org/stable/c/be0259796d0b76bbc7461e12c186814a9e58244c" }, { "url": "https://git.kernel.org/stable/c/6434b33faaa063df500af355ee6c3942e0f8d982" } ], "title": "s390/sclp: Fix sclp_init() cleanup on failure", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41068", "datePublished": "2024-07-29T14:57:29.360Z", "dateReserved": "2024-07-12T12:17:45.630Z", "dateUpdated": "2024-11-05T09:36:06.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42108
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
net: rswitch: Avoid use-after-free in rswitch_poll()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.138Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/92cbbe7759193e3418f38d0d73f8fe125312c58b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9a0c28efeec6383ef22e97437616b920e7320b67" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42108", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:39.409257Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:07.014Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/renesas/rswitch.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "92cbbe775919", "status": "affected", "version": "271e015b9153", "versionType": "git" }, { "lessThan": "9a0c28efeec6", "status": "affected", "version": "271e015b9153", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/renesas/rswitch.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.8" }, { "lessThan": "6.8", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: rswitch: Avoid use-after-free in rswitch_poll()\n\nThe use-after-free is actually in rswitch_tx_free(), which is inlined in\nrswitch_poll(). Since `skb` and `gq-\u003eskbs[gq-\u003edirty]` are in fact the\nsame pointer, the skb is first freed using dev_kfree_skb_any(), then the\nvalue in skb-\u003elen is used to update the interface statistics.\n\nLet\u0027s move around the instructions to use skb-\u003elen before the skb is\nfreed.\n\nThis bug is trivial to reproduce using KFENCE. It will trigger a splat\nevery few packets. A simple ARP request or ICMP echo request is enough." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:34.203Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/92cbbe7759193e3418f38d0d73f8fe125312c58b" }, { "url": "https://git.kernel.org/stable/c/9a0c28efeec6383ef22e97437616b920e7320b67" } ], "title": "net: rswitch: Avoid use-after-free in rswitch_poll()", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42108", "datePublished": "2024-07-30T07:46:03.517Z", "dateReserved": "2024-07-29T15:50:41.176Z", "dateUpdated": "2024-11-05T09:37:34.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42114
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.578Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e87c2f098f52aa2fe20258a5bb1738d6a74e9ed7" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d1cba2ea8121e7fdbe1328cea782876b1dd80993" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42114", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:20.245237Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:06.151Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/wireless/nl80211.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "80ac0cc9c0be", "status": "affected", "version": "52539ca89f36", "versionType": "git" }, { "lessThan": "33ac5a4eb3d4", "status": "affected", "version": "52539ca89f36", "versionType": "git" }, { "lessThan": "3fc06f6d142d", "status": "affected", "version": "52539ca89f36", "versionType": "git" }, { "lessThan": "8a3ac7fb3696", "status": "affected", "version": "52539ca89f36", "versionType": "git" }, { "lessThan": "e87c2f098f52", "status": "affected", "version": "52539ca89f36", "versionType": "git" }, { "lessThan": "d1cba2ea8121", "status": "affected", "version": "52539ca89f36", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/wireless/nl80211.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.18" }, { "lessThan": "4.18", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.224", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.165", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.106", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.47", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values\n\nsyzbot is able to trigger softlockups, setting NL80211_ATTR_TXQ_QUANTUM\nto 2^31.\n\nWe had a similar issue in sch_fq, fixed with commit\nd9e15a273306 (\"pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM\")\n\nwatchdog: BUG: soft lockup - CPU#1 stuck for 26s! [kworker/1:0:24]\nModules linked in:\nirq event stamp: 131135\n hardirqs last enabled at (131134): [\u003cffff80008ae8778c\u003e] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:85 [inline]\n hardirqs last enabled at (131134): [\u003cffff80008ae8778c\u003e] exit_to_kernel_mode+0xdc/0x10c arch/arm64/kernel/entry-common.c:95\n hardirqs last disabled at (131135): [\u003cffff80008ae85378\u003e] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]\n hardirqs last disabled at (131135): [\u003cffff80008ae85378\u003e] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551\n softirqs last enabled at (125892): [\u003cffff80008907e82c\u003e] neigh_hh_init net/core/neighbour.c:1538 [inline]\n softirqs last enabled at (125892): [\u003cffff80008907e82c\u003e] neigh_resolve_output+0x268/0x658 net/core/neighbour.c:1553\n softirqs last disabled at (125896): [\u003cffff80008904166c\u003e] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19\nCPU: 1 PID: 24 Comm: kworker/1:0 Not tainted 6.9.0-rc7-syzkaller-gfda5695d692c #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nWorkqueue: mld mld_ifc_work\npstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : __list_del include/linux/list.h:195 [inline]\n pc : __list_del_entry include/linux/list.h:218 [inline]\n pc : list_move_tail include/linux/list.h:310 [inline]\n pc : fq_tin_dequeue include/net/fq_impl.h:112 [inline]\n pc : ieee80211_tx_dequeue+0x6b8/0x3b4c net/mac80211/tx.c:3854\n lr : __list_del_entry include/linux/list.h:218 [inline]\n lr : list_move_tail include/linux/list.h:310 [inline]\n lr : fq_tin_dequeue include/net/fq_impl.h:112 [inline]\n lr : ieee80211_tx_dequeue+0x67c/0x3b4c net/mac80211/tx.c:3854\nsp : ffff800093d36700\nx29: ffff800093d36a60 x28: ffff800093d36960 x27: dfff800000000000\nx26: ffff0000d800ad50 x25: ffff0000d800abe0 x24: ffff0000d800abf0\nx23: ffff0000e0032468 x22: ffff0000e00324d4 x21: ffff0000d800abf0\nx20: ffff0000d800abf8 x19: ffff0000d800abf0 x18: ffff800093d363c0\nx17: 000000000000d476 x16: ffff8000805519dc x15: ffff7000127a6cc8\nx14: 1ffff000127a6cc8 x13: 0000000000000004 x12: ffffffffffffffff\nx11: ffff7000127a6cc8 x10: 0000000000ff0100 x9 : 0000000000000000\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : ffff80009287aa08 x4 : 0000000000000008 x3 : ffff80008034c7fc\nx2 : ffff0000e0032468 x1 : 00000000da0e46b8 x0 : ffff0000e0032470\nCall trace:\n __list_del include/linux/list.h:195 [inline]\n __list_del_entry include/linux/list.h:218 [inline]\n list_move_tail include/linux/list.h:310 [inline]\n fq_tin_dequeue include/net/fq_impl.h:112 [inline]\n ieee80211_tx_dequeue+0x6b8/0x3b4c net/mac80211/tx.c:3854\n wake_tx_push_queue net/mac80211/util.c:294 [inline]\n ieee80211_handle_wake_tx_queue+0x118/0x274 net/mac80211/util.c:315\n drv_wake_tx_queue net/mac80211/driver-ops.h:1350 [inline]\n schedule_and_wake_txq net/mac80211/driver-ops.h:1357 [inline]\n ieee80211_queue_skb+0x18e8/0x2244 net/mac80211/tx.c:1664\n ieee80211_tx+0x260/0x400 net/mac80211/tx.c:1966\n ieee80211_xmit+0x278/0x354 net/mac80211/tx.c:2062\n __ieee80211_subif_start_xmit+0xab8/0x122c net/mac80211/tx.c:4338\n ieee80211_subif_start_xmit+0xe0/0x438 net/mac80211/tx.c:4532\n __netdev_start_xmit include/linux/netdevice.h:4903 [inline]\n netdev_start_xmit include/linux/netdevice.h:4917 [inline]\n xmit_one net/core/dev.c:3531 [inline]\n dev_hard_start_xmit+0x27c/0x938 net/core/dev.c:3547\n __dev_queue_xmit+0x1678/0x33fc net/core/dev.c:4341\n dev_queue_xmit include/linux/netdevice.h:3091 [inline]\n neigh_resolve_output+0x558/0x658 net/core/neighbour.c:1563\n neigh_output include/net/neighbour.h:542 [inline]\n ip6_fini\n---truncated---" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:41.078Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/80ac0cc9c0bef984e29637b1efa93d7214b42f53" }, { "url": "https://git.kernel.org/stable/c/33ac5a4eb3d4bea2146658f1b6d1fa86d62d2b22" }, { "url": "https://git.kernel.org/stable/c/3fc06f6d142d2840735543216a60d0a8c345bdec" }, { "url": "https://git.kernel.org/stable/c/8a3ac7fb36962c34698f884bd697938054ff2afa" }, { "url": "https://git.kernel.org/stable/c/e87c2f098f52aa2fe20258a5bb1738d6a74e9ed7" }, { "url": "https://git.kernel.org/stable/c/d1cba2ea8121e7fdbe1328cea782876b1dd80993" } ], "title": "wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42114", "datePublished": "2024-07-30T07:46:07.596Z", "dateReserved": "2024-07-29T15:50:41.178Z", "dateUpdated": "2024-11-05T09:37:41.078Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42116
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
igc: fix a log entry using uninitialized netdev
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.554Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/96839f3f588236593de36465f142b0126267f8b6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/98c8958980e829f023a490b9a9816ca1fe2f8b79" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/991f036cabc3d13e886a37faeea1b6800181fdda" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d478ec838cf2b1e1051a8709cfc744fe1c03110f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/86167183a17e03ec77198897975e9fdfbd53cb0b" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42116", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:13.688234Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:05.887Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/intel/igc/igc_main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "96839f3f5882", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "98c8958980e8", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "991f036cabc3", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "d478ec838cf2", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "86167183a17e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/intel/igc/igc_main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nigc: fix a log entry using uninitialized netdev\n\nDuring successful probe, igc logs this:\n\n[ 5.133667] igc 0000:01:00.0 (unnamed net_device) (uninitialized): PHC added\n ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^\nThe reason is that igc_ptp_init() is called very early, even before\nregister_netdev() has been called. So the netdev_info() call works\non a partially uninitialized netdev.\n\nFix this by calling igc_ptp_init() after register_netdev(), right\nafter the media autosense check, just as in igb. Add a comment,\njust as in igb.\n\nNow the log message is fine:\n\n[ 5.200987] igc 0000:01:00.0 eth0: PHC added" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:43.359Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/96839f3f588236593de36465f142b0126267f8b6" }, { "url": "https://git.kernel.org/stable/c/98c8958980e829f023a490b9a9816ca1fe2f8b79" }, { "url": "https://git.kernel.org/stable/c/991f036cabc3d13e886a37faeea1b6800181fdda" }, { "url": "https://git.kernel.org/stable/c/d478ec838cf2b1e1051a8709cfc744fe1c03110f" }, { "url": "https://git.kernel.org/stable/c/86167183a17e03ec77198897975e9fdfbd53cb0b" } ], "title": "igc: fix a log entry using uninitialized netdev", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42116", "datePublished": "2024-07-30T07:46:08.969Z", "dateReserved": "2024-07-29T15:50:41.178Z", "dateUpdated": "2024-11-05T09:37:43.359Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42128
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
leds: an30259a: Use devm_mutex_init() for mutex initialization
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.855Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3ead19aa341de89a8c3d88a091d8093ebea622e8" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9dba44460bfca657ca43f03ea9bafa4f9f7dd077" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c382e2e3eccb6b7ca8c7aff5092c1668428e7de6" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42128", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:35.114946Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:04.248Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/leds/leds-an30259a.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "3ead19aa341d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "9dba44460bfc", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "c382e2e3eccb", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/leds/leds-an30259a.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nleds: an30259a: Use devm_mutex_init() for mutex initialization\n\nIn this driver LEDs are registered using devm_led_classdev_register()\nso they are automatically unregistered after module\u0027s remove() is done.\nled_classdev_unregister() calls module\u0027s led_set_brightness() to turn off\nthe LEDs and that callback uses mutex which was destroyed already\nin module\u0027s remove() so use devm API instead." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:56.895Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/3ead19aa341de89a8c3d88a091d8093ebea622e8" }, { "url": "https://git.kernel.org/stable/c/9dba44460bfca657ca43f03ea9bafa4f9f7dd077" }, { "url": "https://git.kernel.org/stable/c/c382e2e3eccb6b7ca8c7aff5092c1668428e7de6" } ], "title": "leds: an30259a: Use devm_mutex_init() for mutex initialization", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42128", "datePublished": "2024-07-30T07:46:24.751Z", "dateReserved": "2024-07-29T15:50:41.185Z", "dateUpdated": "2024-11-05T09:37:56.895Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42147
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
crypto: hisilicon/debugfs - Fix debugfs uninit process issue
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.071Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/eda60520cfe3aba9f088c68ebd5bcbca9fc6ac3c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7fc8d9a525b5c3f8dfa5ed50901e764d8ede7e1e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e0a2d2df9ba7bd6bd7e0a9b6a5e3894f7e8445b3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8be0913389718e8d27c4f1d4537b5e1b99ed7739" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42147", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:37.938500Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:35.009Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/crypto/hisilicon/debugfs.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "eda60520cfe3", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "7fc8d9a525b5", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "e0a2d2df9ba7", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "8be091338971", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/crypto/hisilicon/debugfs.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: hisilicon/debugfs - Fix debugfs uninit process issue\n\nDuring the zip probe process, the debugfs failure does not stop\nthe probe. When debugfs initialization fails, jumping to the\nerror branch will also release regs, in addition to its own\nrollback operation.\n\nAs a result, it may be released repeatedly during the regs\nuninit process. Therefore, the null check needs to be added to\nthe regs uninit process." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:16.931Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/eda60520cfe3aba9f088c68ebd5bcbca9fc6ac3c" }, { "url": "https://git.kernel.org/stable/c/7fc8d9a525b5c3f8dfa5ed50901e764d8ede7e1e" }, { "url": "https://git.kernel.org/stable/c/e0a2d2df9ba7bd6bd7e0a9b6a5e3894f7e8445b3" }, { "url": "https://git.kernel.org/stable/c/8be0913389718e8d27c4f1d4537b5e1b99ed7739" } ], "title": "crypto: hisilicon/debugfs - Fix debugfs uninit process issue", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42147", "datePublished": "2024-07-30T07:46:40.483Z", "dateReserved": "2024-07-29T15:50:41.191Z", "dateUpdated": "2024-11-05T09:38:16.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42104
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
nilfs2: add missing check for inode numbers on directory entries
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.472Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c33c2b0d92aa1c2262d999b2598ad6fbd53bd479" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/07c176e7acc5579c133bb923ab21316d192d0a95" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2f2fa9cf7c3537958a82fbe8c8595a5eb0861ad7" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b11e8fb93ea5eefb2e4e719497ea177a58ff6131" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1b7d549ed2c1fa202c751b69423a0d3a6bd5a180" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3ab40870edb883b9633dc5cd55f5a2a11afa618d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/265fff1a01cdc083aeaf0d934c929db5cc64aebf" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/bb76c6c274683c8570ad788f79d4b875bde0e458" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42104", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:52.439171Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:46.802Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/nilfs2/dir.c", "fs/nilfs2/nilfs.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "c33c2b0d92aa", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "07c176e7acc5", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "2f2fa9cf7c35", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "b11e8fb93ea5", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "1b7d549ed2c1", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "3ab40870edb8", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "265fff1a01cd", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "bb76c6c27468", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/nilfs2/dir.c", "fs/nilfs2/nilfs.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: add missing check for inode numbers on directory entries\n\nSyzbot reported that mounting and unmounting a specific pattern of\ncorrupted nilfs2 filesystem images causes a use-after-free of metadata\nfile inodes, which triggers a kernel bug in lru_add_fn().\n\nAs Jan Kara pointed out, this is because the link count of a metadata file\ngets corrupted to 0, and nilfs_evict_inode(), which is called from iput(),\ntries to delete that inode (ifile inode in this case).\n\nThe inconsistency occurs because directories containing the inode numbers\nof these metadata files that should not be visible in the namespace are\nread without checking.\n\nFix this issue by treating the inode numbers of these internal files as\nerrors in the sanity check helper when reading directory folios/pages.\n\nAlso thanks to Hillf Danton and Matthew Wilcox for their initial mm-layer\nanalysis." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:28.956Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/c33c2b0d92aa1c2262d999b2598ad6fbd53bd479" }, { "url": "https://git.kernel.org/stable/c/07c176e7acc5579c133bb923ab21316d192d0a95" }, { "url": "https://git.kernel.org/stable/c/2f2fa9cf7c3537958a82fbe8c8595a5eb0861ad7" }, { "url": "https://git.kernel.org/stable/c/b11e8fb93ea5eefb2e4e719497ea177a58ff6131" }, { "url": "https://git.kernel.org/stable/c/1b7d549ed2c1fa202c751b69423a0d3a6bd5a180" }, { "url": "https://git.kernel.org/stable/c/3ab40870edb883b9633dc5cd55f5a2a11afa618d" }, { "url": "https://git.kernel.org/stable/c/265fff1a01cdc083aeaf0d934c929db5cc64aebf" }, { "url": "https://git.kernel.org/stable/c/bb76c6c274683c8570ad788f79d4b875bde0e458" } ], "title": "nilfs2: add missing check for inode numbers on directory entries", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42104", "datePublished": "2024-07-30T07:46:00.180Z", "dateReserved": "2024-07-29T15:50:41.175Z", "dateUpdated": "2024-11-05T09:37:28.956Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42160
Vulnerability from cvelistv5
Published
2024-07-30 07:47
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
f2fs: check validation of fault attrs in f2fs_build_fault_attr()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.564Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/bc84dd2c33e0c10fd90d60f0cfc0bfb504d4692d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/44958ca9e400f57bd0478115519ffc350fcee61e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ecb641f424d6d1f055d149a15b892edcc92c504b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4ed886b187f47447ad559619c48c086f432d2b77" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42160", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:14:55.625986Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:33.660Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/f2fs/f2fs.h", "fs/f2fs/super.c", "fs/f2fs/sysfs.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "bc84dd2c33e0", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "44958ca9e400", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "ecb641f424d6", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "4ed886b187f4", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/f2fs/f2fs.h", "fs/f2fs/super.c", "fs/f2fs/sysfs.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: check validation of fault attrs in f2fs_build_fault_attr()\n\n- It missed to check validation of fault attrs in parse_options(),\nlet\u0027s fix to add check condition in f2fs_build_fault_attr().\n- Use f2fs_build_fault_attr() in __sbi_store() to clean up code." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:31.703Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/bc84dd2c33e0c10fd90d60f0cfc0bfb504d4692d" }, { "url": "https://git.kernel.org/stable/c/44958ca9e400f57bd0478115519ffc350fcee61e" }, { "url": "https://git.kernel.org/stable/c/ecb641f424d6d1f055d149a15b892edcc92c504b" }, { "url": "https://git.kernel.org/stable/c/4ed886b187f47447ad559619c48c086f432d2b77" } ], "title": "f2fs: check validation of fault attrs in f2fs_build_fault_attr()", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42160", "datePublished": "2024-07-30T07:47:02.208Z", "dateReserved": "2024-07-29T15:50:41.196Z", "dateUpdated": "2024-11-05T09:38:31.703Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41093
Vulnerability from cvelistv5
Published
2024-07-29 15:48
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
drm/amdgpu: avoid using null object of framebuffer
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.289Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7f35e01cb0ea4d295f5c067bb5c67dfcddaf05bc" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6ce0544cabaa608018d5922ab404dc656a9d8447" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/330c8c1453848c04d335bad81371a66710210800" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/dd9ec0ea4cdde0fc48116e63969fc83e81d7ef46" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/bcfa48ff785bd121316592b131ff6531e3e696bb" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41093", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:32.237829Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:55.898Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/amdgpu/amdgpu_vkms.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "7f35e01cb0ea", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "6ce0544cabaa", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "330c8c145384", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "dd9ec0ea4cdd", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "bcfa48ff785b", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/amdgpu/amdgpu_vkms.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: avoid using null object of framebuffer\n\nInstead of using state-\u003efb-\u003eobj[0] directly, get object from framebuffer\nby calling drm_gem_fb_get_obj() and return error code when object is\nnull to avoid using null object of framebuffer." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:34.190Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/7f35e01cb0ea4d295f5c067bb5c67dfcddaf05bc" }, { "url": "https://git.kernel.org/stable/c/6ce0544cabaa608018d5922ab404dc656a9d8447" }, { "url": "https://git.kernel.org/stable/c/330c8c1453848c04d335bad81371a66710210800" }, { "url": "https://git.kernel.org/stable/c/dd9ec0ea4cdde0fc48116e63969fc83e81d7ef46" }, { "url": "https://git.kernel.org/stable/c/bcfa48ff785bd121316592b131ff6531e3e696bb" } ], "title": "drm/amdgpu: avoid using null object of framebuffer", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41093", "datePublished": "2024-07-29T15:48:06.686Z", "dateReserved": "2024-07-12T12:17:45.636Z", "dateUpdated": "2024-11-05T09:36:34.190Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42110
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.106Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4b3b6c7efee69f077b86ef7f088fb96768e46e1f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e3af5b14e7632bf12058533d69055393e2d126c9" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/858ae09f03677a4ab907a15516893bc2cc79d4c3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e15a5d821e5192a3769d846079bc9aa380139baf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42110", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:32.906742Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:06.779Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ntb_netdev.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "4b3b6c7efee6", "status": "affected", "version": "548c237c0a99", "versionType": "git" }, { "lessThan": "e3af5b14e763", "status": "affected", "version": "548c237c0a99", "versionType": "git" }, { "lessThan": "858ae09f0367", "status": "affected", "version": "548c237c0a99", "versionType": "git" }, { "lessThan": "e15a5d821e51", "status": "affected", "version": "548c237c0a99", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ntb_netdev.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "3.9" }, { "lessThan": "3.9", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx()\n\nThe following is emitted when using idxd (DSA) dmanegine as the data\nmover for ntb_transport that ntb_netdev uses.\n\n[74412.546922] BUG: using smp_processor_id() in preemptible [00000000] code: irq/52-idxd-por/14526\n[74412.556784] caller is netif_rx_internal+0x42/0x130\n[74412.562282] CPU: 6 PID: 14526 Comm: irq/52-idxd-por Not tainted 6.9.5 #5\n[74412.569870] Hardware name: Intel Corporation ArcherCity/ArcherCity, BIOS EGSDCRB1.E9I.1752.P05.2402080856 02/08/2024\n[74412.581699] Call Trace:\n[74412.584514] \u003cTASK\u003e\n[74412.586933] dump_stack_lvl+0x55/0x70\n[74412.591129] check_preemption_disabled+0xc8/0xf0\n[74412.596374] netif_rx_internal+0x42/0x130\n[74412.600957] __netif_rx+0x20/0xd0\n[74412.604743] ntb_netdev_rx_handler+0x66/0x150 [ntb_netdev]\n[74412.610985] ntb_complete_rxc+0xed/0x140 [ntb_transport]\n[74412.617010] ntb_rx_copy_callback+0x53/0x80 [ntb_transport]\n[74412.623332] idxd_dma_complete_txd+0xe3/0x160 [idxd]\n[74412.628963] idxd_wq_thread+0x1a6/0x2b0 [idxd]\n[74412.634046] irq_thread_fn+0x21/0x60\n[74412.638134] ? irq_thread+0xa8/0x290\n[74412.642218] irq_thread+0x1a0/0x290\n[74412.646212] ? __pfx_irq_thread_fn+0x10/0x10\n[74412.651071] ? __pfx_irq_thread_dtor+0x10/0x10\n[74412.656117] ? __pfx_irq_thread+0x10/0x10\n[74412.660686] kthread+0x100/0x130\n[74412.664384] ? __pfx_kthread+0x10/0x10\n[74412.668639] ret_from_fork+0x31/0x50\n[74412.672716] ? __pfx_kthread+0x10/0x10\n[74412.676978] ret_from_fork_asm+0x1a/0x30\n[74412.681457] \u003c/TASK\u003e\n\nThe cause is due to the idxd driver interrupt completion handler uses\nthreaded interrupt and the threaded handler is not hard or soft interrupt\ncontext. However __netif_rx() can only be called from interrupt context.\nChange the call to netif_rx() in order to allow completion via normal\ncontext for dmaengine drivers that utilize threaded irq handling.\n\nWhile the following commit changed from netif_rx() to __netif_rx(),\nbaebdf48c360 (\"net: dev: Makes sure netif_rx() can be invoked in any context.\"),\nthe change should\u0027ve been a noop instead. However, the code precedes this\nfix should\u0027ve been using netif_rx_ni() or netif_rx_any_context()." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:36.493Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/4b3b6c7efee69f077b86ef7f088fb96768e46e1f" }, { "url": "https://git.kernel.org/stable/c/e3af5b14e7632bf12058533d69055393e2d126c9" }, { "url": "https://git.kernel.org/stable/c/858ae09f03677a4ab907a15516893bc2cc79d4c3" }, { "url": "https://git.kernel.org/stable/c/e15a5d821e5192a3769d846079bc9aa380139baf" } ], "title": "net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx()", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42110", "datePublished": "2024-07-30T07:46:04.892Z", "dateReserved": "2024-07-29T15:50:41.176Z", "dateUpdated": "2024-11-05T09:37:36.493Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41039
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
firmware: cs_dsp: Fix overflow checking of wmfw header
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:55.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/fd035f0810b33c2a8792effdb82bf35920221565" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9c9877a96e033bf6c6470b3b4f06106d91ace11e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/49a79f344d0a17c6a5eef53716cc76fcdbfca9ba" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3019b86bce16fbb5bc1964f3544d0ce7d0137278" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41039", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:23:20.062334Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:03.086Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/firmware/cirrus/cs_dsp.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "fd035f0810b3", "status": "affected", "version": "f6bc909e7673", "versionType": "git" }, { "lessThan": "9c9877a96e03", "status": "affected", "version": "f6bc909e7673", "versionType": "git" }, { "lessThan": "49a79f344d0a", "status": "affected", "version": "f6bc909e7673", "versionType": "git" }, { "lessThan": "3019b86bce16", "status": "affected", "version": "f6bc909e7673", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/firmware/cirrus/cs_dsp.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.16" }, { "lessThan": "5.16", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Fix overflow checking of wmfw header\n\nFix the checking that firmware file buffer is large enough for the\nwmfw header, to prevent overrunning the buffer.\n\nThe original code tested that the firmware data buffer contained\nenough bytes for the sums of the size of the structs\n\n\twmfw_header + wmfw_adsp1_sizes + wmfw_footer\n\nBut wmfw_adsp1_sizes is only used on ADSP1 firmware. For ADSP2 and\nHalo Core the equivalent struct is wmfw_adsp2_sizes, which is\n4 bytes longer. So the length check didn\u0027t guarantee that there\nare enough bytes in the firmware buffer for a header with\nwmfw_adsp2_sizes.\n\nThis patch splits the length check into three separate parts. Each\nof the wmfw_header, wmfw_adsp?_sizes and wmfw_footer are checked\nseparately before they are used." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:29.031Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/fd035f0810b33c2a8792effdb82bf35920221565" }, { "url": "https://git.kernel.org/stable/c/9c9877a96e033bf6c6470b3b4f06106d91ace11e" }, { "url": "https://git.kernel.org/stable/c/49a79f344d0a17c6a5eef53716cc76fcdbfca9ba" }, { "url": "https://git.kernel.org/stable/c/3019b86bce16fbb5bc1964f3544d0ce7d0137278" } ], "title": "firmware: cs_dsp: Fix overflow checking of wmfw header", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41039", "datePublished": "2024-07-29T14:31:53.096Z", "dateReserved": "2024-07-12T12:17:45.621Z", "dateUpdated": "2024-11-05T09:35:29.031Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41042
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
netfilter: nf_tables: prefer nft_chain_validate
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9df785aeb7dcc8efd1d4110bb27d26005298ebae" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/cff3bd012a9512ac5ed858d38e6ed65f6391008c" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41042", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:23:10.425038Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:02.840Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/netfilter/nf_tables_api.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "1947e4c3346f", "status": "affected", "version": "20a69341f2d0", "versionType": "git" }, { "lessThan": "cd4348e0a502", "status": "affected", "version": "20a69341f2d0", "versionType": "git" }, { "lessThan": "31c35f9f89ef", "status": "affected", "version": "20a69341f2d0", "versionType": "git" }, { "lessThan": "8246b7466c8d", "status": "affected", "version": "20a69341f2d0", "versionType": "git" }, { "lessThan": "b6b6e430470e", "status": "affected", "version": "20a69341f2d0", "versionType": "git" }, { "lessThan": "717c91c6ed73", "status": "affected", "version": "20a69341f2d0", "versionType": "git" }, { "lessThan": "9df785aeb7dc", "status": "affected", "version": "20a69341f2d0", "versionType": "git" }, { "lessThan": "cff3bd012a95", "status": "affected", "version": "20a69341f2d0", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/netfilter/nf_tables_api.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "3.13" }, { "lessThan": "3.13", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.320", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.282", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.224", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.165", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.105", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.46", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: prefer nft_chain_validate\n\nnft_chain_validate already performs loop detection because a cycle will\nresult in a call stack overflow (ctx-\u003elevel \u003e= NFT_JUMP_STACK_SIZE).\n\nIt also follows maps via -\u003evalidate callback in nft_lookup, so there\nappears no reason to iterate the maps again.\n\nnf_tables_check_loops() and all its helper functions can be removed.\nThis improves ruleset load time significantly, from 23s down to 12s.\n\nThis also fixes a crash bug. Old loop detection code can result in\nunbounded recursion:\n\nBUG: TASK stack guard page was hit at ....\nOops: stack guard page: 0000 [#1] PREEMPT SMP KASAN\nCPU: 4 PID: 1539 Comm: nft Not tainted 6.10.0-rc5+ #1\n[..]\n\nwith a suitable ruleset during validation of register stores.\n\nI can\u0027t see any actual reason to attempt to check for this from\nnft_validate_register_store(), at this point the transaction is still in\nprogress, so we don\u0027t have a full picture of the rule graph.\n\nFor nf-next it might make sense to either remove it or make this depend\non table-\u003evalidate_state in case we could catch an error earlier\n(for improved error reporting to userspace)." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:32.553Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/1947e4c3346faa8ac7e343652c0fd3b3e394202f" }, { "url": "https://git.kernel.org/stable/c/cd4348e0a50286282c314ad6d2b0740e7c812c24" }, { "url": "https://git.kernel.org/stable/c/31c35f9f89ef585f1edb53e17ac73a0ca4a9712b" }, { "url": "https://git.kernel.org/stable/c/8246b7466c8da49d0d9e85e26cbd69dd6d3e3d1e" }, { "url": "https://git.kernel.org/stable/c/b6b6e430470e1c3c5513311cb35a15a205595abe" }, { "url": "https://git.kernel.org/stable/c/717c91c6ed73e248de6a15bc53adefb81446c9d0" }, { "url": "https://git.kernel.org/stable/c/9df785aeb7dcc8efd1d4110bb27d26005298ebae" }, { "url": "https://git.kernel.org/stable/c/cff3bd012a9512ac5ed858d38e6ed65f6391008c" } ], "title": "netfilter: nf_tables: prefer nft_chain_validate", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41042", "datePublished": "2024-07-29T14:31:55.530Z", "dateReserved": "2024-07-12T12:17:45.624Z", "dateUpdated": "2024-11-05T09:35:32.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42085
Vulnerability from cvelistv5
Published
2024-07-29 16:26
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7026576e89094aa9a0062aa6d10cba18aa99944c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d77e2b5104c51d3668b9717c825a4a06998efe63" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/17e2956633ca560b95f1cbbb297cfc2adf650649" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f1274cfab183e69a7c7bafffcb4f50703c876276" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7838de15bb700c2898a7d741db9b1f3cbc86c136" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42085", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:18:57.338012Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:57.102Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/usb/dwc3/core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "7026576e8909", "status": "affected", "version": "2fa487a94667", "versionType": "git" }, { "lessThan": "d77e2b5104c5", "status": "affected", "version": "5265397f9442", "versionType": "git" }, { "lessThan": "17e2956633ca", "status": "affected", "version": "5265397f9442", "versionType": "git" }, { "lessThan": "f1274cfab183", "status": "affected", "version": "5265397f9442", "versionType": "git" }, { "lessThan": "7838de15bb70", "status": "affected", "version": "5265397f9442", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/usb/dwc3/core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.1" }, { "lessThan": "6.1", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock\n\nWhen config CONFIG_USB_DWC3_DUAL_ROLE is selected, and trigger system\nto enter suspend status with below command:\necho mem \u003e /sys/power/state\nThere will be a deadlock issue occurring. Detailed invoking path as\nbelow:\ndwc3_suspend_common()\n spin_lock_irqsave(\u0026dwc-\u003elock, flags); \u003c-- 1st\n dwc3_gadget_suspend(dwc);\n dwc3_gadget_soft_disconnect(dwc);\n spin_lock_irqsave(\u0026dwc-\u003elock, flags); \u003c-- 2nd\nThis issue is exposed by commit c7ebd8149ee5 (\"usb: dwc3: gadget: Fix\nNULL pointer dereference in dwc3_gadget_suspend\") that removes the code\nof checking whether dwc-\u003egadget_driver is NULL or not. It causes the\nfollowing code is executed and deadlock occurs when trying to get the\nspinlock. In fact, the root cause is the commit 5265397f9442(\"usb: dwc3:\nRemove DWC3 locking during gadget suspend/resume\") that forgot to remove\nthe lock of otg mode. So, remove the redundant lock of otg mode during\ngadget suspend/resume." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:06.819Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/7026576e89094aa9a0062aa6d10cba18aa99944c" }, { "url": "https://git.kernel.org/stable/c/d77e2b5104c51d3668b9717c825a4a06998efe63" }, { "url": "https://git.kernel.org/stable/c/17e2956633ca560b95f1cbbb297cfc2adf650649" }, { "url": "https://git.kernel.org/stable/c/f1274cfab183e69a7c7bafffcb4f50703c876276" }, { "url": "https://git.kernel.org/stable/c/7838de15bb700c2898a7d741db9b1f3cbc86c136" } ], "title": "usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42085", "datePublished": "2024-07-29T16:26:26.284Z", "dateReserved": "2024-07-29T15:50:41.170Z", "dateUpdated": "2024-11-05T09:37:06.819Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42146
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-12-09 14:21
Severity ?
EPSS score ?
Summary
drm/xe: Add outer runtime_pm protection to xe_live_ktest@xe_dma_buf
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0888d15ea45ba8ef4508edd1123ea5ad95b58994" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f9116f658a6217b101e3b4e89f845775b6fb05d9" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42146", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:41.126904Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:35.142Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/xe/tests/xe_dma_buf.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "0888d15ea45b", "status": "affected", "version": "dd08ebf6c352", "versionType": "git" }, { "lessThan": "f9116f658a62", "status": "affected", "version": "dd08ebf6c352", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/xe/tests/xe_dma_buf.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.8" }, { "lessThan": "6.8", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Add outer runtime_pm protection to xe_live_ktest@xe_dma_buf\n\nAny kunit doing any memory access should get their own runtime_pm\nouter references since they don\u0027t use the standard driver API\nentries. In special this dma_buf from the same driver.\n\nFound by pre-merge CI on adding WARN calls for unprotected\ninner callers:\n\n\u003c6\u003e [318.639739] # xe_dma_buf_kunit: running xe_test_dmabuf_import_same_driver\n\u003c4\u003e [318.639957] ------------[ cut here ]------------\n\u003c4\u003e [318.639967] xe 0000:4d:00.0: Missing outer runtime PM protection\n\u003c4\u003e [318.640049] WARNING: CPU: 117 PID: 3832 at drivers/gpu/drm/xe/xe_pm.c:533 xe_pm_runtime_get_noresume+0x48/0x60 [xe]" } ], "providerMetadata": { "dateUpdated": "2024-12-09T14:21:27.303Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/0888d15ea45ba8ef4508edd1123ea5ad95b58994" }, { "url": "https://git.kernel.org/stable/c/f9116f658a6217b101e3b4e89f845775b6fb05d9" } ], "title": "drm/xe: Add outer runtime_pm protection to xe_live_ktest@xe_dma_buf", "x_generator": { "engine": "bippy-8e903de6a542" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42146", "datePublished": "2024-07-30T07:46:39.573Z", "dateReserved": "2024-07-29T15:50:41.190Z", "dateUpdated": "2024-12-09T14:21:27.303Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41053
Vulnerability from cvelistv5
Published
2024-07-29 14:32
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
scsi: ufs: core: Fix ufshcd_abort_one racing issue
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c3111b3cf3889bfa7b73ebff83d7397db9b7e5e0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b5a6ac887256762758bfe7f2918cb0233aa544f4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/74736103fb4123c71bf11fb7a6abe7c884c5269e" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41053", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:35.119070Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:01.661Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/ufs/core/ufshcd.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "c3111b3cf388", "status": "affected", "version": "ff7699d36207", "versionType": "git" }, { "lessThan": "b5a6ac887256", "status": "affected", "version": "93e6c0e19d5b", "versionType": "git" }, { "lessThan": "74736103fb41", "status": "affected", "version": "93e6c0e19d5b", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/ufs/core/ufshcd.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.7" }, { "lessThan": "6.7", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Fix ufshcd_abort_one racing issue\n\nWhen ufshcd_abort_one is racing with the completion ISR, the completed tag\nof the request\u0027s mq_hctx pointer will be set to NULL by ISR. Return\nsuccess when request is completed by ISR because ufshcd_abort_one does not\nneed to do anything.\n\nThe racing flow is:\n\nThread A\nufshcd_err_handler\t\t\t\t\tstep 1\n\t...\n\tufshcd_abort_one\n\t\tufshcd_try_to_abort_task\n\t\t\tufshcd_cmd_inflight(true)\tstep 3\n\t\tufshcd_mcq_req_to_hwq\n\t\t\tblk_mq_unique_tag\n\t\t\t\trq-\u003emq_hctx-\u003equeue_num\tstep 5\n\nThread B\nufs_mtk_mcq_intr(cq complete ISR)\t\t\tstep 2\n\tscsi_done\n\t\t...\n\t\t__blk_mq_free_request\n\t\t\trq-\u003emq_hctx = NULL;\t\tstep 4\n\nBelow is KE back trace.\n ufshcd_try_to_abort_task: cmd at tag 41 not pending in the device.\n ufshcd_try_to_abort_task: cmd at tag=41 is cleared.\n Aborting tag 41 / CDB 0x28 succeeded\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000194\n pc : [0xffffffddd7a79bf8] blk_mq_unique_tag+0x8/0x14\n lr : [0xffffffddd6155b84] ufshcd_mcq_req_to_hwq+0x1c/0x40 [ufs_mediatek_mod_ise]\n do_mem_abort+0x58/0x118\n el1_abort+0x3c/0x5c\n el1h_64_sync_handler+0x54/0x90\n el1h_64_sync+0x68/0x6c\n blk_mq_unique_tag+0x8/0x14\n ufshcd_err_handler+0xae4/0xfa8 [ufs_mediatek_mod_ise]\n process_one_work+0x208/0x4fc\n worker_thread+0x228/0x438\n kthread+0x104/0x1d4\n ret_from_fork+0x10/0x20" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:44.749Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/c3111b3cf3889bfa7b73ebff83d7397db9b7e5e0" }, { "url": "https://git.kernel.org/stable/c/b5a6ac887256762758bfe7f2918cb0233aa544f4" }, { "url": "https://git.kernel.org/stable/c/74736103fb4123c71bf11fb7a6abe7c884c5269e" } ], "title": "scsi: ufs: core: Fix ufshcd_abort_one racing issue", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41053", "datePublished": "2024-07-29T14:32:08.958Z", "dateReserved": "2024-07-12T12:17:45.626Z", "dateUpdated": "2024-11-05T09:35:44.749Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42154
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
tcp_metrics: validate source addr length
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-09-25T17:02:32.529Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/19d997b59fa1fd7a02e770ee0881c0652b9c32c9" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2a2e79dbe2236a1289412d2044994f7ab419b44c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/cdffc358717e436bb67122bb82c1a2a26e050f98" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ef7c428b425beeb52b894e16f1c4b629d6cebfb6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/31f03bb04146c1c6df6c03e9f45401f5f5a985d3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8c2debdd170e395934ac0e039748576dfde14e99" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3d550dd5418729a6e77fe7721d27adea7152e321" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/66be40e622e177316ae81717aa30057ba9e61dff" }, { "url": "https://security.netapp.com/advisory/ntap-20240828-0010/" }, { "url": "http://www.openwall.com/lists/oss-security/2024/09/24/3" }, { "url": "http://www.openwall.com/lists/oss-security/2024/09/24/4" }, { "url": "http://www.openwall.com/lists/oss-security/2024/09/25/3" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42154", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:15.159948Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:34.227Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/ipv4/tcp_metrics.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "19d997b59fa1", "status": "affected", "version": "3e7013ddf55a", "versionType": "git" }, { "lessThan": "2a2e79dbe223", "status": "affected", "version": "3e7013ddf55a", "versionType": "git" }, { "lessThan": "cdffc358717e", "status": "affected", "version": "3e7013ddf55a", "versionType": "git" }, { "lessThan": "ef7c428b425b", "status": "affected", "version": "3e7013ddf55a", "versionType": "git" }, { "lessThan": "31f03bb04146", "status": "affected", "version": "3e7013ddf55a", "versionType": "git" }, { "lessThan": "8c2debdd170e", "status": "affected", "version": "3e7013ddf55a", "versionType": "git" }, { "lessThan": "3d550dd54187", "status": "affected", "version": "3e7013ddf55a", "versionType": "git" }, { "lessThan": "66be40e622e1", "status": "affected", "version": "3e7013ddf55a", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/ipv4/tcp_metrics.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "3.14" }, { "lessThan": "3.14", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: validate source addr length\n\nI don\u0027t see anything checking that TCP_METRICS_ATTR_SADDR_IPV4\nis at least 4 bytes long, and the policy doesn\u0027t have an entry\nfor this attribute at all (neither does it for IPv6 but v6 is\nmanually validated)." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:24.787Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/19d997b59fa1fd7a02e770ee0881c0652b9c32c9" }, { "url": "https://git.kernel.org/stable/c/2a2e79dbe2236a1289412d2044994f7ab419b44c" }, { "url": "https://git.kernel.org/stable/c/cdffc358717e436bb67122bb82c1a2a26e050f98" }, { "url": "https://git.kernel.org/stable/c/ef7c428b425beeb52b894e16f1c4b629d6cebfb6" }, { "url": "https://git.kernel.org/stable/c/31f03bb04146c1c6df6c03e9f45401f5f5a985d3" }, { "url": "https://git.kernel.org/stable/c/8c2debdd170e395934ac0e039748576dfde14e99" }, { "url": "https://git.kernel.org/stable/c/3d550dd5418729a6e77fe7721d27adea7152e321" }, { "url": "https://git.kernel.org/stable/c/66be40e622e177316ae81717aa30057ba9e61dff" } ], "title": "tcp_metrics: validate source addr length", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42154", "datePublished": "2024-07-30T07:46:51.456Z", "dateReserved": "2024-07-29T15:50:41.194Z", "dateUpdated": "2024-11-05T09:38:24.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42157
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-12-02 08:32
Severity ?
EPSS score ?
Summary
s390/pkey: Wipe sensitive data on failure
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.911Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6e2e374403bf73140d0efc9541cb1b3bea55ac02" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b5eb9176ebd4697bc248bf8d145e66d782cf5250" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/93c034c4314bc4c4450a3869cd5da298502346ad" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4889f117755b2f18c23045a0f57977f3ec130581" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c51795885c801b6b7e976717e0d6d45b1e5be0f0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/90a01aefb84b09ccb6024d75d85bb8f620bd3487" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c44a2151e5d21c66b070a056c26471f30719b575" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1d8c270de5eb74245d72325d285894a577a945d9" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42157", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:05.289606Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:34.008Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/s390/crypto/pkey_api.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "6e2e374403bf", "status": "affected", "version": "e80d4af0a320", "versionType": "git" }, { "lessThan": "b5eb9176ebd4", "status": "affected", "version": "e80d4af0a320", "versionType": "git" }, { "lessThan": "93c034c4314b", "status": "affected", "version": "e80d4af0a320", "versionType": "git" }, { "lessThan": "4889f117755b", "status": "affected", "version": "e80d4af0a320", "versionType": "git" }, { "lessThan": "c51795885c80", "status": "affected", "version": "e80d4af0a320", "versionType": "git" }, { "lessThan": "90a01aefb84b", "status": "affected", "version": "e80d4af0a320", "versionType": "git" }, { "lessThan": "c44a2151e5d2", "status": "affected", "version": "e80d4af0a320", "versionType": "git" }, { "lessThan": "1d8c270de5eb", "status": "affected", "version": "e80d4af0a320", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/s390/crypto/pkey_api.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.11" }, { "lessThan": "4.11", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/pkey: Wipe sensitive data on failure\n\nWipe sensitive data from stack also if the copy_to_user() fails." } ], "providerMetadata": { "dateUpdated": "2024-12-02T08:32:38.364Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/6e2e374403bf73140d0efc9541cb1b3bea55ac02" }, { "url": "https://git.kernel.org/stable/c/b5eb9176ebd4697bc248bf8d145e66d782cf5250" }, { "url": "https://git.kernel.org/stable/c/93c034c4314bc4c4450a3869cd5da298502346ad" }, { "url": "https://git.kernel.org/stable/c/4889f117755b2f18c23045a0f57977f3ec130581" }, { "url": "https://git.kernel.org/stable/c/c51795885c801b6b7e976717e0d6d45b1e5be0f0" }, { "url": "https://git.kernel.org/stable/c/90a01aefb84b09ccb6024d75d85bb8f620bd3487" }, { "url": "https://git.kernel.org/stable/c/c44a2151e5d21c66b070a056c26471f30719b575" }, { "url": "https://git.kernel.org/stable/c/1d8c270de5eb74245d72325d285894a577a945d9" } ], "title": "s390/pkey: Wipe sensitive data on failure", "x_generator": { "engine": "bippy-8e903de6a542" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42157", "datePublished": "2024-07-30T07:46:59.362Z", "dateReserved": "2024-07-29T15:50:41.194Z", "dateUpdated": "2024-12-02T08:32:38.364Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42083
Vulnerability from cvelistv5
Published
2024-07-29 15:54
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
ionic: fix kernel panic due to multi-buffer handling
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.939Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8ae401525ae84228a8986bb369224a6224e4d22f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e3f02f32a05009a688a87f5799e049ed6b55bab5" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42083", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:03.633265Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:50.082Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/pensando/ionic/ionic_txrx.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "8ae401525ae8", "status": "affected", "version": "5377805dc1c0", "versionType": "git" }, { "lessThan": "e3f02f32a050", "status": "affected", "version": "5377805dc1c0", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/pensando/ionic/ionic_txrx.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.9" }, { "lessThan": "6.9", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nionic: fix kernel panic due to multi-buffer handling\n\nCurrently, the ionic_run_xdp() doesn\u0027t handle multi-buffer packets\nproperly for XDP_TX and XDP_REDIRECT.\nWhen a jumbo frame is received, the ionic_run_xdp() first makes xdp\nframe with all necessary pages in the rx descriptor.\nAnd if the action is either XDP_TX or XDP_REDIRECT, it should unmap\ndma-mapping and reset page pointer to NULL for all pages, not only the\nfirst page.\nBut it doesn\u0027t for SG pages. So, SG pages unexpectedly will be reused.\nIt eventually causes kernel panic.\n\nOops: general protection fault, probably for non-canonical address 0x504f4e4dbebc64ff: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 3 PID: 0 Comm: swapper/3 Not tainted 6.10.0-rc3+ #25\nRIP: 0010:xdp_return_frame+0x42/0x90\nCode: 01 75 12 5b 4c 89 e6 5d 31 c9 41 5c 31 d2 41 5d e9 73 fd ff ff 44 8b 6b 20 0f b7 43 0a 49 81 ed 68 01 00 00 49 29 c5 49 01 fd \u003c41\u003e 80 7d0\nRSP: 0018:ffff99d00122ce08 EFLAGS: 00010202\nRAX: 0000000000005453 RBX: ffff8d325f904000 RCX: 0000000000000001\nRDX: 00000000670e1000 RSI: 000000011f90d000 RDI: 504f4e4d4c4b4a49\nRBP: ffff99d003907740 R08: 0000000000000000 R09: 0000000000000000\nR10: 000000011f90d000 R11: 0000000000000000 R12: ffff8d325f904010\nR13: 504f4e4dbebc64fd R14: ffff8d3242b070c8 R15: ffff99d0039077c0\nFS: 0000000000000000(0000) GS:ffff8d399f780000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f41f6c85e38 CR3: 000000037ac30000 CR4: 00000000007506f0\nPKRU: 55555554\nCall Trace:\n \u003cIRQ\u003e\n ? die_addr+0x33/0x90\n ? exc_general_protection+0x251/0x2f0\n ? asm_exc_general_protection+0x22/0x30\n ? xdp_return_frame+0x42/0x90\n ionic_tx_clean+0x211/0x280 [ionic 15881354510e6a9c655c59c54812b319ed2cd015]\n ionic_tx_cq_service+0xd3/0x210 [ionic 15881354510e6a9c655c59c54812b319ed2cd015]\n ionic_txrx_napi+0x41/0x1b0 [ionic 15881354510e6a9c655c59c54812b319ed2cd015]\n __napi_poll.constprop.0+0x29/0x1b0\n net_rx_action+0x2c4/0x350\n handle_softirqs+0xf4/0x320\n irq_exit_rcu+0x78/0xa0\n common_interrupt+0x77/0x90" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:04.619Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/8ae401525ae84228a8986bb369224a6224e4d22f" }, { "url": "https://git.kernel.org/stable/c/e3f02f32a05009a688a87f5799e049ed6b55bab5" } ], "title": "ionic: fix kernel panic due to multi-buffer handling", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42083", "datePublished": "2024-07-29T15:54:44.106Z", "dateReserved": "2024-07-29T15:50:41.170Z", "dateUpdated": "2024-11-05T09:37:04.619Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42230
Vulnerability from cvelistv5
Published
2024-07-30 07:47
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
powerpc/pseries: Fix scv instruction crash with kexec
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.571Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c550679d604798d9fed8a5b2bb5693448a25407c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d10e3c39001e9194b9a1bfd6979bd3fa19dccdc5" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8c6506616386ce37e59b2745fc481c6713fae4f3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/21a741eb75f80397e5f7d3739e24d7d75e619011" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42230", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:14:24.948809Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:32.851Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "arch/powerpc/kexec/core_64.c", "arch/powerpc/platforms/pseries/kexec.c", "arch/powerpc/platforms/pseries/pseries.h", "arch/powerpc/platforms/pseries/setup.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "c550679d6047", "status": "affected", "version": "7fa95f9adaee", "versionType": "git" }, { "lessThan": "d10e3c39001e", "status": "affected", "version": "7fa95f9adaee", "versionType": "git" }, { "lessThan": "8c6506616386", "status": "affected", "version": "7fa95f9adaee", "versionType": "git" }, { "lessThan": "21a741eb75f8", "status": "affected", "version": "7fa95f9adaee", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "arch/powerpc/kexec/core_64.c", "arch/powerpc/platforms/pseries/kexec.c", "arch/powerpc/platforms/pseries/pseries.h", "arch/powerpc/platforms/pseries/setup.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.9" }, { "lessThan": "5.9", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries: Fix scv instruction crash with kexec\n\nkexec on pseries disables AIL (reloc_on_exc), required for scv\ninstruction support, before other CPUs have been shut down. This means\nthey can execute scv instructions after AIL is disabled, which causes an\ninterrupt at an unexpected entry location that crashes the kernel.\n\nChange the kexec sequence to disable AIL after other CPUs have been\nbrought down.\n\nAs a refresher, the real-mode scv interrupt vector is 0x17000, and the\nfixed-location head code probably couldn\u0027t easily deal with implementing\nsuch high addresses so it was just decided not to support that interrupt\nat all." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:41.618Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/c550679d604798d9fed8a5b2bb5693448a25407c" }, { "url": "https://git.kernel.org/stable/c/d10e3c39001e9194b9a1bfd6979bd3fa19dccdc5" }, { "url": "https://git.kernel.org/stable/c/8c6506616386ce37e59b2745fc481c6713fae4f3" }, { "url": "https://git.kernel.org/stable/c/21a741eb75f80397e5f7d3739e24d7d75e619011" } ], "title": "powerpc/pseries: Fix scv instruction crash with kexec", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42230", "datePublished": "2024-07-30T07:47:10.703Z", "dateReserved": "2024-07-30T07:40:12.250Z", "dateUpdated": "2024-11-05T09:38:41.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41066
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
ibmvnic: Add tx check to prevent skb leak
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.379Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/16ad1557cae582e79bb82dddd612d9bdfaa11d4c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/267c61c4afed0ff9a2e83462abad3f41d8ca1f06" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e7b75def33eae61ddaad6cb616c517dc3882eb2a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0983d288caf984de0202c66641577b739caad561" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41066", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:52.759335Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:57.523Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/ibm/ibmvnic.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "16ad1557cae5", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "267c61c4afed", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "e7b75def33ea", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "0983d288caf9", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/ibm/ibmvnic.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nibmvnic: Add tx check to prevent skb leak\n\nBelow is a summary of how the driver stores a reference to an skb during\ntransmit:\n tx_buff[free_map[consumer_index]]-\u003eskb = new_skb;\n free_map[consumer_index] = IBMVNIC_INVALID_MAP;\n consumer_index ++;\nWhere variable data looks like this:\n free_map == [4, IBMVNIC_INVALID_MAP, IBMVNIC_INVALID_MAP, 0, 3]\n \tconsumer_index^\n tx_buff == [skb=null, skb=\u003cptr\u003e, skb=\u003cptr\u003e, skb=null, skb=null]\n\nThe driver has checks to ensure that free_map[consumer_index] pointed to\na valid index but there was no check to ensure that this index pointed\nto an unused/null skb address. So, if, by some chance, our free_map and\ntx_buff lists become out of sync then we were previously risking an\nskb memory leak. This could then cause tcp congestion control to stop\nsending packets, eventually leading to ETIMEDOUT.\n\nTherefore, add a conditional to ensure that the skb address is null. If\nnot then warn the user (because this is still a bug that should be\npatched) and free the old pointer to prevent memleak/tcp problems." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:03.987Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/16ad1557cae582e79bb82dddd612d9bdfaa11d4c" }, { "url": "https://git.kernel.org/stable/c/267c61c4afed0ff9a2e83462abad3f41d8ca1f06" }, { "url": "https://git.kernel.org/stable/c/e7b75def33eae61ddaad6cb616c517dc3882eb2a" }, { "url": "https://git.kernel.org/stable/c/0983d288caf984de0202c66641577b739caad561" } ], "title": "ibmvnic: Add tx check to prevent skb leak", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41066", "datePublished": "2024-07-29T14:57:27.832Z", "dateReserved": "2024-07-12T12:17:45.630Z", "dateUpdated": "2024-11-05T09:36:03.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42117
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
drm/amd/display: ASSERT when failing to find index by plane/stream id
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.225Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a9c047a5cf3135b8b66bd28fbe2c698b9cace0b3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/01eb50e53c1ce505bf449348d433181310288765" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42117", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:10.514634Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:05.771Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/dml2/dml2_dc_resource_mgmt.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "a9c047a5cf31", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "01eb50e53c1c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/dml2/dml2_dc_resource_mgmt.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: ASSERT when failing to find index by plane/stream id\n\n[WHY]\nfind_disp_cfg_idx_by_plane_id and find_disp_cfg_idx_by_stream_id returns\nan array index and they return -1 when not found; however, -1 is not a\nvalid index number.\n\n[HOW]\nWhen this happens, call ASSERT(), and return a positive number (which is\nfewer than callers\u0027 array size) instead.\n\nThis fixes 4 OVERRUN and 2 NEGATIVE_RETURNS issues reported by Coverity." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:44.533Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/a9c047a5cf3135b8b66bd28fbe2c698b9cace0b3" }, { "url": "https://git.kernel.org/stable/c/01eb50e53c1ce505bf449348d433181310288765" } ], "title": "drm/amd/display: ASSERT when failing to find index by plane/stream id", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42117", "datePublished": "2024-07-30T07:46:09.648Z", "dateReserved": "2024-07-29T15:50:41.178Z", "dateUpdated": "2024-11-05T09:37:44.533Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42152
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
nvmet: fix a possible leak when destroy a ctrl during qp establishment
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.370Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2f3c22b1d3d7e86712253244797a651998c141fa" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b4fed1443a6571d49c6ffe7d97af3bbe5ee6dff5" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/940a71f08ef153ef807f751310b0648d1fa5d0da" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5502c1f1d0d7472706cc1f201aecf1c935d302d1" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/818004f2a380420c19872171be716174d4985e33" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c758b77d4a0a0ed3a1292b3fd7a2aeccd1a169a4" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42152", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:21.603444Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:34.451Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/nvme/target/core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "2f3c22b1d3d7", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "b4fed1443a65", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "940a71f08ef1", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "5502c1f1d0d7", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "818004f2a380", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "c758b77d4a0a", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/nvme/target/core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix a possible leak when destroy a ctrl during qp establishment\n\nIn nvmet_sq_destroy we capture sq-\u003ectrl early and if it is non-NULL we\nknow that a ctrl was allocated (in the admin connect request handler)\nand we need to release pending AERs, clear ctrl-\u003esqs and sq-\u003ectrl\n(for nvme-loop primarily), and drop the final reference on the ctrl.\n\nHowever, a small window is possible where nvmet_sq_destroy starts (as\na result of the client giving up and disconnecting) concurrently with\nthe nvme admin connect cmd (which may be in an early stage). But *before*\nkill_and_confirm of sq-\u003eref (i.e. the admin connect managed to get an sq\nlive reference). In this case, sq-\u003ectrl was allocated however after it was\ncaptured in a local variable in nvmet_sq_destroy.\nThis prevented the final reference drop on the ctrl.\n\nSolve this by re-capturing the sq-\u003ectrl after all inflight request has\ncompleted, where for sure sq-\u003ectrl reference is final, and move forward\nbased on that.\n\nThis issue was observed in an environment with many hosts connecting\nmultiple ctrls simoutanuosly, creating a delay in allocating a ctrl\nleading up to this race window." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:22.571Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/2f3c22b1d3d7e86712253244797a651998c141fa" }, { "url": "https://git.kernel.org/stable/c/b4fed1443a6571d49c6ffe7d97af3bbe5ee6dff5" }, { "url": "https://git.kernel.org/stable/c/940a71f08ef153ef807f751310b0648d1fa5d0da" }, { "url": "https://git.kernel.org/stable/c/5502c1f1d0d7472706cc1f201aecf1c935d302d1" }, { "url": "https://git.kernel.org/stable/c/818004f2a380420c19872171be716174d4985e33" }, { "url": "https://git.kernel.org/stable/c/c758b77d4a0a0ed3a1292b3fd7a2aeccd1a169a4" } ], "title": "nvmet: fix a possible leak when destroy a ctrl during qp establishment", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42152", "datePublished": "2024-07-30T07:46:44.795Z", "dateReserved": "2024-07-29T15:50:41.193Z", "dateUpdated": "2024-11-05T09:38:22.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42069
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
net: mana: Fix possible double free in error handling path
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.325Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3243e64eb4d897c3eeb48b2a7221ab5a95e1282a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ed45c0a0b662079d4c0e518014cc148c753979b4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1864b8224195d0e43ddb92a8151f54f6562090cc" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42069", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:49.454221Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:08.299Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/microsoft/mana/mana_en.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "3243e64eb4d8", "status": "affected", "version": "a69839d4327d", "versionType": "git" }, { "lessThan": "ed45c0a0b662", "status": "affected", "version": "a69839d4327d", "versionType": "git" }, { "lessThan": "1864b8224195", "status": "affected", "version": "a69839d4327d", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/microsoft/mana/mana_en.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.2" }, { "lessThan": "6.2", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mana: Fix possible double free in error handling path\n\nWhen auxiliary_device_add() returns error and then calls\nauxiliary_device_uninit(), callback function adev_release\ncalls kfree(madev). We shouldn\u0027t call kfree(madev) again\nin the error handling path. Set \u0027madev\u0027 to NULL." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:47.987Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/3243e64eb4d897c3eeb48b2a7221ab5a95e1282a" }, { "url": "https://git.kernel.org/stable/c/ed45c0a0b662079d4c0e518014cc148c753979b4" }, { "url": "https://git.kernel.org/stable/c/1864b8224195d0e43ddb92a8151f54f6562090cc" } ], "title": "net: mana: Fix possible double free in error handling path", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42069", "datePublished": "2024-07-29T15:52:33.273Z", "dateReserved": "2024-07-29T15:50:41.168Z", "dateUpdated": "2024-11-05T09:36:47.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41045
Vulnerability from cvelistv5
Published
2024-07-29 14:32
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
bpf: Defer work in bpf_timer_cancel_and_free
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.645Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7aa5a19279c3639ae8b758b63f05d0c616a39fa1" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a6fcd19d7eac1335eb76bc16b6a66b7f574d1d69" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41045", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:23:00.726132Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:02.451Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "kernel/bpf/helpers.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "7aa5a19279c3", "status": "affected", "version": "b00628b1c7d5", "versionType": "git" }, { "lessThan": "a6fcd19d7eac", "status": "affected", "version": "b00628b1c7d5", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "kernel/bpf/helpers.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.15" }, { "lessThan": "5.15", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Defer work in bpf_timer_cancel_and_free\n\nCurrently, the same case as previous patch (two timer callbacks trying\nto cancel each other) can be invoked through bpf_map_update_elem as\nwell, or more precisely, freeing map elements containing timers. Since\nthis relies on hrtimer_cancel as well, it is prone to the same deadlock\nsituation as the previous patch.\n\nIt would be sufficient to use hrtimer_try_to_cancel to fix this problem,\nas the timer cannot be enqueued after async_cancel_and_free. Once\nasync_cancel_and_free has been done, the timer must be reinitialized\nbefore it can be armed again. The callback running in parallel trying to\narm the timer will fail, and freeing bpf_hrtimer without waiting is\nsufficient (given kfree_rcu), and bpf_timer_cb will return\nHRTIMER_NORESTART, preventing the timer from being rearmed again.\n\nHowever, there exists a UAF scenario where the callback arms the timer\nbefore entering this function, such that if cancellation fails (due to\ntimer callback invoking this routine, or the target timer callback\nrunning concurrently). In such a case, if the timer expiration is\nsignificantly far in the future, the RCU grace period expiration\nhappening before it will free the bpf_hrtimer state and along with it\nthe struct hrtimer, that is enqueued.\n\nHence, it is clear cancellation needs to occur after\nasync_cancel_and_free, and yet it cannot be done inline due to deadlock\nissues. We thus modify bpf_timer_cancel_and_free to defer work to the\nglobal workqueue, adding a work_struct alongside rcu_head (both used at\n_different_ points of time, so can share space).\n\nUpdate existing code comments to reflect the new state of affairs." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:35.808Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/7aa5a19279c3639ae8b758b63f05d0c616a39fa1" }, { "url": "https://git.kernel.org/stable/c/a6fcd19d7eac1335eb76bc16b6a66b7f574d1d69" } ], "title": "bpf: Defer work in bpf_timer_cancel_and_free", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41045", "datePublished": "2024-07-29T14:32:02.866Z", "dateReserved": "2024-07-12T12:17:45.624Z", "dateUpdated": "2024-11-05T09:35:35.808Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42079
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
gfs2: Fix NULL pointer dereference in gfs2_log_flush
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.753Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3429ef5f50909cee9e498c50f0c499b9397116ce" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f54f9d5368a4e92ede7dd078a62788dae3a7c6ef" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/35264909e9d1973ab9aaa2a1b07cda70f12bb828" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42079", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:17.192306Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:07.945Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/gfs2/log.c", "fs/gfs2/super.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "3429ef5f5090", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "f54f9d5368a4", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "35264909e9d1", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/gfs2/log.c", "fs/gfs2/super.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix NULL pointer dereference in gfs2_log_flush\n\nIn gfs2_jindex_free(), set sdp-\u003esd_jdesc to NULL under the log flush\nlock to provide exclusion against gfs2_log_flush().\n\nIn gfs2_log_flush(), check if sdp-\u003esd_jdesc is non-NULL before\ndereferencing it. Otherwise, we could run into a NULL pointer\ndereference when outstanding glock work races with an unmount\n(glock_work_func -\u003e run_queue -\u003e do_xmote -\u003e inode_go_sync -\u003e\ngfs2_log_flush)." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:59.762Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/3429ef5f50909cee9e498c50f0c499b9397116ce" }, { "url": "https://git.kernel.org/stable/c/f54f9d5368a4e92ede7dd078a62788dae3a7c6ef" }, { "url": "https://git.kernel.org/stable/c/35264909e9d1973ab9aaa2a1b07cda70f12bb828" } ], "title": "gfs2: Fix NULL pointer dereference in gfs2_log_flush", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42079", "datePublished": "2024-07-29T15:52:41.360Z", "dateReserved": "2024-07-29T15:50:41.169Z", "dateUpdated": "2024-11-05T09:36:59.762Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42161
Vulnerability from cvelistv5
Published
2024-07-30 07:47
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.572Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b694989bb13ed5f166e633faa1eb0f21c6d261a6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3364c2ed1c241989847f19cf83e3db903ce689e3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a21d76bd0b0d39518e9a4c19f6cf7c042a974aff" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7e5471b5efebc30dd0bc035cda86693a5c73d45f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ff941a8449e712eaf7efca1a13bfb9afd3d99fc2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/009367099eb61a4fc2af44d4eb06b6b4de7de6db" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42161", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:14:52.496894Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:33.542Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "tools/lib/bpf/bpf_core_read.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "b694989bb13e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "3364c2ed1c24", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "a21d76bd0b0d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "7e5471b5efeb", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "ff941a8449e7", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "009367099eb6", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "tools/lib/bpf/bpf_core_read.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD\n\n[Changes from V1:\n - Use a default branch in the switch statement to initialize `val\u0027.]\n\nGCC warns that `val\u0027 may be used uninitialized in the\nBPF_CRE_READ_BITFIELD macro, defined in bpf_core_read.h as:\n\n\t[...]\n\tunsigned long long val;\t\t\t\t\t\t \\\n\t[...]\t\t\t\t\t\t\t\t \\\n\tswitch (__CORE_RELO(s, field, BYTE_SIZE)) {\t\t\t \\\n\tcase 1: val = *(const unsigned char *)p; break;\t\t\t \\\n\tcase 2: val = *(const unsigned short *)p; break;\t\t \\\n\tcase 4: val = *(const unsigned int *)p; break;\t\t\t \\\n\tcase 8: val = *(const unsigned long long *)p; break;\t\t \\\n } \t\t\t\t\t\t\t \\\n\t[...]\n\tval;\t\t\t\t\t\t\t\t \\\n\t}\t\t\t\t\t\t\t\t \\\n\nThis patch adds a default entry in the switch statement that sets\n`val\u0027 to zero in order to avoid the warning, and random values to be\nused in case __builtin_preserve_field_info returns unexpected values\nfor BPF_FIELD_BYTE_SIZE.\n\nTested in bpf-next master.\nNo regressions." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:32.790Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/b694989bb13ed5f166e633faa1eb0f21c6d261a6" }, { "url": "https://git.kernel.org/stable/c/3364c2ed1c241989847f19cf83e3db903ce689e3" }, { "url": "https://git.kernel.org/stable/c/a21d76bd0b0d39518e9a4c19f6cf7c042a974aff" }, { "url": "https://git.kernel.org/stable/c/7e5471b5efebc30dd0bc035cda86693a5c73d45f" }, { "url": "https://git.kernel.org/stable/c/ff941a8449e712eaf7efca1a13bfb9afd3d99fc2" }, { "url": "https://git.kernel.org/stable/c/009367099eb61a4fc2af44d4eb06b6b4de7de6db" } ], "title": "bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42161", "datePublished": "2024-07-30T07:47:03.136Z", "dateReserved": "2024-07-29T15:50:41.196Z", "dateUpdated": "2024-11-05T09:38:32.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42133
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
Bluetooth: Ignore too large handle values in BIG
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.554Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/38263088b845abeeeb98dda5b87c0de3063b6dbb" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/dad0003ccc68457baf005a6ed75b4d321463fe3d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/015d79c96d62cd8a4a359fcf5be40d58088c936b" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42133", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:19.014130Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:36.283Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/bluetooth/hci_event.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "38263088b845", "status": "affected", "version": "84cb0143fb8a", "versionType": "git" }, { "lessThan": "dad0003ccc68", "status": "affected", "version": "181a42edddf5", "versionType": "git" }, { "lessThan": "015d79c96d62", "status": "affected", "version": "181a42edddf5", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/bluetooth/hci_event.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.7" }, { "lessThan": "6.7", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Ignore too large handle values in BIG\n\nhci_le_big_sync_established_evt is necessary to filter out cases where the\nhandle value is belonging to ida id range, otherwise ida will be erroneously\nreleased in hci_conn_cleanup." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:02.659Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/38263088b845abeeeb98dda5b87c0de3063b6dbb" }, { "url": "https://git.kernel.org/stable/c/dad0003ccc68457baf005a6ed75b4d321463fe3d" }, { "url": "https://git.kernel.org/stable/c/015d79c96d62cd8a4a359fcf5be40d58088c936b" } ], "title": "Bluetooth: Ignore too large handle values in BIG", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42133", "datePublished": "2024-07-30T07:46:28.632Z", "dateReserved": "2024-07-29T15:50:41.186Z", "dateUpdated": "2024-11-05T09:38:02.659Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41052
Vulnerability from cvelistv5
Published
2024-07-29 14:32
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
vfio/pci: Init the count variable in collecting hot-reset devices
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.022Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f476dffc52ea70745dcabf63288e770e50ac9ab3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f44136b9652291ac1fc39ca67c053ac624d0d11b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5a88a3f67e37e39f933b38ebb4985ba5822e9eca" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41052", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:38.248336Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:01.796Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/vfio/pci/vfio_pci_core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "f476dffc52ea", "status": "affected", "version": "618fbf4c910a", "versionType": "git" }, { "lessThan": "f44136b96522", "status": "affected", "version": "9313244c26f3", "versionType": "git" }, { "lessThan": "5a88a3f67e37", "status": "affected", "version": "f6944d4a0b87", "versionType": "git" } ] }, { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/vfio/pci/vfio_pci_core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "6.6.41", "status": "affected", "version": "6.6.36", "versionType": "semver" }, { "lessThan": "6.9.10", "status": "affected", "version": "6.9.7", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Init the count variable in collecting hot-reset devices\n\nThe count variable is used without initialization, it results in mistakes\nin the device counting and crashes the userspace if the get hot reset info\npath is triggered." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:43.645Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/f476dffc52ea70745dcabf63288e770e50ac9ab3" }, { "url": "https://git.kernel.org/stable/c/f44136b9652291ac1fc39ca67c053ac624d0d11b" }, { "url": "https://git.kernel.org/stable/c/5a88a3f67e37e39f933b38ebb4985ba5822e9eca" } ], "title": "vfio/pci: Init the count variable in collecting hot-reset devices", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41052", "datePublished": "2024-07-29T14:32:08.262Z", "dateReserved": "2024-07-12T12:17:45.626Z", "dateUpdated": "2024-11-05T09:35:43.645Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52887
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-04 14:54
Severity ?
EPSS score ?
Summary
net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.317Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ed581989d7ea9df6f8646beba2341e32cd49a1f9" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f6c839e717901dbd6b1c1ca807b6210222eb70f6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1762ca80c2b72dd1b5821c5e347713ae696276ea" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/26b18dd30e63d4fd777be429148e8e4ed66f60b2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/177e33b655d35d72866b50aec84307119dc5f3d4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0bc0a7416ea73f79f915c9a05ac0858dff65cfed" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d3e2904f71ea0fe7eaff1d68a2b0363c888ea0fb" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-52887", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:12.491125Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:08.617Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/can/j1939/transport.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "ed581989d7ea", "status": "affected", "version": "9d71dd0c7009", "versionType": "git" }, { "lessThan": "f6c839e71790", "status": "affected", "version": "9d71dd0c7009", "versionType": "git" }, { "lessThan": "1762ca80c2b7", "status": "affected", "version": "9d71dd0c7009", "versionType": "git" }, { "lessThan": "26b18dd30e63", "status": "affected", "version": "9d71dd0c7009", "versionType": "git" }, { "lessThan": "177e33b655d3", "status": "affected", "version": "9d71dd0c7009", "versionType": "git" }, { "lessThan": "0bc0a7416ea7", "status": "affected", "version": "9d71dd0c7009", "versionType": "git" }, { "lessThan": "d3e2904f71ea", "status": "affected", "version": "9d71dd0c7009", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/can/j1939/transport.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.4" }, { "lessThan": "5.4", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.279", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new\n\nThis patch enhances error handling in scenarios with RTS (Request to\nSend) messages arriving closely. It replaces the less informative WARN_ON_ONCE\nbacktraces with a new error handling method. This provides clearer error\nmessages and allows for the early termination of problematic sessions.\nPreviously, sessions were only released at the end of j1939_xtp_rx_rts().\n\nPotentially this could be reproduced with something like:\ntestj1939 -r vcan0:0x80 \u0026\nwhile true; do\n\t# send first RTS\n\tcansend vcan0 18EC8090#1014000303002301;\n\t# send second RTS\n\tcansend vcan0 18EC8090#1014000303002301;\n\t# send abort\n\tcansend vcan0 18EC8090#ff00000000002301;\ndone" } ], "providerMetadata": { "dateUpdated": "2024-11-04T14:54:37.447Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/ed581989d7ea9df6f8646beba2341e32cd49a1f9" }, { "url": "https://git.kernel.org/stable/c/f6c839e717901dbd6b1c1ca807b6210222eb70f6" }, { "url": "https://git.kernel.org/stable/c/1762ca80c2b72dd1b5821c5e347713ae696276ea" }, { "url": "https://git.kernel.org/stable/c/26b18dd30e63d4fd777be429148e8e4ed66f60b2" }, { "url": "https://git.kernel.org/stable/c/177e33b655d35d72866b50aec84307119dc5f3d4" }, { "url": "https://git.kernel.org/stable/c/0bc0a7416ea73f79f915c9a05ac0858dff65cfed" }, { "url": "https://git.kernel.org/stable/c/d3e2904f71ea0fe7eaff1d68a2b0363c888ea0fb" } ], "title": "net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2023-52887", "datePublished": "2024-07-29T15:52:27.615Z", "dateReserved": "2024-05-21T15:35:00.782Z", "dateUpdated": "2024-11-04T14:54:37.447Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42084
Vulnerability from cvelistv5
Published
2024-07-29 16:26
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
ftruncate: pass a signed offset
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.893Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c329760749b5419769e57cb2be80955d2805f9c9" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f531d4bc6c5588d713359e42ed65e46816d841d8" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/84bf6b64a1a0dfc6de7e1b1c776d58d608e7865a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/dbb226d81cd02cee140139c2369791e6f61f2007" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5ae6af68410bdad6181ec82104bb9985a7a6a0fa" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/836359247b0403e0634bfbc83e5bb8063fad287a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/930a4c369f74da26816eaaa71b5888d29b759c27" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4b8e88e563b5f666446d002ad0dc1e6e8e7102b0" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42084", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:00.394795Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:49.940Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/open.c", "include/linux/compat.h", "include/linux/syscalls.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "c329760749b5", "status": "affected", "version": "3f6d078d4acc", "versionType": "git" }, { "lessThan": "f531d4bc6c55", "status": "affected", "version": "3f6d078d4acc", "versionType": "git" }, { "lessThan": "84bf6b64a1a0", "status": "affected", "version": "3f6d078d4acc", "versionType": "git" }, { "lessThan": "dbb226d81cd0", "status": "affected", "version": "3f6d078d4acc", "versionType": "git" }, { "lessThan": "5ae6af68410b", "status": "affected", "version": "3f6d078d4acc", "versionType": "git" }, { "lessThan": "836359247b04", "status": "affected", "version": "3f6d078d4acc", "versionType": "git" }, { "lessThan": "930a4c369f74", "status": "affected", "version": "3f6d078d4acc", "versionType": "git" }, { "lessThan": "4b8e88e563b5", "status": "affected", "version": "3f6d078d4acc", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/open.c", "include/linux/compat.h", "include/linux/syscalls.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "3.9" }, { "lessThan": "3.9", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.317", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.279", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nftruncate: pass a signed offset\n\nThe old ftruncate() syscall, using the 32-bit off_t misses a sign\nextension when called in compat mode on 64-bit architectures. As a\nresult, passing a negative length accidentally succeeds in truncating\nto file size between 2GiB and 4GiB.\n\nChanging the type of the compat syscall to the signed compat_off_t\nchanges the behavior so it instead returns -EINVAL.\n\nThe native entry point, the truncate() syscall and the corresponding\nloff_t based variants are all correct already and do not suffer\nfrom this mistake." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:05.735Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/c329760749b5419769e57cb2be80955d2805f9c9" }, { "url": "https://git.kernel.org/stable/c/f531d4bc6c5588d713359e42ed65e46816d841d8" }, { "url": "https://git.kernel.org/stable/c/84bf6b64a1a0dfc6de7e1b1c776d58d608e7865a" }, { "url": "https://git.kernel.org/stable/c/dbb226d81cd02cee140139c2369791e6f61f2007" }, { "url": "https://git.kernel.org/stable/c/5ae6af68410bdad6181ec82104bb9985a7a6a0fa" }, { "url": "https://git.kernel.org/stable/c/836359247b0403e0634bfbc83e5bb8063fad287a" }, { "url": "https://git.kernel.org/stable/c/930a4c369f74da26816eaaa71b5888d29b759c27" }, { "url": "https://git.kernel.org/stable/c/4b8e88e563b5f666446d002ad0dc1e6e8e7102b0" } ], "title": "ftruncate: pass a signed offset", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42084", "datePublished": "2024-07-29T16:26:20.581Z", "dateReserved": "2024-07-29T15:50:41.170Z", "dateUpdated": "2024-11-05T09:37:05.735Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41094
Vulnerability from cvelistv5
Published
2024-07-29 15:48
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
drm/fbdev-dma: Only set smem_start is enable per module option
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.465Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f29fcfbf6067c0d8c83f84a045da9276c08deac5" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/00702cfa8432ac67a72f56de5e1d278ddea2ebde" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d92a7580392ad4681b1d4f9275d00b95375ebe01" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41094", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:29.018042Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:09.433Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/drm_fb_helper.c", "drivers/gpu/drm/drm_fbdev_dma.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "f29fcfbf6067", "status": "affected", "version": "a51c7663f144", "versionType": "git" }, { "lessThan": "00702cfa8432", "status": "affected", "version": "a51c7663f144", "versionType": "git" }, { "lessThan": "d92a7580392a", "status": "affected", "version": "a51c7663f144", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/drm_fb_helper.c", "drivers/gpu/drm/drm_fbdev_dma.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.4" }, { "lessThan": "6.4", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/fbdev-dma: Only set smem_start is enable per module option\n\nOnly export struct fb_info.fix.smem_start if that is required by the\nuser and the memory does not come from vmalloc().\n\nSetting struct fb_info.fix.smem_start breaks systems where DMA\nmemory is backed by vmalloc address space. An example error is\nshown below.\n\n[ 3.536043] ------------[ cut here ]------------\n[ 3.540716] virt_to_phys used for non-linear address: 000000007fc4f540 (0xffff800086001000)\n[ 3.552628] WARNING: CPU: 4 PID: 61 at arch/arm64/mm/physaddr.c:12 __virt_to_phys+0x68/0x98\n[ 3.565455] Modules linked in:\n[ 3.568525] CPU: 4 PID: 61 Comm: kworker/u12:5 Not tainted 6.6.23-06226-g4986cc3e1b75-dirty #250\n[ 3.577310] Hardware name: NXP i.MX95 19X19 board (DT)\n[ 3.582452] Workqueue: events_unbound deferred_probe_work_func\n[ 3.588291] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 3.595233] pc : __virt_to_phys+0x68/0x98\n[ 3.599246] lr : __virt_to_phys+0x68/0x98\n[ 3.603276] sp : ffff800083603990\n[ 3.677939] Call trace:\n[ 3.680393] __virt_to_phys+0x68/0x98\n[ 3.684067] drm_fbdev_dma_helper_fb_probe+0x138/0x238\n[ 3.689214] __drm_fb_helper_initial_config_and_unlock+0x2b0/0x4c0\n[ 3.695385] drm_fb_helper_initial_config+0x4c/0x68\n[ 3.700264] drm_fbdev_dma_client_hotplug+0x8c/0xe0\n[ 3.705161] drm_client_register+0x60/0xb0\n[ 3.709269] drm_fbdev_dma_setup+0x94/0x148\n\nAdditionally, DMA memory is assumed to by contiguous in physical\naddress space, which is not guaranteed by vmalloc().\n\nResolve this by checking the module flag drm_leak_fbdev_smem when\nDRM allocated the instance of struct fb_info. Fbdev-dma then only\nsets smem_start only if required (via FBINFO_HIDE_SMEM_START). Also\nguarantee that the framebuffer is not located in vmalloc address\nspace." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:35.306Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/f29fcfbf6067c0d8c83f84a045da9276c08deac5" }, { "url": "https://git.kernel.org/stable/c/00702cfa8432ac67a72f56de5e1d278ddea2ebde" }, { "url": "https://git.kernel.org/stable/c/d92a7580392ad4681b1d4f9275d00b95375ebe01" } ], "title": "drm/fbdev-dma: Only set smem_start is enable per module option", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41094", "datePublished": "2024-07-29T15:48:07.508Z", "dateReserved": "2024-07-12T12:17:45.637Z", "dateUpdated": "2024-11-05T09:36:35.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42106
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
inet_diag: Initialize pad field in struct inet_diag_req_v2
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.551Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7094a5fd20ab66028f1da7f06e0f2692d70346f9" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0184bf0a349f4cf9e663abbe862ff280e8e4dfa2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7ef519c8efde152e0d632337f2994f6921e0b7e4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8366720519ea8d322a20780debdfd23d9fc0904a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d6f487e0704de2f2d15f8dd5d7d723210f2b2fdb" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/76965648fe6858db7c5f3c700fef7aa5f124ca1c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f9b2010e8af49fac9d9562146fb81744d8a9b051" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/61cf1c739f08190a4cbf047b9fbb192a94d87e3f" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42106", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:46.157657Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:07.725Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/ipv4/inet_diag.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "7094a5fd20ab", "status": "affected", "version": "432490f9d455", "versionType": "git" }, { "lessThan": "0184bf0a349f", "status": "affected", "version": "432490f9d455", "versionType": "git" }, { "lessThan": "7ef519c8efde", "status": "affected", "version": "432490f9d455", "versionType": "git" }, { "lessThan": "8366720519ea", "status": "affected", "version": "432490f9d455", "versionType": "git" }, { "lessThan": "d6f487e0704d", "status": "affected", "version": "432490f9d455", "versionType": "git" }, { "lessThan": "76965648fe68", "status": "affected", "version": "432490f9d455", "versionType": "git" }, { "lessThan": "f9b2010e8af4", "status": "affected", "version": "432490f9d455", "versionType": "git" }, { "lessThan": "61cf1c739f08", "status": "affected", "version": "432490f9d455", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/ipv4/inet_diag.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.10" }, { "lessThan": "4.10", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet_diag: Initialize pad field in struct inet_diag_req_v2\n\nKMSAN reported uninit-value access in raw_lookup() [1]. Diag for raw\nsockets uses the pad field in struct inet_diag_req_v2 for the\nunderlying protocol. This field corresponds to the sdiag_raw_protocol\nfield in struct inet_diag_req_raw.\n\ninet_diag_get_exact_compat() converts inet_diag_req to\ninet_diag_req_v2, but leaves the pad field uninitialized. So the issue\noccurs when raw_lookup() accesses the sdiag_raw_protocol field.\n\nFix this by initializing the pad field in\ninet_diag_get_exact_compat(). Also, do the same fix in\ninet_diag_dump_compat() to avoid the similar issue in the future.\n\n[1]\nBUG: KMSAN: uninit-value in raw_lookup net/ipv4/raw_diag.c:49 [inline]\nBUG: KMSAN: uninit-value in raw_sock_get+0x657/0x800 net/ipv4/raw_diag.c:71\n raw_lookup net/ipv4/raw_diag.c:49 [inline]\n raw_sock_get+0x657/0x800 net/ipv4/raw_diag.c:71\n raw_diag_dump_one+0xa1/0x660 net/ipv4/raw_diag.c:99\n inet_diag_cmd_exact+0x7d9/0x980\n inet_diag_get_exact_compat net/ipv4/inet_diag.c:1404 [inline]\n inet_diag_rcv_msg_compat+0x469/0x530 net/ipv4/inet_diag.c:1426\n sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282\n netlink_rcv_skb+0x537/0x670 net/netlink/af_netlink.c:2564\n sock_diag_rcv+0x35/0x40 net/core/sock_diag.c:297\n netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]\n netlink_unicast+0xe74/0x1240 net/netlink/af_netlink.c:1361\n netlink_sendmsg+0x10c6/0x1260 net/netlink/af_netlink.c:1905\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x332/0x3d0 net/socket.c:745\n ____sys_sendmsg+0x7f0/0xb70 net/socket.c:2585\n ___sys_sendmsg+0x271/0x3b0 net/socket.c:2639\n __sys_sendmsg net/socket.c:2668 [inline]\n __do_sys_sendmsg net/socket.c:2677 [inline]\n __se_sys_sendmsg net/socket.c:2675 [inline]\n __x64_sys_sendmsg+0x27e/0x4a0 net/socket.c:2675\n x64_sys_call+0x135e/0x3ce0 arch/x86/include/generated/asm/syscalls_64.h:47\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xd9/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was stored to memory at:\n raw_sock_get+0x650/0x800 net/ipv4/raw_diag.c:71\n raw_diag_dump_one+0xa1/0x660 net/ipv4/raw_diag.c:99\n inet_diag_cmd_exact+0x7d9/0x980\n inet_diag_get_exact_compat net/ipv4/inet_diag.c:1404 [inline]\n inet_diag_rcv_msg_compat+0x469/0x530 net/ipv4/inet_diag.c:1426\n sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282\n netlink_rcv_skb+0x537/0x670 net/netlink/af_netlink.c:2564\n sock_diag_rcv+0x35/0x40 net/core/sock_diag.c:297\n netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]\n netlink_unicast+0xe74/0x1240 net/netlink/af_netlink.c:1361\n netlink_sendmsg+0x10c6/0x1260 net/netlink/af_netlink.c:1905\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x332/0x3d0 net/socket.c:745\n ____sys_sendmsg+0x7f0/0xb70 net/socket.c:2585\n ___sys_sendmsg+0x271/0x3b0 net/socket.c:2639\n __sys_sendmsg net/socket.c:2668 [inline]\n __do_sys_sendmsg net/socket.c:2677 [inline]\n __se_sys_sendmsg net/socket.c:2675 [inline]\n __x64_sys_sendmsg+0x27e/0x4a0 net/socket.c:2675\n x64_sys_call+0x135e/0x3ce0 arch/x86/include/generated/asm/syscalls_64.h:47\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xd9/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nLocal variable req.i created at:\n inet_diag_get_exact_compat net/ipv4/inet_diag.c:1396 [inline]\n inet_diag_rcv_msg_compat+0x2a6/0x530 net/ipv4/inet_diag.c:1426\n sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282\n\nCPU: 1 PID: 8888 Comm: syz-executor.6 Not tainted 6.10.0-rc4-00217-g35bb670d65fc #32\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:31.666Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/7094a5fd20ab66028f1da7f06e0f2692d70346f9" }, { "url": "https://git.kernel.org/stable/c/0184bf0a349f4cf9e663abbe862ff280e8e4dfa2" }, { "url": "https://git.kernel.org/stable/c/7ef519c8efde152e0d632337f2994f6921e0b7e4" }, { "url": "https://git.kernel.org/stable/c/8366720519ea8d322a20780debdfd23d9fc0904a" }, { "url": "https://git.kernel.org/stable/c/d6f487e0704de2f2d15f8dd5d7d723210f2b2fdb" }, { "url": "https://git.kernel.org/stable/c/76965648fe6858db7c5f3c700fef7aa5f124ca1c" }, { "url": "https://git.kernel.org/stable/c/f9b2010e8af49fac9d9562146fb81744d8a9b051" }, { "url": "https://git.kernel.org/stable/c/61cf1c739f08190a4cbf047b9fbb192a94d87e3f" } ], "title": "inet_diag: Initialize pad field in struct inet_diag_req_v2", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42106", "datePublished": "2024-07-30T07:46:01.865Z", "dateReserved": "2024-07-29T15:50:41.175Z", "dateUpdated": "2024-11-05T09:37:31.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41031
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
mm/filemap: skip to create PMD-sized page cache if needed
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.076Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/06b5a69c27ec405a3c3f2da8520ff1ee70b94a21" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1ef650d3b1b2a16473981b447f38705fe9b93972" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3390916aca7af1893ed2ebcdfee1d6fdb65bb058" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41031", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:23:47.337033Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:03.906Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "mm/filemap.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "06b5a69c27ec", "status": "affected", "version": "4687fdbb805a", "versionType": "git" }, { "lessThan": "1ef650d3b1b2", "status": "affected", "version": "4687fdbb805a", "versionType": "git" }, { "lessThan": "3390916aca7a", "status": "affected", "version": "4687fdbb805a", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "mm/filemap.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.18" }, { "lessThan": "5.18", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/filemap: skip to create PMD-sized page cache if needed\n\nOn ARM64, HPAGE_PMD_ORDER is 13 when the base page size is 64KB. The\nPMD-sized page cache can\u0027t be supported by xarray as the following error\nmessages indicate.\n\n------------[ cut here ]------------\nWARNING: CPU: 35 PID: 7484 at lib/xarray.c:1025 xas_split_alloc+0xf8/0x128\nModules linked in: nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib \\\nnft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct \\\nnft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 \\\nip_set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm \\\nfuse xfs libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 \\\nsha1_ce virtio_net net_failover virtio_console virtio_blk failover \\\ndimlib virtio_mmio\nCPU: 35 PID: 7484 Comm: test Kdump: loaded Tainted: G W 6.10.0-rc5-gavin+ #9\nHardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 05/24/2024\npstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\npc : xas_split_alloc+0xf8/0x128\nlr : split_huge_page_to_list_to_order+0x1c4/0x720\nsp : ffff800087a4f6c0\nx29: ffff800087a4f6c0 x28: ffff800087a4f720 x27: 000000001fffffff\nx26: 0000000000000c40 x25: 000000000000000d x24: ffff00010625b858\nx23: ffff800087a4f720 x22: ffffffdfc0780000 x21: 0000000000000000\nx20: 0000000000000000 x19: ffffffdfc0780000 x18: 000000001ff40000\nx17: 00000000ffffffff x16: 0000018000000000 x15: 51ec004000000000\nx14: 0000e00000000000 x13: 0000000000002000 x12: 0000000000000020\nx11: 51ec000000000000 x10: 51ece1c0ffff8000 x9 : ffffbeb961a44d28\nx8 : 0000000000000003 x7 : ffffffdfc0456420 x6 : ffff0000e1aa6eb8\nx5 : 20bf08b4fe778fca x4 : ffffffdfc0456420 x3 : 0000000000000c40\nx2 : 000000000000000d x1 : 000000000000000c x0 : 0000000000000000\nCall trace:\n xas_split_alloc+0xf8/0x128\n split_huge_page_to_list_to_order+0x1c4/0x720\n truncate_inode_partial_folio+0xdc/0x160\n truncate_inode_pages_range+0x1b4/0x4a8\n truncate_pagecache_range+0x84/0xa0\n xfs_flush_unmap_range+0x70/0x90 [xfs]\n xfs_file_fallocate+0xfc/0x4d8 [xfs]\n vfs_fallocate+0x124/0x2e8\n ksys_fallocate+0x4c/0xa0\n __arm64_sys_fallocate+0x24/0x38\n invoke_syscall.constprop.0+0x7c/0xd8\n do_el0_svc+0xb4/0xd0\n el0_svc+0x44/0x1d8\n el0t_64_sync_handler+0x134/0x150\n el0t_64_sync+0x17c/0x180\n\nFix it by skipping to allocate PMD-sized page cache when its size is\nlarger than MAX_PAGECACHE_ORDER. For this specific case, we will fall to\nregular path where the readahead window is determined by BDI\u0027s sysfs file\n(read_ahead_kb)." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:19.821Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/06b5a69c27ec405a3c3f2da8520ff1ee70b94a21" }, { "url": "https://git.kernel.org/stable/c/1ef650d3b1b2a16473981b447f38705fe9b93972" }, { "url": "https://git.kernel.org/stable/c/3390916aca7af1893ed2ebcdfee1d6fdb65bb058" } ], "title": "mm/filemap: skip to create PMD-sized page cache if needed", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41031", "datePublished": "2024-07-29T14:31:46.943Z", "dateReserved": "2024-07-12T12:17:45.618Z", "dateUpdated": "2024-11-05T09:35:19.821Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41049
Vulnerability from cvelistv5
Published
2024-07-29 14:32
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
filelock: fix potential use-after-free in posix_lock_inode
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.373Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1cbbb3d9475c403ebedc327490c7c2b991398197" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7d4c14f4b511fd4c0dc788084ae59b4656ace58b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/02a8964260756c70b20393ad4006948510ac9967" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5cb36e35bc10ea334810937990c2b9023dacb1b0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/432b06b69d1d354a171f7499141116536579eb6a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/116599f6a26906cf33f67975c59f0692ecf7e9b2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1b3ec4f7c03d4b07bad70697d7e2f4088d2cfe92" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41049", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:47.848280Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:01.912Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/locks.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "1cbbb3d9475c", "status": "affected", "version": "117fb80cd1e6", "versionType": "git" }, { "lessThan": "7d4c14f4b511", "status": "affected", "version": "a6f4129378ca", "versionType": "git" }, { "lessThan": "02a896426075", "status": "affected", "version": "766e56faddbe", "versionType": "git" }, { "lessThan": "5cb36e35bc10", "status": "affected", "version": "34bff6d85001", "versionType": "git" }, { "lessThan": "432b06b69d1d", "status": "affected", "version": "74f6f5912693", "versionType": "git" }, { "lessThan": "116599f6a269", "status": "affected", "version": "74f6f5912693", "versionType": "git" }, { "lessThan": "1b3ec4f7c03d", "status": "affected", "version": "74f6f5912693", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/locks.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.6" }, { "lessThan": "6.6", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfilelock: fix potential use-after-free in posix_lock_inode\n\nLight Hsieh reported a KASAN UAF warning in trace_posix_lock_inode().\nThe request pointer had been changed earlier to point to a lock entry\nthat was added to the inode\u0027s list. However, before the tracepoint could\nfire, another task raced in and freed that lock.\n\nFix this by moving the tracepoint inside the spinlock, which should\nensure that this doesn\u0027t happen." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:40.250Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/1cbbb3d9475c403ebedc327490c7c2b991398197" }, { "url": "https://git.kernel.org/stable/c/7d4c14f4b511fd4c0dc788084ae59b4656ace58b" }, { "url": "https://git.kernel.org/stable/c/02a8964260756c70b20393ad4006948510ac9967" }, { "url": "https://git.kernel.org/stable/c/5cb36e35bc10ea334810937990c2b9023dacb1b0" }, { "url": "https://git.kernel.org/stable/c/432b06b69d1d354a171f7499141116536579eb6a" }, { "url": "https://git.kernel.org/stable/c/116599f6a26906cf33f67975c59f0692ecf7e9b2" }, { "url": "https://git.kernel.org/stable/c/1b3ec4f7c03d4b07bad70697d7e2f4088d2cfe92" } ], "title": "filelock: fix potential use-after-free in posix_lock_inode", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41049", "datePublished": "2024-07-29T14:32:05.953Z", "dateReserved": "2024-07-12T12:17:45.625Z", "dateUpdated": "2024-11-05T09:35:40.250Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41064
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
powerpc/eeh: avoid possible crash when edev->pdev changes
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.169Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8836e1bf5838ac6c08760e0a2dd7cf6410aa7ff3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/033c51dfdbb6b79ab43fb3587276fa82d0a329e1" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4fad7fef847b6028475dd7b4c14fcb82b3e51274" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4bc246d2d60d071314842fa448faa4ed39082aff" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f23c3d1ca9c4b2d626242a4e7e1ec1770447f7b5" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/428d940a8b6b3350b282c14d3f63350bde65c48b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a1216e62d039bf63a539bbe718536ec789a853dd" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41064", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:59.237031Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:58.925Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "arch/powerpc/kernel/eeh_pe.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "8836e1bf5838", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "033c51dfdbb6", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "4fad7fef847b", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "4bc246d2d60d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "f23c3d1ca9c4", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "428d940a8b6b", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "a1216e62d039", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "arch/powerpc/kernel/eeh_pe.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.281", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.223", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.164", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/eeh: avoid possible crash when edev-\u003epdev changes\n\nIf a PCI device is removed during eeh_pe_report_edev(), edev-\u003epdev\nwill change and can cause a crash, hold the PCI rescan/remove lock\nwhile taking a copy of edev-\u003epdev-\u003ebus." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:01.481Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/8836e1bf5838ac6c08760e0a2dd7cf6410aa7ff3" }, { "url": "https://git.kernel.org/stable/c/033c51dfdbb6b79ab43fb3587276fa82d0a329e1" }, { "url": "https://git.kernel.org/stable/c/4fad7fef847b6028475dd7b4c14fcb82b3e51274" }, { "url": "https://git.kernel.org/stable/c/4bc246d2d60d071314842fa448faa4ed39082aff" }, { "url": "https://git.kernel.org/stable/c/f23c3d1ca9c4b2d626242a4e7e1ec1770447f7b5" }, { "url": "https://git.kernel.org/stable/c/428d940a8b6b3350b282c14d3f63350bde65c48b" }, { "url": "https://git.kernel.org/stable/c/a1216e62d039bf63a539bbe718536ec789a853dd" } ], "title": "powerpc/eeh: avoid possible crash when edev-\u003epdev changes", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41064", "datePublished": "2024-07-29T14:57:26.086Z", "dateReserved": "2024-07-12T12:17:45.628Z", "dateUpdated": "2024-11-05T09:36:01.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41092
Vulnerability from cvelistv5
Published
2024-07-29 15:48
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
drm/i915/gt: Fix potential UAF by revoke of fence registers
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f771b91f21c46ad1217328d05e72a2c7e3add535" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/29c0fdf49078ab161570d3d1c6e13d66f182717d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ca0fabd365a27a94a36e68a7a02df8ff3c13dac6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/06dec31a0a5112a91f49085e8a8fa1a82296d5c7" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/414f4a31f7a811008fd9a33b06216b060bad18fc" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/996c3412a06578e9d779a16b9e79ace18125ab50" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41092", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:35.535942Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:56.013Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/i915/gt/intel_ggtt_fencing.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "f771b91f21c4", "status": "affected", "version": "0d86ee35097a", "versionType": "git" }, { "lessThan": "29c0fdf49078", "status": "affected", "version": "0d86ee35097a", "versionType": "git" }, { "lessThan": "ca0fabd365a2", "status": "affected", "version": "0d86ee35097a", "versionType": "git" }, { "lessThan": "06dec31a0a51", "status": "affected", "version": "0d86ee35097a", "versionType": "git" }, { "lessThan": "414f4a31f7a8", "status": "affected", "version": "0d86ee35097a", "versionType": "git" }, { "lessThan": "996c3412a065", "status": "affected", "version": "0d86ee35097a", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/i915/gt/intel_ggtt_fencing.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.8" }, { "lessThan": "5.8", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/gt: Fix potential UAF by revoke of fence registers\n\nCI has been sporadically reporting the following issue triggered by\nigt@i915_selftest@live@hangcheck on ADL-P and similar machines:\n\n\u003c6\u003e [414.049203] i915: Running intel_hangcheck_live_selftests/igt_reset_evict_fence\n...\n\u003c6\u003e [414.068804] i915 0000:00:02.0: [drm] GT0: GUC: submission enabled\n\u003c6\u003e [414.068812] i915 0000:00:02.0: [drm] GT0: GUC: SLPC enabled\n\u003c3\u003e [414.070354] Unable to pin Y-tiled fence; err:-4\n\u003c3\u003e [414.071282] i915_vma_revoke_fence:301 GEM_BUG_ON(!i915_active_is_idle(\u0026fence-\u003eactive))\n...\n\u003c4\u003e[ 609.603992] ------------[ cut here ]------------\n\u003c2\u003e[ 609.603995] kernel BUG at drivers/gpu/drm/i915/gt/intel_ggtt_fencing.c:301!\n\u003c4\u003e[ 609.604003] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n\u003c4\u003e[ 609.604006] CPU: 0 PID: 268 Comm: kworker/u64:3 Tainted: G U W 6.9.0-CI_DRM_14785-g1ba62f8cea9c+ #1\n\u003c4\u003e[ 609.604008] Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 01/20/2023\n\u003c4\u003e[ 609.604010] Workqueue: i915 __i915_gem_free_work [i915]\n\u003c4\u003e[ 609.604149] RIP: 0010:i915_vma_revoke_fence+0x187/0x1f0 [i915]\n...\n\u003c4\u003e[ 609.604271] Call Trace:\n\u003c4\u003e[ 609.604273] \u003cTASK\u003e\n...\n\u003c4\u003e[ 609.604716] __i915_vma_evict+0x2e9/0x550 [i915]\n\u003c4\u003e[ 609.604852] __i915_vma_unbind+0x7c/0x160 [i915]\n\u003c4\u003e[ 609.604977] force_unbind+0x24/0xa0 [i915]\n\u003c4\u003e[ 609.605098] i915_vma_destroy+0x2f/0xa0 [i915]\n\u003c4\u003e[ 609.605210] __i915_gem_object_pages_fini+0x51/0x2f0 [i915]\n\u003c4\u003e[ 609.605330] __i915_gem_free_objects.isra.0+0x6a/0xc0 [i915]\n\u003c4\u003e[ 609.605440] process_scheduled_works+0x351/0x690\n...\n\nIn the past, there were similar failures reported by CI from other IGT\ntests, observed on other platforms.\n\nBefore commit 63baf4f3d587 (\"drm/i915/gt: Only wait for GPU activity\nbefore unbinding a GGTT fence\"), i915_vma_revoke_fence() was waiting for\nidleness of vma-\u003eactive via fence_update(). That commit introduced\nvma-\u003efence-\u003eactive in order for the fence_update() to be able to wait\nselectively on that one instead of vma-\u003eactive since only idleness of\nfence registers was needed. But then, another commit 0d86ee35097a\n(\"drm/i915/gt: Make fence revocation unequivocal\") replaced the call to\nfence_update() in i915_vma_revoke_fence() with only fence_write(), and\nalso added that GEM_BUG_ON(!i915_active_is_idle(\u0026fence-\u003eactive)) in front.\nNo justification was provided on why we might then expect idleness of\nvma-\u003efence-\u003eactive without first waiting on it.\n\nThe issue can be potentially caused by a race among revocation of fence\nregisters on one side and sequential execution of signal callbacks invoked\non completion of a request that was using them on the other, still\nprocessed in parallel to revocation of those fence registers. Fix it by\nwaiting for idleness of vma-\u003efence-\u003eactive in i915_vma_revoke_fence().\n\n(cherry picked from commit 24bb052d3dd499c5956abad5f7d8e4fd07da7fb1)" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:33.084Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/f771b91f21c46ad1217328d05e72a2c7e3add535" }, { "url": "https://git.kernel.org/stable/c/29c0fdf49078ab161570d3d1c6e13d66f182717d" }, { "url": "https://git.kernel.org/stable/c/ca0fabd365a27a94a36e68a7a02df8ff3c13dac6" }, { "url": "https://git.kernel.org/stable/c/06dec31a0a5112a91f49085e8a8fa1a82296d5c7" }, { "url": "https://git.kernel.org/stable/c/414f4a31f7a811008fd9a33b06216b060bad18fc" }, { "url": "https://git.kernel.org/stable/c/996c3412a06578e9d779a16b9e79ace18125ab50" } ], "title": "drm/i915/gt: Fix potential UAF by revoke of fence registers", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41092", "datePublished": "2024-07-29T15:48:05.853Z", "dateReserved": "2024-07-12T12:17:45.636Z", "dateUpdated": "2024-11-05T09:36:33.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41035
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.166Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d8418fd083d1b90a6c007cf8dcf81aeae274727b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/60abea505b726b38232a0ef410d2bd1994a77f78" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2bd8534a1b83c65702aec3cab164170f8e584188" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9edcf317620d7c6a8354911b69b874cf89716646" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/647d61aef106dbed9c70447bcddbd4968e67ca64" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/37514a5c1251a8c5c95c323f55050736e7069ac7" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a368ecde8a5055b627749b09c6218ef793043e47" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41035", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:23:33.705561Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:03.568Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/usb/core/config.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "d8418fd083d1", "status": "affected", "version": "0a8fd1346254", "versionType": "git" }, { "lessThan": "60abea505b72", "status": "affected", "version": "0a8fd1346254", "versionType": "git" }, { "lessThan": "d09dd21bb521", "status": "affected", "version": "0a8fd1346254", "versionType": "git" }, { "lessThan": "2bd8534a1b83", "status": "affected", "version": "0a8fd1346254", "versionType": "git" }, { "lessThan": "9edcf317620d", "status": "affected", "version": "0a8fd1346254", "versionType": "git" }, { "lessThan": "647d61aef106", "status": "affected", "version": "0a8fd1346254", "versionType": "git" }, { "lessThan": "37514a5c1251", "status": "affected", "version": "0a8fd1346254", "versionType": "git" }, { "lessThan": "a368ecde8a50", "status": "affected", "version": "0a8fd1346254", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/usb/core/config.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.10" }, { "lessThan": "4.10", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor\n\nSyzbot has identified a bug in usbcore (see the Closes: tag below)\ncaused by our assumption that the reserved bits in an endpoint\ndescriptor\u0027s bEndpointAddress field will always be 0. As a result of\nthe bug, the endpoint_is_duplicate() routine in config.c (and possibly\nother routines as well) may believe that two descriptors are for\ndistinct endpoints, even though they have the same direction and\nendpoint number. This can lead to confusion, including the bug\nidentified by syzbot (two descriptors with matching endpoint numbers\nand directions, where one was interrupt and the other was bulk).\n\nTo fix the bug, we will clear the reserved bits in bEndpointAddress\nwhen we parse the descriptor. (Note that both the USB-2.0 and USB-3.1\nspecs say these bits are \"Reserved, reset to zero\".) This requires us\nto make a copy of the descriptor earlier in usb_parse_endpoint() and\nuse the copy instead of the original when checking for duplicates." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:24.670Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/d8418fd083d1b90a6c007cf8dcf81aeae274727b" }, { "url": "https://git.kernel.org/stable/c/60abea505b726b38232a0ef410d2bd1994a77f78" }, { "url": "https://git.kernel.org/stable/c/d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf" }, { "url": "https://git.kernel.org/stable/c/2bd8534a1b83c65702aec3cab164170f8e584188" }, { "url": "https://git.kernel.org/stable/c/9edcf317620d7c6a8354911b69b874cf89716646" }, { "url": "https://git.kernel.org/stable/c/647d61aef106dbed9c70447bcddbd4968e67ca64" }, { "url": "https://git.kernel.org/stable/c/37514a5c1251a8c5c95c323f55050736e7069ac7" }, { "url": "https://git.kernel.org/stable/c/a368ecde8a5055b627749b09c6218ef793043e47" } ], "title": "USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41035", "datePublished": "2024-07-29T14:31:49.876Z", "dateReserved": "2024-07-12T12:17:45.619Z", "dateUpdated": "2024-11-05T09:35:24.670Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42065
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-12-09 14:21
Severity ?
EPSS score ?
Summary
drm/xe: Add a NULL check in xe_ttm_stolen_mgr_init
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.342Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/cc796a77985d6af75c9362cb2e73dce4ae3f97cd" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a6eff8f9c7e844cb24ccb188ca24abcd59734e74" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42065", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:02.589091Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:58.414Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/xe/xe_ttm_stolen_mgr.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "cc796a77985d", "status": "affected", "version": "dd08ebf6c352", "versionType": "git" }, { "lessThan": "a6eff8f9c7e8", "status": "affected", "version": "dd08ebf6c352", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/xe/xe_ttm_stolen_mgr.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.8" }, { "lessThan": "6.8", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Add a NULL check in xe_ttm_stolen_mgr_init\n\nAdd an explicit check to ensure that the mgr is not NULL." } ], "providerMetadata": { "dateUpdated": "2024-12-09T14:21:20.475Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/cc796a77985d6af75c9362cb2e73dce4ae3f97cd" }, { "url": "https://git.kernel.org/stable/c/a6eff8f9c7e844cb24ccb188ca24abcd59734e74" } ], "title": "drm/xe: Add a NULL check in xe_ttm_stolen_mgr_init", "x_generator": { "engine": "bippy-8e903de6a542" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42065", "datePublished": "2024-07-29T15:52:30.162Z", "dateReserved": "2024-07-29T15:50:41.166Z", "dateUpdated": "2024-12-09T14:21:20.475Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41098
Vulnerability from cvelistv5
Published
2024-07-29 15:48
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
ata: libata-core: Fix null pointer dereference on error
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/119c97ace2a9ffcf4dc09a23bb057d6c281aff28" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8a8ff7e3b736a70d7b7c8764cbcd2724d4079ec8" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5d92c7c566dc76d96e0e19e481d926bbe6631c1e" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41098", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:15.779725Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:08.738Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/ata/libata-core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "d9c4df80b1b0", "status": "affected", "version": "633273a3ed1c", "versionType": "git" }, { "lessThan": "56e62977eaaa", "status": "affected", "version": "633273a3ed1c", "versionType": "git" }, { "lessThan": "e83405e75d90", "status": "affected", "version": "633273a3ed1c", "versionType": "git" }, { "lessThan": "221e3b1297e7", "status": "affected", "version": "633273a3ed1c", "versionType": "git" }, { "lessThan": "0f0d37c154bb", "status": "affected", "version": "633273a3ed1c", "versionType": "git" }, { "lessThan": "119c97ace2a9", "status": "affected", "version": "633273a3ed1c", "versionType": "git" }, { "lessThan": "8a8ff7e3b736", "status": "affected", "version": "633273a3ed1c", "versionType": "git" }, { "lessThan": "5d92c7c566dc", "status": "affected", "version": "633273a3ed1c", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/ata/libata-core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "2.6.24" }, { "lessThan": "2.6.24", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.321", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.283", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.225", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.166", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.108", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nata: libata-core: Fix null pointer dereference on error\n\nIf the ata_port_alloc() call in ata_host_alloc() fails,\nata_host_release() will get called.\n\nHowever, the code in ata_host_release() tries to free ata_port struct\nmembers unconditionally, which can lead to the following:\n\nBUG: unable to handle page fault for address: 0000000000003990\nPGD 0 P4D 0\nOops: Oops: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 10 PID: 594 Comm: (udev-worker) Not tainted 6.10.0-rc5 #44\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014\nRIP: 0010:ata_host_release.cold+0x2f/0x6e [libata]\nCode: e4 4d 63 f4 44 89 e2 48 c7 c6 90 ad 32 c0 48 c7 c7 d0 70 33 c0 49 83 c6 0e 41\nRSP: 0018:ffffc90000ebb968 EFLAGS: 00010246\nRAX: 0000000000000041 RBX: ffff88810fb52e78 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffff88813b3218c0 RDI: ffff88813b3218c0\nRBP: ffff88810fb52e40 R08: 0000000000000000 R09: 6c65725f74736f68\nR10: ffffc90000ebb738 R11: 73692033203a746e R12: 0000000000000004\nR13: 0000000000000000 R14: 0000000000000011 R15: 0000000000000006\nFS: 00007f6cc55b9980(0000) GS:ffff88813b300000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000003990 CR3: 00000001122a2000 CR4: 0000000000750ef0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? __die_body.cold+0x19/0x27\n ? page_fault_oops+0x15a/0x2f0\n ? exc_page_fault+0x7e/0x180\n ? asm_exc_page_fault+0x26/0x30\n ? ata_host_release.cold+0x2f/0x6e [libata]\n ? ata_host_release.cold+0x2f/0x6e [libata]\n release_nodes+0x35/0xb0\n devres_release_group+0x113/0x140\n ata_host_alloc+0xed/0x120 [libata]\n ata_host_alloc_pinfo+0x14/0xa0 [libata]\n ahci_init_one+0x6c9/0xd20 [ahci]\n\nDo not access ata_port struct members unconditionally." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:39.943Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/d9c4df80b1b009de1eb77c07e3bb4d45bd212aa5" }, { "url": "https://git.kernel.org/stable/c/56e62977eaaae3eb7122ee2cf9b720b6703114a9" }, { "url": "https://git.kernel.org/stable/c/e83405e75d90694ee6a5d898f7f0473ac2686054" }, { "url": "https://git.kernel.org/stable/c/221e3b1297e74fdec32d0f572f4dcb2260a0a2af" }, { "url": "https://git.kernel.org/stable/c/0f0d37c154bb108730c90a91aa31e3170e827962" }, { "url": "https://git.kernel.org/stable/c/119c97ace2a9ffcf4dc09a23bb057d6c281aff28" }, { "url": "https://git.kernel.org/stable/c/8a8ff7e3b736a70d7b7c8764cbcd2724d4079ec8" }, { "url": "https://git.kernel.org/stable/c/5d92c7c566dc76d96e0e19e481d926bbe6631c1e" } ], "title": "ata: libata-core: Fix null pointer dereference on error", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41098", "datePublished": "2024-07-29T15:48:11.093Z", "dateReserved": "2024-07-12T12:17:45.637Z", "dateUpdated": "2024-11-05T09:36:39.943Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42151
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
bpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7f79097b0de97a486b137b750d7dd7b20b519d23" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1479eaff1f16983d8fda7c5a08a586c21891087d" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42151", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:24.877493Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:34.572Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/bpf/bpf_dummy_struct_ops.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "7f79097b0de9", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "1479eaff1f16", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/bpf/bpf_dummy_struct_ops.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable\n\nTest case dummy_st_ops/dummy_init_ret_value passes NULL as the first\nparameter of the test_1() function. Mark this parameter as nullable to\nmake verifier aware of such possibility.\nOtherwise, NULL check in the test_1() code:\n\n SEC(\"struct_ops/test_1\")\n int BPF_PROG(test_1, struct bpf_dummy_ops_state *state)\n {\n if (!state)\n return ...;\n\n ... access state ...\n }\n\nMight be removed by verifier, thus triggering NULL pointer dereference\nunder certain conditions." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:21.450Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/7f79097b0de97a486b137b750d7dd7b20b519d23" }, { "url": "https://git.kernel.org/stable/c/1479eaff1f16983d8fda7c5a08a586c21891087d" } ], "title": "bpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42151", "datePublished": "2024-07-30T07:46:43.969Z", "dateReserved": "2024-07-29T15:50:41.193Z", "dateUpdated": "2024-11-05T09:38:21.450Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41089
Vulnerability from cvelistv5
Published
2024-07-29 15:48
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.333Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ffabad4aa91e33ced3c6ae793fb37771b3e9cb51" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1c9f2e60150b4f13789064370e37f39e6e060f50" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/56fc4d3b0bdef691831cd95715a7ca3ebea98b2d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5eecb49a6c268dc229005bf6e8167d4001dc09a0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/30cbf6ffafbbdd8a6e4e5f0a2e9a9827ee83f3ad" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7ece609b0ce7a7ea8acdf512a77d1fee26621637" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6e49a157d541e7e97b815a56f4bdfcbc89844a59" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6d411c8ccc0137a612e0044489030a194ff5c843" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41089", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:38.800751Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:56.138Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/nouveau/dispnv04/tvnv17.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "ffabad4aa91e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "1c9f2e60150b", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "56fc4d3b0bde", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "5eecb49a6c26", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "30cbf6ffafbb", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "7ece609b0ce7", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "6e49a157d541", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "6d411c8ccc01", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/nouveau/dispnv04/tvnv17.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.317", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.279", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes\n\nIn nv17_tv_get_hd_modes(), the return value of drm_mode_duplicate() is\nassigned to mode, which will lead to a possible NULL pointer dereference\non failure of drm_mode_duplicate(). The same applies to drm_cvt_mode().\nAdd a check to avoid null pointer dereference." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:29.516Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/ffabad4aa91e33ced3c6ae793fb37771b3e9cb51" }, { "url": "https://git.kernel.org/stable/c/1c9f2e60150b4f13789064370e37f39e6e060f50" }, { "url": "https://git.kernel.org/stable/c/56fc4d3b0bdef691831cd95715a7ca3ebea98b2d" }, { "url": "https://git.kernel.org/stable/c/5eecb49a6c268dc229005bf6e8167d4001dc09a0" }, { "url": "https://git.kernel.org/stable/c/30cbf6ffafbbdd8a6e4e5f0a2e9a9827ee83f3ad" }, { "url": "https://git.kernel.org/stable/c/7ece609b0ce7a7ea8acdf512a77d1fee26621637" }, { "url": "https://git.kernel.org/stable/c/6e49a157d541e7e97b815a56f4bdfcbc89844a59" }, { "url": "https://git.kernel.org/stable/c/6d411c8ccc0137a612e0044489030a194ff5c843" } ], "title": "drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41089", "datePublished": "2024-07-29T15:48:04.875Z", "dateReserved": "2024-07-12T12:17:45.634Z", "dateUpdated": "2024-11-05T09:36:29.516Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42089
Vulnerability from cvelistv5
Published
2024-07-29 16:26
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
ASoC: fsl-asoc-card: set priv->pdev before using it
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.275Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ae81535ce2503aabc4adab3472f4338070cdeb6a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8896e18b7c366f8faf9344abfd0971435f1c723a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3662eb2170e59b58ad479982dc1084889ba757b9" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/544ab46b7ece6d6bebbdee5d5659c0a0f804a99a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8faf91e58425c2f6ce773250dfd995f1c2d461ac" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/29bc9e7c75398b0d12fc30955f2e9b2dd29ffaed" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7c18b4d89ff9c810b6e562408afda5ce165c4ea6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/90f3feb24172185f1832636264943e8b5e289245" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42089", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:18:44.318855Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:01.199Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "sound/soc/fsl/fsl-asoc-card.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "ae81535ce250", "status": "affected", "version": "708b4351f08c", "versionType": "git" }, { "lessThan": "8896e18b7c36", "status": "affected", "version": "708b4351f08c", "versionType": "git" }, { "lessThan": "3662eb2170e5", "status": "affected", "version": "708b4351f08c", "versionType": "git" }, { "lessThan": "544ab46b7ece", "status": "affected", "version": "708b4351f08c", "versionType": "git" }, { "lessThan": "8faf91e58425", "status": "affected", "version": "708b4351f08c", "versionType": "git" }, { "lessThan": "29bc9e7c7539", "status": "affected", "version": "708b4351f08c", "versionType": "git" }, { "lessThan": "7c18b4d89ff9", "status": "affected", "version": "708b4351f08c", "versionType": "git" }, { "lessThan": "90f3feb24172", "status": "affected", "version": "708b4351f08c", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "sound/soc/fsl/fsl-asoc-card.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "3.18" }, { "lessThan": "3.18", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.317", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.279", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: fsl-asoc-card: set priv-\u003epdev before using it\n\npriv-\u003epdev pointer was set after being used in\nfsl_asoc_card_audmux_init().\nMove this assignment at the start of the probe function, so\nsub-functions can correctly use pdev through priv.\n\nfsl_asoc_card_audmux_init() dereferences priv-\u003epdev to get access to the\ndev struct, used with dev_err macros.\nAs priv is zero-initialised, there would be a NULL pointer dereference.\nNote that if priv-\u003edev is dereferenced before assignment but never used,\nfor example if there is no error to be printed, the driver won\u0027t crash\nprobably due to compiler optimisations." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:11.465Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/ae81535ce2503aabc4adab3472f4338070cdeb6a" }, { "url": "https://git.kernel.org/stable/c/8896e18b7c366f8faf9344abfd0971435f1c723a" }, { "url": "https://git.kernel.org/stable/c/3662eb2170e59b58ad479982dc1084889ba757b9" }, { "url": "https://git.kernel.org/stable/c/544ab46b7ece6d6bebbdee5d5659c0a0f804a99a" }, { "url": "https://git.kernel.org/stable/c/8faf91e58425c2f6ce773250dfd995f1c2d461ac" }, { "url": "https://git.kernel.org/stable/c/29bc9e7c75398b0d12fc30955f2e9b2dd29ffaed" }, { "url": "https://git.kernel.org/stable/c/7c18b4d89ff9c810b6e562408afda5ce165c4ea6" }, { "url": "https://git.kernel.org/stable/c/90f3feb24172185f1832636264943e8b5e289245" } ], "title": "ASoC: fsl-asoc-card: set priv-\u003epdev before using it", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42089", "datePublished": "2024-07-29T16:26:29.288Z", "dateReserved": "2024-07-29T15:50:41.171Z", "dateUpdated": "2024-11-05T09:37:11.465Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41051
Vulnerability from cvelistv5
Published
2024-07-29 14:32
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
cachefiles: wait for ondemand_object_worker to finish when dropping object
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ec9289369259d982e735a71437e32e6b4035290c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d3179bae72b1b5e555ba839d6d9f40a350a4d78a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b26525b2183632f16a3a4108fe6a4bfa8afac6ed" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/12e009d60852f7bce0afc373ca0b320f14150418" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41051", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:41.369243Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:01.915Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/cachefiles/ondemand.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "ec9289369259", "status": "affected", "version": "f17443d52d80", "versionType": "git" }, { "lessThan": "d3179bae72b1", "status": "affected", "version": "f740fd943bb1", "versionType": "git" }, { "lessThan": "b26525b21836", "status": "affected", "version": "0a7e54c1959c", "versionType": "git" }, { "lessThan": "12e009d60852", "status": "affected", "version": "0a7e54c1959c", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/cachefiles/ondemand.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.8" }, { "lessThan": "6.8", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: wait for ondemand_object_worker to finish when dropping object\n\nWhen queuing ondemand_object_worker() to re-open the object,\ncachefiles_object is not pinned. The cachefiles_object may be freed when\nthe pending read request is completed intentionally and the related\nerofs is umounted. If ondemand_object_worker() runs after the object is\nfreed, it will incur use-after-free problem as shown below.\n\nprocess A processs B process C process D\n\ncachefiles_ondemand_send_req()\n// send a read req X\n// wait for its completion\n\n // close ondemand fd\n cachefiles_ondemand_fd_release()\n // set object as CLOSE\n\n cachefiles_ondemand_daemon_read()\n // set object as REOPENING\n queue_work(fscache_wq, \u0026info-\u003eondemand_work)\n\n // close /dev/cachefiles\n cachefiles_daemon_release\n cachefiles_flush_reqs\n complete(\u0026req-\u003edone)\n\n// read req X is completed\n// umount the erofs fs\ncachefiles_put_object()\n// object will be freed\ncachefiles_ondemand_deinit_obj_info()\nkmem_cache_free(object)\n // both info and object are freed\n ondemand_object_worker()\n\nWhen dropping an object, it is no longer necessary to reopen the object,\nso use cancel_work_sync() to cancel or wait for ondemand_object_worker()\nto finish." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:42.544Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/ec9289369259d982e735a71437e32e6b4035290c" }, { "url": "https://git.kernel.org/stable/c/d3179bae72b1b5e555ba839d6d9f40a350a4d78a" }, { "url": "https://git.kernel.org/stable/c/b26525b2183632f16a3a4108fe6a4bfa8afac6ed" }, { "url": "https://git.kernel.org/stable/c/12e009d60852f7bce0afc373ca0b320f14150418" } ], "title": "cachefiles: wait for ondemand_object_worker to finish when dropping object", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41051", "datePublished": "2024-07-29T14:32:07.577Z", "dateReserved": "2024-07-12T12:17:45.626Z", "dateUpdated": "2024-11-05T09:35:42.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41022
Vulnerability from cvelistv5
Published
2024-07-29 13:34
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.181Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3dd9734878a9042f0358301d19a2b006a0fc4d06" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a5224e2123ce21102f346f518db80f004d5053a7" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/544fa213f15d27f0370795845d55eeb3e00080d2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e8dfbf83a82bbfb9680921719fbe65e535af59ea" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4edb0a84e6b32e75dc9bd6dd085b2c2ff19ec287" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d347c9a398bf7eab9408d207c0a50fb720f9de7d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/298e2ce222e712ffafa47288c5b2fcf33d72fda3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6769a23697f17f9bf9365ca8ed62fe37e361a05a" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41022", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:24:22.256864Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:04.993Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/amdgpu/sdma_v4_0.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "3dd9734878a9", "status": "affected", "version": "5594971e0276", "versionType": "git" }, { "lessThan": "a5224e2123ce", "status": "affected", "version": "8112fa72b7f1", "versionType": "git" }, { "lessThan": "544fa213f15d", "status": "affected", "version": "ea906e9ac61e", "versionType": "git" }, { "lessThan": "e8dfbf83a82b", "status": "affected", "version": "011552f29f20", "versionType": "git" }, { "lessThan": "4edb0a84e6b3", "status": "affected", "version": "5b0a3dc3e878", "versionType": "git" }, { "lessThan": "d347c9a398bf", "status": "affected", "version": "0964c84b93db", "versionType": "git" }, { "lessThan": "298e2ce222e7", "status": "affected", "version": "8b2faf1a4f3b", "versionType": "git" }, { "lessThan": "6769a23697f1", "status": "affected", "version": "8b2faf1a4f3b", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/amdgpu/sdma_v4_0.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.10" }, { "lessThan": "6.10", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.281", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.223", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.164", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.102", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.43", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.12", "versionType": "semver" }, { "lessThanOrEqual": "6.10.*", "status": "unaffected", "version": "6.10.2", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.11", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()\n\nThe \"instance\" variable needs to be signed for the error handling to work." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:09.727Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/3dd9734878a9042f0358301d19a2b006a0fc4d06" }, { "url": "https://git.kernel.org/stable/c/a5224e2123ce21102f346f518db80f004d5053a7" }, { "url": "https://git.kernel.org/stable/c/544fa213f15d27f0370795845d55eeb3e00080d2" }, { "url": "https://git.kernel.org/stable/c/e8dfbf83a82bbfb9680921719fbe65e535af59ea" }, { "url": "https://git.kernel.org/stable/c/4edb0a84e6b32e75dc9bd6dd085b2c2ff19ec287" }, { "url": "https://git.kernel.org/stable/c/d347c9a398bf7eab9408d207c0a50fb720f9de7d" }, { "url": "https://git.kernel.org/stable/c/298e2ce222e712ffafa47288c5b2fcf33d72fda3" }, { "url": "https://git.kernel.org/stable/c/6769a23697f17f9bf9365ca8ed62fe37e361a05a" } ], "title": "drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41022", "datePublished": "2024-07-29T13:34:23.507Z", "dateReserved": "2024-07-12T12:17:45.614Z", "dateUpdated": "2024-11-05T09:35:09.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42228
Vulnerability from cvelistv5
Published
2024-07-30 07:47
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.577Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/855ae72c20310e5402b2317fc537d911e87537ef" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f8f120b3de48b8b6bdf8988a9b334c2d61c17440" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/88a9a467c548d0b3c7761b4fd54a68e70f9c0944" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42228", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:14:31.551012Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:33.081Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/amdgpu/amdgpu_vce.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "d35cf41c8eb5", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "3b5057594476", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "df02642c21c9", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "da6a85d19788", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "9ee1534ecdd5", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "855ae72c2031", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "f8f120b3de48", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "88a9a467c548", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/amdgpu/amdgpu_vce.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.321", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.283", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.225", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.166", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.108", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc\n\nInitialize the size before calling amdgpu_vce_cs_reloc, such as case 0x03000001.\nV2: To really improve the handling we would actually\n need to have a separate value of 0xffffffff.(Christian)" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:39.378Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/d35cf41c8eb5d9fe95b21ae6ee2910f9ba4878e8" }, { "url": "https://git.kernel.org/stable/c/3b505759447637dcccb50cbd98ec6f8d2a04fc46" }, { "url": "https://git.kernel.org/stable/c/df02642c21c984303fe34c3f7d72965792fb1a15" }, { "url": "https://git.kernel.org/stable/c/da6a85d197888067e8d38b5d22c986b5b5cab712" }, { "url": "https://git.kernel.org/stable/c/9ee1534ecdd5b4c013064663502d7fde824d2144" }, { "url": "https://git.kernel.org/stable/c/855ae72c20310e5402b2317fc537d911e87537ef" }, { "url": "https://git.kernel.org/stable/c/f8f120b3de48b8b6bdf8988a9b334c2d61c17440" }, { "url": "https://git.kernel.org/stable/c/88a9a467c548d0b3c7761b4fd54a68e70f9c0944" } ], "title": "drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42228", "datePublished": "2024-07-30T07:47:08.955Z", "dateReserved": "2024-07-30T07:40:12.250Z", "dateUpdated": "2024-11-05T09:38:39.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42094
Vulnerability from cvelistv5
Published
2024-07-29 17:39
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
net/iucv: Avoid explicit cpumask var allocation on stack
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.053Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2b085521be5292016097b5e7ca81b26be3f7098d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/842afb47d84536fc976fece8fb6c54bea711ad1a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9dadab0db7d904413ea1cdaa13f127da05c31e71" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0af718a690acc089aa1bbb95a93df833d864ef53" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d85ca8179a54ff8cf1e1f8c3c9e3799831319bae" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/724e7965af054079242b8d6f7e50ee226730a756" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2d090c7f7be3b26fcb80ac04d08a4a8062b1d959" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/be4e1304419c99a164b4c0e101c7c2a756b635b9" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42094", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:18:27.973708Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:49.342Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/iucv/iucv.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "2b085521be52", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "842afb47d845", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "9dadab0db7d9", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "0af718a690ac", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "d85ca8179a54", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "724e7965af05", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "2d090c7f7be3", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "be4e1304419c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/iucv/iucv.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.317", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.279", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/iucv: Avoid explicit cpumask var allocation on stack\n\nFor CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask\nvariable on stack is not recommended since it can cause potential stack\noverflow.\n\nInstead, kernel code should always use *cpumask_var API(s) to allocate\ncpumask var in config-neutral way, leaving allocation strategy to\nCONFIG_CPUMASK_OFFSTACK.\n\nUse *cpumask_var API(s) to address it." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:17.482Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/2b085521be5292016097b5e7ca81b26be3f7098d" }, { "url": "https://git.kernel.org/stable/c/842afb47d84536fc976fece8fb6c54bea711ad1a" }, { "url": "https://git.kernel.org/stable/c/9dadab0db7d904413ea1cdaa13f127da05c31e71" }, { "url": "https://git.kernel.org/stable/c/0af718a690acc089aa1bbb95a93df833d864ef53" }, { "url": "https://git.kernel.org/stable/c/d85ca8179a54ff8cf1e1f8c3c9e3799831319bae" }, { "url": "https://git.kernel.org/stable/c/724e7965af054079242b8d6f7e50ee226730a756" }, { "url": "https://git.kernel.org/stable/c/2d090c7f7be3b26fcb80ac04d08a4a8062b1d959" }, { "url": "https://git.kernel.org/stable/c/be4e1304419c99a164b4c0e101c7c2a756b635b9" } ], "title": "net/iucv: Avoid explicit cpumask var allocation on stack", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42094", "datePublished": "2024-07-29T17:39:30.191Z", "dateReserved": "2024-07-29T15:50:41.172Z", "dateUpdated": "2024-11-05T09:37:17.482Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41023
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
sched/deadline: Fix task_struct reference leak
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.070Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7a54d31face626f62de415ebe77b43f76c3ffaf4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b58652db66c910c2245f5bee7deca41c12d707b9" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41023", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:24:19.073103Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:04.883Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "kernel/sched/deadline.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "7a54d31face6", "status": "affected", "version": "feff2e65efd8", "versionType": "git" }, { "lessThan": "b58652db66c9", "status": "affected", "version": "feff2e65efd8", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "kernel/sched/deadline.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.10" }, { "lessThan": "5.10", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/deadline: Fix task_struct reference leak\n\nDuring the execution of the following stress test with linux-rt:\n\nstress-ng --cyclic 30 --timeout 30 --minimize --quiet\n\nkmemleak frequently reported a memory leak concerning the task_struct:\n\nunreferenced object 0xffff8881305b8000 (size 16136):\n comm \"stress-ng\", pid 614, jiffies 4294883961 (age 286.412s)\n object hex dump (first 32 bytes):\n 02 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .@..............\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n debug hex dump (first 16 bytes):\n 53 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 S...............\n backtrace:\n [\u003c00000000046b6790\u003e] dup_task_struct+0x30/0x540\n [\u003c00000000c5ca0f0b\u003e] copy_process+0x3d9/0x50e0\n [\u003c00000000ced59777\u003e] kernel_clone+0xb0/0x770\n [\u003c00000000a50befdc\u003e] __do_sys_clone+0xb6/0xf0\n [\u003c000000001dbf2008\u003e] do_syscall_64+0x5d/0xf0\n [\u003c00000000552900ff\u003e] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nThe issue occurs in start_dl_timer(), which increments the task_struct\nreference count and sets a timer. The timer callback, dl_task_timer,\nis supposed to decrement the reference count upon expiration. However,\nif enqueue_task_dl() is called before the timer expires and cancels it,\nthe reference count is not decremented, leading to the leak.\n\nThis patch fixes the reference leak by ensuring the task_struct\nreference count is properly decremented when the timer is canceled." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:10.815Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/7a54d31face626f62de415ebe77b43f76c3ffaf4" }, { "url": "https://git.kernel.org/stable/c/b58652db66c910c2245f5bee7deca41c12d707b9" } ], "title": "sched/deadline: Fix task_struct reference leak", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41023", "datePublished": "2024-07-29T14:31:40.439Z", "dateReserved": "2024-07-12T12:17:45.615Z", "dateUpdated": "2024-11-05T09:35:10.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42080
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
RDMA/restrack: Fix potential invalid address access
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.089Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8656ef8a9288d6c932654f8d3856dc4ab1cfc6b5" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/782bdaf9d01658281bc813f3f873e6258aa1fd8d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8ac281d42337f36cf7061cf1ea094181b84bc1a9" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f45b43d17240e9ca67ebf3cc82bb046b07cc1c61" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ca537a34775c103f7b14d7bbd976403f1d1525d8" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42080", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:13.837287Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:07.840Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/infiniband/core/restrack.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "8656ef8a9288", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "782bdaf9d016", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "8ac281d42337", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "f45b43d17240", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "ca537a34775c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/infiniband/core/restrack.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/restrack: Fix potential invalid address access\n\nstruct rdma_restrack_entry\u0027s kern_name was set to KBUILD_MODNAME\nin ib_create_cq(), while if the module exited but forgot del this\nrdma_restrack_entry, it would cause a invalid address access in\nrdma_restrack_clean() when print the owner of this rdma_restrack_entry.\n\nThese code is used to help find one forgotten PD release in one of the\nULPs. But it is not needed anymore, so delete them." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:00.966Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/8656ef8a9288d6c932654f8d3856dc4ab1cfc6b5" }, { "url": "https://git.kernel.org/stable/c/782bdaf9d01658281bc813f3f873e6258aa1fd8d" }, { "url": "https://git.kernel.org/stable/c/8ac281d42337f36cf7061cf1ea094181b84bc1a9" }, { "url": "https://git.kernel.org/stable/c/f45b43d17240e9ca67ebf3cc82bb046b07cc1c61" }, { "url": "https://git.kernel.org/stable/c/ca537a34775c103f7b14d7bbd976403f1d1525d8" } ], "title": "RDMA/restrack: Fix potential invalid address access", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42080", "datePublished": "2024-07-29T15:52:42.228Z", "dateReserved": "2024-07-29T15:50:41.170Z", "dateUpdated": "2024-11-05T09:37:00.966Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42068
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.888Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a359696856ca9409fb97655c5a8ef0f549cb6e03" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e4f602e3ff749ba770bf8ff10196e18358de6720" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/fdd411af8178edc6b7bf260f8fa4fba1bedd0a6d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e3540e5a7054d6daaf9a1415a48aacb092112a89" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/05412471beba313ecded95aa17b25fe84bb2551a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7d2cc63eca0c993c99d18893214abf8f85d566d8" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42068", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:52.600102Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:08.404Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "include/linux/filter.h", "kernel/bpf/core.c", "kernel/bpf/verifier.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "a359696856ca", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "e4f602e3ff74", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "fdd411af8178", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "e3540e5a7054", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "05412471beba", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "7d2cc63eca0c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "include/linux/filter.h", "kernel/bpf/core.c", "kernel/bpf/verifier.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.38", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro()\n\nset_memory_ro() can fail, leaving memory unprotected.\n\nCheck its return and take it into account as an error." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:46.849Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/a359696856ca9409fb97655c5a8ef0f549cb6e03" }, { "url": "https://git.kernel.org/stable/c/e4f602e3ff749ba770bf8ff10196e18358de6720" }, { "url": "https://git.kernel.org/stable/c/fdd411af8178edc6b7bf260f8fa4fba1bedd0a6d" }, { "url": "https://git.kernel.org/stable/c/e3540e5a7054d6daaf9a1415a48aacb092112a89" }, { "url": "https://git.kernel.org/stable/c/05412471beba313ecded95aa17b25fe84bb2551a" }, { "url": "https://git.kernel.org/stable/c/7d2cc63eca0c993c99d18893214abf8f85d566d8" } ], "title": "bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro()", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42068", "datePublished": "2024-07-29T15:52:32.538Z", "dateReserved": "2024-07-29T15:50:41.168Z", "dateUpdated": "2024-11-05T09:36:46.849Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41063
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/48542881997e17b49dc16b93fe910e0cfcf7a9f9" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9cfc84b1d464cc024286f42a090718f9067b80ed" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ddeda6ca5f218b668b560d90fc31ae469adbfd92" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d2ce562a5aff1dcd0c50d9808ea825ef90da909f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/96600c2e5ee8213dbab5df1617293d8e847bb4fa" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d6cbce18370641a21dd889e8613d8153df15eb39" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3f939bd73fed12dddc2a32a76116c19ca47c7678" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0d151a103775dd9645c78c97f77d6e2a5298d913" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41063", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:02.545206Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:59.040Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/bluetooth/hci_core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "48542881997e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "9cfc84b1d464", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "ddeda6ca5f21", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "d2ce562a5aff", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "96600c2e5ee8", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "d6cbce183706", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "3f939bd73fed", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "0d151a103775", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/bluetooth/hci_core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.319", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.281", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.223", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.164", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_core: cancel all works upon hci_unregister_dev()\n\nsyzbot is reporting that calling hci_release_dev() from hci_error_reset()\ndue to hci_dev_put() from hci_error_reset() can cause deadlock at\ndestroy_workqueue(), for hci_error_reset() is called from\nhdev-\u003ereq_workqueue which destroy_workqueue() needs to flush.\n\nWe need to make sure that hdev-\u003e{rx_work,cmd_work,tx_work} which are\nqueued into hdev-\u003eworkqueue and hdev-\u003e{power_on,error_reset} which are\nqueued into hdev-\u003ereq_workqueue are no longer running by the moment\n\n destroy_workqueue(hdev-\u003eworkqueue);\n destroy_workqueue(hdev-\u003ereq_workqueue);\n\nare called from hci_release_dev().\n\nCall cancel_work_sync() on these work items from hci_unregister_dev()\nas soon as hdev-\u003elist is removed from hci_dev_list." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:00.087Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/48542881997e17b49dc16b93fe910e0cfcf7a9f9" }, { "url": "https://git.kernel.org/stable/c/9cfc84b1d464cc024286f42a090718f9067b80ed" }, { "url": "https://git.kernel.org/stable/c/ddeda6ca5f218b668b560d90fc31ae469adbfd92" }, { "url": "https://git.kernel.org/stable/c/d2ce562a5aff1dcd0c50d9808ea825ef90da909f" }, { "url": "https://git.kernel.org/stable/c/96600c2e5ee8213dbab5df1617293d8e847bb4fa" }, { "url": "https://git.kernel.org/stable/c/d6cbce18370641a21dd889e8613d8153df15eb39" }, { "url": "https://git.kernel.org/stable/c/3f939bd73fed12dddc2a32a76116c19ca47c7678" }, { "url": "https://git.kernel.org/stable/c/0d151a103775dd9645c78c97f77d6e2a5298d913" } ], "title": "Bluetooth: hci_core: cancel all works upon hci_unregister_dev()", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41063", "datePublished": "2024-07-29T14:57:25.154Z", "dateReserved": "2024-07-12T12:17:45.628Z", "dateUpdated": "2024-11-05T09:36:00.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42107
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
ice: Don't process extts if PTP is disabled
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1c4e524811918600683b1ea87a5e0fc2db64fa9b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/996422e3230e41468f652d754fefd1bdbcd4604e" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42107", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:43.025350Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:07.604Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/intel/ice/ice_ptp.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "1c4e52481191", "status": "affected", "version": "172db5f91d5f", "versionType": "git" }, { "lessThan": "996422e3230e", "status": "affected", "version": "172db5f91d5f", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/intel/ice/ice_ptp.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.14" }, { "lessThan": "5.14", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Don\u0027t process extts if PTP is disabled\n\nThe ice_ptp_extts_event() function can race with ice_ptp_release() and\nresult in a NULL pointer dereference which leads to a kernel panic.\n\nPanic occurs because the ice_ptp_extts_event() function calls\nptp_clock_event() with a NULL pointer. The ice driver has already\nreleased the PTP clock by the time the interrupt for the next external\ntimestamp event occurs.\n\nTo fix this, modify the ice_ptp_extts_event() function to check the\nPTP state and bail early if PTP is not ready." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:33.030Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/1c4e524811918600683b1ea87a5e0fc2db64fa9b" }, { "url": "https://git.kernel.org/stable/c/996422e3230e41468f652d754fefd1bdbcd4604e" } ], "title": "ice: Don\u0027t process extts if PTP is disabled", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42107", "datePublished": "2024-07-30T07:46:02.834Z", "dateReserved": "2024-07-29T15:50:41.176Z", "dateUpdated": "2024-11-05T09:37:33.030Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42224
Vulnerability from cvelistv5
Published
2024-07-30 07:47
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
net: dsa: mv88e6xxx: Correct check for empty list
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.570Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/47d28dde172696031c880c5778633cdca30394ee" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3bf8d70e1455f87856640c3433b3660a31001618" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2a2fe25a103cef73cde356e6d09da10f607e93f5" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8c2c3cca816d074c75a2801d1ca0dea7b0148114" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/aa03f591ef31ba603a4a99d05d25a0f21ab1cd89" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3f25b5f1635449036692a44b771f39f772190c1d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f75625db838ade28f032dacd0f0c8baca42ecde4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4c7f3950a9fd53a62b156c0fe7c3a2c43b0ba19b" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42224", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:14:41.449489Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:33.427Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/dsa/mv88e6xxx/chip.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "47d28dde1726", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "3bf8d70e1455", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "2a2fe25a103c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "8c2c3cca816d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "aa03f591ef31", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "3f25b5f16354", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "f75625db838a", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "4c7f3950a9fd", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/dsa/mv88e6xxx/chip.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: mv88e6xxx: Correct check for empty list\n\nSince commit a3c53be55c95 (\"net: dsa: mv88e6xxx: Support multiple MDIO\nbusses\") mv88e6xxx_default_mdio_bus() has checked that the\nreturn value of list_first_entry() is non-NULL.\n\nThis appears to be intended to guard against the list chip-\u003emdios being\nempty. However, it is not the correct check as the implementation of\nlist_first_entry is not designed to return NULL for empty lists.\n\nInstead, use list_first_entry_or_null() which does return NULL if the\nlist is empty.\n\nFlagged by Smatch.\nCompile tested only." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:36.068Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/47d28dde172696031c880c5778633cdca30394ee" }, { "url": "https://git.kernel.org/stable/c/3bf8d70e1455f87856640c3433b3660a31001618" }, { "url": "https://git.kernel.org/stable/c/2a2fe25a103cef73cde356e6d09da10f607e93f5" }, { "url": "https://git.kernel.org/stable/c/8c2c3cca816d074c75a2801d1ca0dea7b0148114" }, { "url": "https://git.kernel.org/stable/c/aa03f591ef31ba603a4a99d05d25a0f21ab1cd89" }, { "url": "https://git.kernel.org/stable/c/3f25b5f1635449036692a44b771f39f772190c1d" }, { "url": "https://git.kernel.org/stable/c/f75625db838ade28f032dacd0f0c8baca42ecde4" }, { "url": "https://git.kernel.org/stable/c/4c7f3950a9fd53a62b156c0fe7c3a2c43b0ba19b" } ], "title": "net: dsa: mv88e6xxx: Correct check for empty list", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42224", "datePublished": "2024-07-30T07:47:05.608Z", "dateReserved": "2024-07-30T07:40:12.250Z", "dateUpdated": "2024-11-05T09:38:36.068Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42103
Vulnerability from cvelistv5
Published
2024-07-30 07:45
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
btrfs: fix adding block group to a reclaim list and the unused list during reclaim
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.196Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/522b39bd7163e8dc49f8cf10b9b782218ac48746" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/aa1d8cc0cc500e06b316cd6732d4e6c1388fe33c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f8e960be923f74a273c62478c9cab9523936752b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/326fa14549d7969ef80d3f5beea5470cd1c8e67f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/48f091fd50b2eb33ae5eaea9ed3c4f81603acf38" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42103", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:56.057327Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:49.448Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/btrfs/block-group.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "522b39bd7163", "status": "affected", "version": "2311fd03027d", "versionType": "git" }, { "lessThan": "aa1d8cc0cc50", "status": "affected", "version": "15cb476ceb7d", "versionType": "git" }, { "lessThan": "f8e960be923f", "status": "affected", "version": "bf1e8c21f2be", "versionType": "git" }, { "lessThan": "326fa14549d7", "status": "affected", "version": "ab58fe210c40", "versionType": "git" }, { "lessThan": "48f091fd50b2", "status": "affected", "version": "4eb4e85c4f81", "versionType": "git" } ] }, { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/btrfs/block-group.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "5.15.163", "status": "affected", "version": "5.15.162", "versionType": "semver" }, { "lessThan": "6.1.98", "status": "affected", "version": "6.1.96", "versionType": "semver" }, { "lessThan": "6.6.39", "status": "affected", "version": "6.6.36", "versionType": "semver" }, { "lessThan": "6.9.9", "status": "affected", "version": "6.9.7", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix adding block group to a reclaim list and the unused list during reclaim\n\nThere is a potential parallel list adding for retrying in\nbtrfs_reclaim_bgs_work and adding to the unused list. Since the block\ngroup is removed from the reclaim list and it is on a relocation work,\nit can be added into the unused list in parallel. When that happens,\nadding it to the reclaim list will corrupt the list head and trigger\nlist corruption like below.\n\nFix it by taking fs_info-\u003eunused_bgs_lock.\n\n [177.504][T2585409] BTRFS error (device nullb1): error relocating ch= unk 2415919104\n [177.514][T2585409] list_del corruption. next-\u003eprev should be ff1100= 0344b119c0, but was ff11000377e87c70. (next=3Dff110002390cd9c0)\n [177.529][T2585409] ------------[ cut here ]------------\n [177.537][T2585409] kernel BUG at lib/list_debug.c:65!\n [177.545][T2585409] Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI\n [177.555][T2585409] CPU: 9 PID: 2585409 Comm: kworker/u128:2 Tainted: G W 6.10.0-rc5-kts #1\n [177.568][T2585409] Hardware name: Supermicro SYS-520P-WTR/X12SPW-TF, BIOS 1.2 02/14/2022\n [177.579][T2585409] Workqueue: events_unbound btrfs_reclaim_bgs_work[btrfs]\n [177.589][T2585409] RIP: 0010:__list_del_entry_valid_or_report.cold+0x70/0x72\n [177.624][T2585409] RSP: 0018:ff11000377e87a70 EFLAGS: 00010286\n [177.633][T2585409] RAX: 000000000000006d RBX: ff11000344b119c0 RCX:0000000000000000\n [177.644][T2585409] RDX: 000000000000006d RSI: 0000000000000008 RDI:ffe21c006efd0f40\n [177.655][T2585409] RBP: ff110002e0509f78 R08: 0000000000000001 R09:ffe21c006efd0f08\n [177.665][T2585409] R10: ff11000377e87847 R11: 0000000000000000 R12:ff110002390cd9c0\n [177.676][T2585409] R13: ff11000344b119c0 R14: ff110002e0508000 R15:dffffc0000000000\n [177.687][T2585409] FS: 0000000000000000(0000) GS:ff11000fec880000(0000) knlGS:0000000000000000\n [177.700][T2585409] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [177.709][T2585409] CR2: 00007f06bc7b1978 CR3: 0000001021e86005 CR4:0000000000771ef0\n [177.720][T2585409] DR0: 0000000000000000 DR1: 0000000000000000 DR2:0000000000000000\n [177.731][T2585409] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:0000000000000400\n [177.742][T2585409] PKRU: 55555554\n [177.748][T2585409] Call Trace:\n [177.753][T2585409] \u003cTASK\u003e\n [177.759][T2585409] ? __die_body.cold+0x19/0x27\n [177.766][T2585409] ? die+0x2e/0x50\n [177.772][T2585409] ? do_trap+0x1ea/0x2d0\n [177.779][T2585409] ? __list_del_entry_valid_or_report.cold+0x70/0x72\n [177.788][T2585409] ? do_error_trap+0xa3/0x160\n [177.795][T2585409] ? __list_del_entry_valid_or_report.cold+0x70/0x72\n [177.805][T2585409] ? handle_invalid_op+0x2c/0x40\n [177.812][T2585409] ? __list_del_entry_valid_or_report.cold+0x70/0x72\n [177.820][T2585409] ? exc_invalid_op+0x2d/0x40\n [177.827][T2585409] ? asm_exc_invalid_op+0x1a/0x20\n [177.834][T2585409] ? __list_del_entry_valid_or_report.cold+0x70/0x72\n [177.843][T2585409] btrfs_delete_unused_bgs+0x3d9/0x14c0 [btrfs]\n\nThere is a similar retry_list code in btrfs_delete_unused_bgs(), but it is\nsafe, AFAICS. Since the block group was in the unused list, the used bytes\nshould be 0 when it was added to the unused list. Then, it checks\nblock_group-\u003e{used,reserved,pinned} are still 0 under the\nblock_group-\u003elock. So, they should be still eligible for the unused list,\nnot the reclaim list.\n\nThe reason it is safe there it\u0027s because because we\u0027re holding\nspace_info-\u003egroups_sem in write mode.\n\nThat means no other task can allocate from the block group, so while we\nare at deleted_unused_bgs() it\u0027s not possible for other tasks to\nallocate and deallocate extents from the block group, so it can\u0027t be\nadded to the unused list or the reclaim list by anyone else.\n\nThe bug can be reproduced by btrfs/166 after a few rounds. In practice\nthis can be hit when relocation cannot find more chunk space and ends\nwith ENOSPC." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:27.736Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/522b39bd7163e8dc49f8cf10b9b782218ac48746" }, { "url": "https://git.kernel.org/stable/c/aa1d8cc0cc500e06b316cd6732d4e6c1388fe33c" }, { "url": "https://git.kernel.org/stable/c/f8e960be923f74a273c62478c9cab9523936752b" }, { "url": "https://git.kernel.org/stable/c/326fa14549d7969ef80d3f5beea5470cd1c8e67f" }, { "url": "https://git.kernel.org/stable/c/48f091fd50b2eb33ae5eaea9ed3c4f81603acf38" } ], "title": "btrfs: fix adding block group to a reclaim list and the unused list during reclaim", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42103", "datePublished": "2024-07-30T07:45:59.220Z", "dateReserved": "2024-07-29T15:50:41.175Z", "dateUpdated": "2024-11-05T09:37:27.736Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42111
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
btrfs: always do the basic checks for btrfs_qgroup_inherit structure
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.553Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ebe5ea02577b2c527958af1b76ac472c7ab53a56" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/724d8042cef84496ddb4492dc120291f997ae26b" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42111", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:29.663997Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:06.663Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/btrfs/qgroup.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "ebe5ea02577b", "status": "affected", "version": "b5357cb268c4", "versionType": "git" }, { "lessThan": "724d8042cef8", "status": "affected", "version": "b5357cb268c4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/btrfs/qgroup.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.9" }, { "lessThan": "6.9", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: always do the basic checks for btrfs_qgroup_inherit structure\n\n[BUG]\nSyzbot reports the following regression detected by KASAN:\n\n BUG: KASAN: slab-out-of-bounds in btrfs_qgroup_inherit+0x42e/0x2e20 fs/btrfs/qgroup.c:3277\n Read of size 8 at addr ffff88814628ca50 by task syz-executor318/5171\n\n CPU: 0 PID: 5171 Comm: syz-executor318 Not tainted 6.10.0-rc2-syzkaller-00010-g2ab795141095 #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\n Call Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n btrfs_qgroup_inherit+0x42e/0x2e20 fs/btrfs/qgroup.c:3277\n create_pending_snapshot+0x1359/0x29b0 fs/btrfs/transaction.c:1854\n create_pending_snapshots+0x195/0x1d0 fs/btrfs/transaction.c:1922\n btrfs_commit_transaction+0xf20/0x3740 fs/btrfs/transaction.c:2382\n create_snapshot+0x6a1/0x9e0 fs/btrfs/ioctl.c:875\n btrfs_mksubvol+0x58f/0x710 fs/btrfs/ioctl.c:1029\n btrfs_mksnapshot+0xb5/0xf0 fs/btrfs/ioctl.c:1075\n __btrfs_ioctl_snap_create+0x387/0x4b0 fs/btrfs/ioctl.c:1340\n btrfs_ioctl_snap_create_v2+0x1f2/0x3a0 fs/btrfs/ioctl.c:1422\n btrfs_ioctl+0x99e/0xc60\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x7fcbf1992509\n RSP: 002b:00007fcbf1928218 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n RAX: ffffffffffffffda RBX: 00007fcbf1a1f618 RCX: 00007fcbf1992509\n RDX: 0000000020000280 RSI: 0000000050009417 RDI: 0000000000000003\n RBP: 00007fcbf1a1f610 R08: 00007ffea1298e97 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcbf19eb660\n R13: 00000000200002b8 R14: 00007fcbf19e60c0 R15: 0030656c69662f2e\n \u003c/TASK\u003e\n\nAnd it also pinned it down to commit b5357cb268c4 (\"btrfs: qgroup: do not\ncheck qgroup inherit if qgroup is disabled\").\n\n[CAUSE]\nThat offending commit skips the whole qgroup inherit check if qgroup is\nnot enabled.\n\nBut that also skips the very basic checks like\nnum_ref_copies/num_excl_copies and the structure size checks.\n\nMeaning if a qgroup enable/disable race is happening at the background,\nand we pass a btrfs_qgroup_inherit structure when the qgroup is\ndisabled, the check would be completely skipped.\n\nThen at the time of transaction commitment, qgroup is re-enabled and\nbtrfs_qgroup_inherit() is going to use the incorrect structure and\ncausing the above KASAN error.\n\n[FIX]\nMake btrfs_qgroup_check_inherit() only skip the source qgroup checks.\nSo that even if invalid btrfs_qgroup_inherit structure is passed in, we\ncan still reject invalid ones no matter if qgroup is enabled or not.\n\nFurthermore we do already have an extra safety inside\nbtrfs_qgroup_inherit(), which would just ignore invalid qgroup sources,\nso even if we only skip the qgroup source check we\u0027re still safe." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:37.602Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/ebe5ea02577b2c527958af1b76ac472c7ab53a56" }, { "url": "https://git.kernel.org/stable/c/724d8042cef84496ddb4492dc120291f997ae26b" } ], "title": "btrfs: always do the basic checks for btrfs_qgroup_inherit structure", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42111", "datePublished": "2024-07-30T07:46:05.570Z", "dateReserved": "2024-07-29T15:50:41.176Z", "dateUpdated": "2024-11-05T09:37:37.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42075
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
bpf: Fix remap of arena.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.802Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/87496a1b01e8e2e399428c0db25e106f7961d01e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b90d77e5fd784ada62ddd714d15ee2400c28e1cf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42075", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:30.060305Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:57.585Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "kernel/bpf/arena.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "87496a1b01e8", "status": "affected", "version": "317460317a02", "versionType": "git" }, { "lessThan": "b90d77e5fd78", "status": "affected", "version": "317460317a02", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "kernel/bpf/arena.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.9" }, { "lessThan": "6.9", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix remap of arena.\n\nThe bpf arena logic didn\u0027t account for mremap operation. Add a refcnt for\nmultiple mmap events to prevent use-after-free in arena_vm_close." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:54.973Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/87496a1b01e8e2e399428c0db25e106f7961d01e" }, { "url": "https://git.kernel.org/stable/c/b90d77e5fd784ada62ddd714d15ee2400c28e1cf" } ], "title": "bpf: Fix remap of arena.", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42075", "datePublished": "2024-07-29T15:52:38.154Z", "dateReserved": "2024-07-29T15:50:41.169Z", "dateUpdated": "2024-11-05T09:36:54.973Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41097
Vulnerability from cvelistv5
Published
2024-07-29 15:48
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
usb: atm: cxacru: fix endpoint checking in cxacru_bind()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.472Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5159a81924311c1ec786ad9fdef784ead8676a6a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/23926d316d2836315cb113569f91393266eb5b47" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/75ddbf776dd04a09fb9e5267ead5d0c989f84506" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1aac4be1aaa5177506219f01dce5e29194e5e95a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5584c776a1af7807ca815ee6265f2c1429fc5727" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f536f09eb45e4de8d1b9accee9d992aa1846f1d4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ac9007520e392541a29daebaae8b9109007bc781" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2eabb655a968b862bc0c31629a09f0fbf3c80d51" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41097", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:18.903942Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:08.858Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/usb/atm/cxacru.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "5159a8192431", "status": "affected", "version": "902ffc3c707c", "versionType": "git" }, { "lessThan": "23926d316d28", "status": "affected", "version": "902ffc3c707c", "versionType": "git" }, { "lessThan": "75ddbf776dd0", "status": "affected", "version": "902ffc3c707c", "versionType": "git" }, { "lessThan": "1aac4be1aaa5", "status": "affected", "version": "902ffc3c707c", "versionType": "git" }, { "lessThan": "5584c776a1af", "status": "affected", "version": "902ffc3c707c", "versionType": "git" }, { "lessThan": "f536f09eb45e", "status": "affected", "version": "902ffc3c707c", "versionType": "git" }, { "lessThan": "ac9007520e39", "status": "affected", "version": "902ffc3c707c", "versionType": "git" }, { "lessThan": "2eabb655a968", "status": "affected", "version": "902ffc3c707c", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/usb/atm/cxacru.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "2.6.36" }, { "lessThan": "2.6.36", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.317", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.279", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: atm: cxacru: fix endpoint checking in cxacru_bind()\n\nSyzbot is still reporting quite an old issue [1] that occurs due to\nincomplete checking of present usb endpoints. As such, wrong\nendpoints types may be used at urb sumbitting stage which in turn\ntriggers a warning in usb_submit_urb().\n\nFix the issue by verifying that required endpoint types are present\nfor both in and out endpoints, taking into account cmd endpoint type.\n\nUnfortunately, this patch has not been tested on real hardware.\n\n[1] Syzbot report:\nusb 1-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 0 PID: 8667 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\nModules linked in:\nCPU: 0 PID: 8667 Comm: kworker/0:4 Not tainted 5.14.0-rc4-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\n...\nCall Trace:\n cxacru_cm+0x3c0/0x8e0 drivers/usb/atm/cxacru.c:649\n cxacru_card_status+0x22/0xd0 drivers/usb/atm/cxacru.c:760\n cxacru_bind+0x7ac/0x11a0 drivers/usb/atm/cxacru.c:1209\n usbatm_usb_probe+0x321/0x1ae0 drivers/usb/atm/usbatm.c:1055\n cxacru_usb_probe+0xdf/0x1e0 drivers/usb/atm/cxacru.c:1363\n usb_probe_interface+0x315/0x7f0 drivers/usb/core/driver.c:396\n call_driver_probe drivers/base/dd.c:517 [inline]\n really_probe+0x23c/0xcd0 drivers/base/dd.c:595\n __driver_probe_device+0x338/0x4d0 drivers/base/dd.c:747\n driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:777\n __device_attach_driver+0x20b/0x2f0 drivers/base/dd.c:894\n bus_for_each_drv+0x15f/0x1e0 drivers/base/bus.c:427\n __device_attach+0x228/0x4a0 drivers/base/dd.c:965\n bus_probe_device+0x1e4/0x290 drivers/base/bus.c:487\n device_add+0xc2f/0x2180 drivers/base/core.c:3354\n usb_set_configuration+0x113a/0x1910 drivers/usb/core/message.c:2170\n usb_generic_driver_probe+0xba/0x100 drivers/usb/core/generic.c:238\n usb_probe_device+0xd9/0x2c0 drivers/usb/core/driver.c:293" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:38.745Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/5159a81924311c1ec786ad9fdef784ead8676a6a" }, { "url": "https://git.kernel.org/stable/c/23926d316d2836315cb113569f91393266eb5b47" }, { "url": "https://git.kernel.org/stable/c/75ddbf776dd04a09fb9e5267ead5d0c989f84506" }, { "url": "https://git.kernel.org/stable/c/1aac4be1aaa5177506219f01dce5e29194e5e95a" }, { "url": "https://git.kernel.org/stable/c/5584c776a1af7807ca815ee6265f2c1429fc5727" }, { "url": "https://git.kernel.org/stable/c/f536f09eb45e4de8d1b9accee9d992aa1846f1d4" }, { "url": "https://git.kernel.org/stable/c/ac9007520e392541a29daebaae8b9109007bc781" }, { "url": "https://git.kernel.org/stable/c/2eabb655a968b862bc0c31629a09f0fbf3c80d51" } ], "title": "usb: atm: cxacru: fix endpoint checking in cxacru_bind()", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41097", "datePublished": "2024-07-29T15:48:10.175Z", "dateReserved": "2024-07-12T12:17:45.637Z", "dateUpdated": "2024-11-05T09:36:38.745Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42229
Vulnerability from cvelistv5
Published
2024-07-30 07:47
Modified
2024-11-08 15:55
Severity ?
EPSS score ?
Summary
crypto: aead,cipher - zeroize key buffer after use
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.567Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9db8c299a521813630fcb4154298cb60c37f3133" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/71dd428615375e36523f4d4f7685ddd54113646d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/28c8d274848feba552e95c5c2a7e3cfe8f15c534" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b502d4a08875ea2b4ea5d5b28dc7c991c8b90cfb" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f58679996a831754a356974376f248aa0af2eb8e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/23e4099bdc3c8381992f9eb975c79196d6755210" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42229", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:14:28.221263Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:32.961Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "crypto/aead.c", "crypto/cipher.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "89b9b6fa4463", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "b716e9c3603e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "9db8c299a521", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "71dd42861537", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "28c8d274848f", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "b502d4a08875", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "f58679996a83", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "23e4099bdc3c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "crypto/aead.c", "crypto/cipher.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.323", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.285", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: aead,cipher - zeroize key buffer after use\n\nI.G 9.7.B for FIPS 140-3 specifies that variables temporarily holding\ncryptographic information should be zeroized once they are no longer\nneeded. Accomplish this by using kfree_sensitive for buffers that\npreviously held the private key." } ], "providerMetadata": { "dateUpdated": "2024-11-08T15:55:44.468Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/89b9b6fa4463daf820e6a5ef65c3b0c2db239513" }, { "url": "https://git.kernel.org/stable/c/b716e9c3603ee95ed45e938fe47227d22cf3ec35" }, { "url": "https://git.kernel.org/stable/c/9db8c299a521813630fcb4154298cb60c37f3133" }, { "url": "https://git.kernel.org/stable/c/71dd428615375e36523f4d4f7685ddd54113646d" }, { "url": "https://git.kernel.org/stable/c/28c8d274848feba552e95c5c2a7e3cfe8f15c534" }, { "url": "https://git.kernel.org/stable/c/b502d4a08875ea2b4ea5d5b28dc7c991c8b90cfb" }, { "url": "https://git.kernel.org/stable/c/f58679996a831754a356974376f248aa0af2eb8e" }, { "url": "https://git.kernel.org/stable/c/23e4099bdc3c8381992f9eb975c79196d6755210" } ], "title": "crypto: aead,cipher - zeroize key buffer after use", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42229", "datePublished": "2024-07-30T07:47:09.817Z", "dateReserved": "2024-07-30T07:40:12.250Z", "dateUpdated": "2024-11-08T15:55:44.468Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42126
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.570Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8d3f83dfb23674540c827a8d65fba20aa300b252" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0f37946c62c48a907625348cbc720a7a0c547d1e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2c78c9411e685dbc9eac8c2845111b03501975b8" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0db880fc865ffb522141ced4bfa66c12ab1fbb70" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42126", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:41.546139Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:04.533Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "arch/powerpc/include/asm/interrupt.h", "arch/powerpc/include/asm/percpu.h", "arch/powerpc/kernel/setup_64.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "fb6675db04c4", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "e2afb26615ad", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "8d3f83dfb236", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "0f37946c62c4", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "2c78c9411e68", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "0db880fc865f", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "arch/powerpc/include/asm/interrupt.h", "arch/powerpc/include/asm/percpu.h", "arch/powerpc/kernel/setup_64.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.224", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.165", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc: Avoid nmi_enter/nmi_exit in real mode interrupt.\n\nnmi_enter()/nmi_exit() touches per cpu variables which can lead to kernel\ncrash when invoked during real mode interrupt handling (e.g. early HMI/MCE\ninterrupt handler) if percpu allocation comes from vmalloc area.\n\nEarly HMI/MCE handlers are called through DEFINE_INTERRUPT_HANDLER_NMI()\nwrapper which invokes nmi_enter/nmi_exit calls. We don\u0027t see any issue when\npercpu allocation is from the embedded first chunk. However with\nCONFIG_NEED_PER_CPU_PAGE_FIRST_CHUNK enabled there are chances where percpu\nallocation can come from the vmalloc area.\n\nWith kernel command line \"percpu_alloc=page\" we can force percpu allocation\nto come from vmalloc area and can see kernel crash in machine_check_early:\n\n[ 1.215714] NIP [c000000000e49eb4] rcu_nmi_enter+0x24/0x110\n[ 1.215717] LR [c0000000000461a0] machine_check_early+0xf0/0x2c0\n[ 1.215719] --- interrupt: 200\n[ 1.215720] [c000000fffd73180] [0000000000000000] 0x0 (unreliable)\n[ 1.215722] [c000000fffd731b0] [0000000000000000] 0x0\n[ 1.215724] [c000000fffd73210] [c000000000008364] machine_check_early_common+0x134/0x1f8\n\nFix this by avoiding use of nmi_enter()/nmi_exit() in real mode if percpu\nfirst chunk is not embedded." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:54.664Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/fb6675db04c4b79883373edc578d5df7bbc84848" }, { "url": "https://git.kernel.org/stable/c/e2afb26615adf6c3ceaaa7732aa839bcd587a057" }, { "url": "https://git.kernel.org/stable/c/8d3f83dfb23674540c827a8d65fba20aa300b252" }, { "url": "https://git.kernel.org/stable/c/0f37946c62c48a907625348cbc720a7a0c547d1e" }, { "url": "https://git.kernel.org/stable/c/2c78c9411e685dbc9eac8c2845111b03501975b8" }, { "url": "https://git.kernel.org/stable/c/0db880fc865ffb522141ced4bfa66c12ab1fbb70" } ], "title": "powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt.", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42126", "datePublished": "2024-07-30T07:46:23.179Z", "dateReserved": "2024-07-29T15:50:41.179Z", "dateUpdated": "2024-11-05T09:37:54.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42074
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
ASoC: amd: acp: add a null check for chip_pdev structure
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.564Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e158ed266fc1adfa456880fb6dabce2e5623843b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b0c39ae1cc86afe74aa2f6273ccb514f8d180cf6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/98d919dfee1cc402ca29d45da642852d7c9a2301" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42074", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:33.521458Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:57.712Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "sound/soc/amd/acp/acp-pci.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "e158ed266fc1", "status": "affected", "version": "088a40980efb", "versionType": "git" }, { "lessThan": "b0c39ae1cc86", "status": "affected", "version": "088a40980efb", "versionType": "git" }, { "lessThan": "98d919dfee1c", "status": "affected", "version": "088a40980efb", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "sound/soc/amd/acp/acp-pci.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.6" }, { "lessThan": "6.6", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd: acp: add a null check for chip_pdev structure\n\nWhen acp platform device creation is skipped, chip-\u003echip_pdev value will\nremain NULL. Add NULL check for chip-\u003echip_pdev structure in\nsnd_acp_resume() function to avoid null pointer dereference." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:53.857Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/e158ed266fc1adfa456880fb6dabce2e5623843b" }, { "url": "https://git.kernel.org/stable/c/b0c39ae1cc86afe74aa2f6273ccb514f8d180cf6" }, { "url": "https://git.kernel.org/stable/c/98d919dfee1cc402ca29d45da642852d7c9a2301" } ], "title": "ASoC: amd: acp: add a null check for chip_pdev structure", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42074", "datePublished": "2024-07-29T15:52:37.333Z", "dateReserved": "2024-07-29T15:50:41.169Z", "dateUpdated": "2024-11-05T09:36:53.857Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42087
Vulnerability from cvelistv5
Published
2024-07-29 16:26
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b71348be1236398be2d04c5e145fd6eaae86a91b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/98686ec1824728ff41d7b358131f7d0227c2ba2a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/cae52f61fda0f5d2949dc177f984c9e187d4c6a0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/489f38de3375ab84b3d269d0a1d64d6ee95d7044" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5f41401219fbe7663b3cf65ebd4ed95ebbb8ffb9" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1618f7a875ffd916596392fd29880c0429b8af60" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e646402bf82145349fcf5dcbe395afaf02a8ce47" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ee7860cd8b5763017f8dc785c2851fecb7a0c565" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42087", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:18:50.644704Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:56.865Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/panel/panel-ilitek-ili9881c.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "b71348be1236", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "98686ec18247", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "cae52f61fda0", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "489f38de3375", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "5f41401219fb", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "1618f7a875ff", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "e646402bf821", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "ee7860cd8b57", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/panel/panel-ilitek-ili9881c.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.317", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.279", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep\n\nThe ilitek-ili9881c controls the reset GPIO using the non-sleeping\ngpiod_set_value() function. This complains loudly when the GPIO\ncontroller needs to sleep. As the caller can sleep, use\ngpiod_set_value_cansleep() to fix the issue." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:09.129Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/b71348be1236398be2d04c5e145fd6eaae86a91b" }, { "url": "https://git.kernel.org/stable/c/98686ec1824728ff41d7b358131f7d0227c2ba2a" }, { "url": "https://git.kernel.org/stable/c/cae52f61fda0f5d2949dc177f984c9e187d4c6a0" }, { "url": "https://git.kernel.org/stable/c/489f38de3375ab84b3d269d0a1d64d6ee95d7044" }, { "url": "https://git.kernel.org/stable/c/5f41401219fbe7663b3cf65ebd4ed95ebbb8ffb9" }, { "url": "https://git.kernel.org/stable/c/1618f7a875ffd916596392fd29880c0429b8af60" }, { "url": "https://git.kernel.org/stable/c/e646402bf82145349fcf5dcbe395afaf02a8ce47" }, { "url": "https://git.kernel.org/stable/c/ee7860cd8b5763017f8dc785c2851fecb7a0c565" } ], "title": "drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42087", "datePublished": "2024-07-29T16:26:27.855Z", "dateReserved": "2024-07-29T15:50:41.171Z", "dateUpdated": "2024-11-05T09:37:09.129Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42064
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
drm/amd/display: Skip pipe if the pipe idx not set properly
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.346Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/27df59c6071470efce7182ee92fbb16afba551e0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/af114efe8d24b5711cfbedf7180f2ac1a296c24b" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42064", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:05.965221Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:58.552Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/dml2/dml2_utils.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "27df59c60714", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "af114efe8d24", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/dml2/dml2_utils.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Skip pipe if the pipe idx not set properly\n\n[why]\nDriver crashes when pipe idx not set properly\n\n[how]\nAdd code to skip the pipe that idx not set properly" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:42.234Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/27df59c6071470efce7182ee92fbb16afba551e0" }, { "url": "https://git.kernel.org/stable/c/af114efe8d24b5711cfbedf7180f2ac1a296c24b" } ], "title": "drm/amd/display: Skip pipe if the pipe idx not set properly", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42064", "datePublished": "2024-07-29T15:52:29.350Z", "dateReserved": "2024-07-29T15:50:41.166Z", "dateUpdated": "2024-11-05T09:36:42.234Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41020
Vulnerability from cvelistv5
Published
2024-07-29 13:34
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
filelock: Fix fcntl/close race recovery compat path
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.135Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a561145f3ae973ebf3e0aee41624e92a6c5cb38d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4c43ad4ab41602201d34c66ac62130fe339d686f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/911cc83e56a2de5a40758766c6a70d6998248860" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/53e21cfa68a7d12de378b7116c75571f73e0dfa2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f4d0775c6e2f1340ca0725f0337de149aaa989ca" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/73ae349534ebc377328e7d21891e589626c6e82c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5b0af8e4c70e4b884bb94ff5f0cd49ecf1273c02" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ed898f9ca3fa32c56c858b463ceb9d9936cc69c4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f8138f2ad2f745b9a1c696a05b749eabe44337ea" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41020", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:24:28.681942Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:05.238Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/locks.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "a561145f3ae9", "status": "affected", "version": "c293621bbf67", "versionType": "git" }, { "lessThan": "4c43ad4ab416", "status": "affected", "version": "c293621bbf67", "versionType": "git" }, { "lessThan": "911cc83e56a2", "status": "affected", "version": "c293621bbf67", "versionType": "git" }, { "lessThan": "53e21cfa68a7", "status": "affected", "version": "c293621bbf67", "versionType": "git" }, { "lessThan": "f4d0775c6e2f", "status": "affected", "version": "c293621bbf67", "versionType": "git" }, { "lessThan": "73ae349534eb", "status": "affected", "version": "c293621bbf67", "versionType": "git" }, { "lessThan": "5b0af8e4c70e", "status": "affected", "version": "c293621bbf67", "versionType": "git" }, { "lessThan": "ed898f9ca3fa", "status": "affected", "version": "c293621bbf67", "versionType": "git" }, { "lessThan": "f8138f2ad2f7", "status": "affected", "version": "c293621bbf67", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/locks.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "2.6.13" }, { "lessThan": "2.6.13", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.319", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.281", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.223", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.164", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.102", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.43", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.12", "versionType": "semver" }, { "lessThanOrEqual": "6.10.*", "status": "unaffected", "version": "6.10.2", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.11", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfilelock: Fix fcntl/close race recovery compat path\n\nWhen I wrote commit 3cad1bc01041 (\"filelock: Remove locks reliably when\nfcntl/close race is detected\"), I missed that there are two copies of the\ncode I was patching: The normal version, and the version for 64-bit offsets\non 32-bit kernels.\nThanks to Greg KH for stumbling over this while doing the stable\nbackport...\n\nApply exactly the same fix to the compat path for 32-bit kernels." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:07.423Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/a561145f3ae973ebf3e0aee41624e92a6c5cb38d" }, { "url": "https://git.kernel.org/stable/c/4c43ad4ab41602201d34c66ac62130fe339d686f" }, { "url": "https://git.kernel.org/stable/c/911cc83e56a2de5a40758766c6a70d6998248860" }, { "url": "https://git.kernel.org/stable/c/53e21cfa68a7d12de378b7116c75571f73e0dfa2" }, { "url": "https://git.kernel.org/stable/c/f4d0775c6e2f1340ca0725f0337de149aaa989ca" }, { "url": "https://git.kernel.org/stable/c/73ae349534ebc377328e7d21891e589626c6e82c" }, { "url": "https://git.kernel.org/stable/c/5b0af8e4c70e4b884bb94ff5f0cd49ecf1273c02" }, { "url": "https://git.kernel.org/stable/c/ed898f9ca3fa32c56c858b463ceb9d9936cc69c4" }, { "url": "https://git.kernel.org/stable/c/f8138f2ad2f745b9a1c696a05b749eabe44337ea" } ], "title": "filelock: Fix fcntl/close race recovery compat path", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41020", "datePublished": "2024-07-29T13:34:21.617Z", "dateReserved": "2024-07-12T12:17:45.613Z", "dateUpdated": "2024-11-05T09:35:07.423Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41060
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
drm/radeon: check bo_va->bo is non-NULL before using it
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.926Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a2b201f83971df03c8e81a480b2f2846ae8ce1a3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a9100f17428cb733c4f6fbb132d98bed76318342" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f13c96e0e325a057c03f8a47734adb360e112efe" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8a500b3a5f0a58c6f99039091fbd715f64f2f8af" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6fb15dcbcf4f212930350eaee174bb60ed40a536" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41060", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:11.951326Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:01.439Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/radeon/radeon_gem.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "a2b201f83971", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "a9100f17428c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "f13c96e0e325", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "8a500b3a5f0a", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "6fb15dcbcf4f", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/radeon/radeon_gem.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.164", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: check bo_va-\u003ebo is non-NULL before using it\n\nThe call to radeon_vm_clear_freed might clear bo_va-\u003ebo, so\nwe have to check it before dereferencing it." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:55.596Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/a2b201f83971df03c8e81a480b2f2846ae8ce1a3" }, { "url": "https://git.kernel.org/stable/c/a9100f17428cb733c4f6fbb132d98bed76318342" }, { "url": "https://git.kernel.org/stable/c/f13c96e0e325a057c03f8a47734adb360e112efe" }, { "url": "https://git.kernel.org/stable/c/8a500b3a5f0a58c6f99039091fbd715f64f2f8af" }, { "url": "https://git.kernel.org/stable/c/6fb15dcbcf4f212930350eaee174bb60ed40a536" } ], "title": "drm/radeon: check bo_va-\u003ebo is non-NULL before using it", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41060", "datePublished": "2024-07-29T14:57:22.499Z", "dateReserved": "2024-07-12T12:17:45.627Z", "dateUpdated": "2024-11-05T09:35:55.596Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42142
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
net/mlx5: E-switch, Create ingress ACL when needed
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.562Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/bc3ff8d3c05044de57865ebbb78cca8f7da3e595" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3e3551f8702978cd2221d2614ca6d6727e785324" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/83bc1a129f7fd0d7d05036ceb7ee69102624e320" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b20c2fb45470d0c7a603613c9cfa5d45720e17f2" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42142", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:50.447438Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:35.365Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/mellanox/mlx5/core/esw/acl/ingress_ofld.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "bc3ff8d3c050", "status": "affected", "version": "1749c4c51c16", "versionType": "git" }, { "lessThan": "3e3551f87029", "status": "affected", "version": "1749c4c51c16", "versionType": "git" }, { "lessThan": "83bc1a129f7f", "status": "affected", "version": "1749c4c51c16", "versionType": "git" }, { "lessThan": "b20c2fb45470", "status": "affected", "version": "1749c4c51c16", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/mellanox/mlx5/core/esw/acl/ingress_ofld.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.18" }, { "lessThan": "5.18", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: E-switch, Create ingress ACL when needed\n\nCurrently, ingress acl is used for three features. It is created only\nwhen vport metadata match and prio tag are enabled. But active-backup\nlag mode also uses it. It is independent of vport metadata match and\nprio tag. And vport metadata match can be disabled using the\nfollowing devlink command:\n\n # devlink dev param set pci/0000:08:00.0 name esw_port_metadata \\\n\tvalue false cmode runtime\n\nIf ingress acl is not created, will hit panic when creating drop rule\nfor active-backup lag mode. If always create it, there will be about\n5% performance degradation.\n\nFix it by creating ingress acl when needed. If esw_port_metadata is\ntrue, ingress acl exists, then create drop rule using existing\ningress acl. If esw_port_metadata is false, create ingress acl and\nthen create drop rule." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:12.563Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/bc3ff8d3c05044de57865ebbb78cca8f7da3e595" }, { "url": "https://git.kernel.org/stable/c/3e3551f8702978cd2221d2614ca6d6727e785324" }, { "url": "https://git.kernel.org/stable/c/83bc1a129f7fd0d7d05036ceb7ee69102624e320" }, { "url": "https://git.kernel.org/stable/c/b20c2fb45470d0c7a603613c9cfa5d45720e17f2" } ], "title": "net/mlx5: E-switch, Create ingress ACL when needed", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42142", "datePublished": "2024-07-30T07:46:35.929Z", "dateReserved": "2024-07-29T15:50:41.189Z", "dateUpdated": "2024-11-05T09:38:12.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42115
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
jffs2: Fix potential illegal address access in jffs2_free_inode
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.552Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b6c8b3e31eb88c85094d848a0bd8b4bafe67e4d8" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0b3246052e01e61a55bb3a15b76acb006759fe67" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6d6d94287f6365282bbf41e9a5b5281985970789" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5ca26334fc8a3711fed14db7f9eb1c621be4df65" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/751987a5d8ead0cc405fad96e83ebbaa51c82dbc" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d0bbbf31462a400bef4df33e22de91864f475455" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/05fc1ef892f862c1197b11b288bc00f602d2df0c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/af9a8730ddb6a4b2edd779ccc0aceb994d616830" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42115", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:16.786814Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:06.015Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/jffs2/super.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "b6c8b3e31eb8", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "0b3246052e01", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "6d6d94287f63", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "5ca26334fc8a", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "751987a5d8ea", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "d0bbbf31462a", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "05fc1ef892f8", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "af9a8730ddb6", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/jffs2/super.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\njffs2: Fix potential illegal address access in jffs2_free_inode\n\nDuring the stress testing of the jffs2 file system,the following\nabnormal printouts were found:\n[ 2430.649000] Unable to handle kernel paging request at virtual address 0069696969696948\n[ 2430.649622] Mem abort info:\n[ 2430.649829] ESR = 0x96000004\n[ 2430.650115] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 2430.650564] SET = 0, FnV = 0\n[ 2430.650795] EA = 0, S1PTW = 0\n[ 2430.651032] FSC = 0x04: level 0 translation fault\n[ 2430.651446] Data abort info:\n[ 2430.651683] ISV = 0, ISS = 0x00000004\n[ 2430.652001] CM = 0, WnR = 0\n[ 2430.652558] [0069696969696948] address between user and kernel address ranges\n[ 2430.653265] Internal error: Oops: 96000004 [#1] PREEMPT SMP\n[ 2430.654512] CPU: 2 PID: 20919 Comm: cat Not tainted 5.15.25-g512f31242bf6 #33\n[ 2430.655008] Hardware name: linux,dummy-virt (DT)\n[ 2430.655517] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 2430.656142] pc : kfree+0x78/0x348\n[ 2430.656630] lr : jffs2_free_inode+0x24/0x48\n[ 2430.657051] sp : ffff800009eebd10\n[ 2430.657355] x29: ffff800009eebd10 x28: 0000000000000001 x27: 0000000000000000\n[ 2430.658327] x26: ffff000038f09d80 x25: 0080000000000000 x24: ffff800009d38000\n[ 2430.658919] x23: 5a5a5a5a5a5a5a5a x22: ffff000038f09d80 x21: ffff8000084f0d14\n[ 2430.659434] x20: ffff0000bf9a6ac0 x19: 0169696969696940 x18: 0000000000000000\n[ 2430.659969] x17: ffff8000b6506000 x16: ffff800009eec000 x15: 0000000000004000\n[ 2430.660637] x14: 0000000000000000 x13: 00000001000820a1 x12: 00000000000d1b19\n[ 2430.661345] x11: 0004000800000000 x10: 0000000000000001 x9 : ffff8000084f0d14\n[ 2430.662025] x8 : ffff0000bf9a6b40 x7 : ffff0000bf9a6b48 x6 : 0000000003470302\n[ 2430.662695] x5 : ffff00002e41dcc0 x4 : ffff0000bf9aa3b0 x3 : 0000000003470342\n[ 2430.663486] x2 : 0000000000000000 x1 : ffff8000084f0d14 x0 : fffffc0000000000\n[ 2430.664217] Call trace:\n[ 2430.664528] kfree+0x78/0x348\n[ 2430.664855] jffs2_free_inode+0x24/0x48\n[ 2430.665233] i_callback+0x24/0x50\n[ 2430.665528] rcu_do_batch+0x1ac/0x448\n[ 2430.665892] rcu_core+0x28c/0x3c8\n[ 2430.666151] rcu_core_si+0x18/0x28\n[ 2430.666473] __do_softirq+0x138/0x3cc\n[ 2430.666781] irq_exit+0xf0/0x110\n[ 2430.667065] handle_domain_irq+0x6c/0x98\n[ 2430.667447] gic_handle_irq+0xac/0xe8\n[ 2430.667739] call_on_irq_stack+0x28/0x54\nThe parameter passed to kfree was 5a5a5a5a, which corresponds to the target field of\nthe jffs_inode_info structure. It was found that all variables in the jffs_inode_info\nstructure were 5a5a5a5a, except for the first member sem. It is suspected that these\nvariables are not initialized because they were set to 5a5a5a5a during memory testing,\nwhich is meant to detect uninitialized memory.The sem variable is initialized in the\nfunction jffs2_i_init_once, while other members are initialized in\nthe function jffs2_init_inode_info.\n\nThe function jffs2_init_inode_info is called after iget_locked,\nbut in the iget_locked function, the destroy_inode process is triggered,\nwhich releases the inode and consequently, the target member of the inode\nis not initialized.In concurrent high pressure scenarios, iget_locked\nmay enter the destroy_inode branch as described in the code.\n\nSince the destroy_inode functionality of jffs2 only releases the target,\nthe fix method is to set target to NULL in jffs2_i_init_once." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:42.208Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/b6c8b3e31eb88c85094d848a0bd8b4bafe67e4d8" }, { "url": "https://git.kernel.org/stable/c/0b3246052e01e61a55bb3a15b76acb006759fe67" }, { "url": "https://git.kernel.org/stable/c/6d6d94287f6365282bbf41e9a5b5281985970789" }, { "url": "https://git.kernel.org/stable/c/5ca26334fc8a3711fed14db7f9eb1c621be4df65" }, { "url": "https://git.kernel.org/stable/c/751987a5d8ead0cc405fad96e83ebbaa51c82dbc" }, { "url": "https://git.kernel.org/stable/c/d0bbbf31462a400bef4df33e22de91864f475455" }, { "url": "https://git.kernel.org/stable/c/05fc1ef892f862c1197b11b288bc00f602d2df0c" }, { "url": "https://git.kernel.org/stable/c/af9a8730ddb6a4b2edd779ccc0aceb994d616830" } ], "title": "jffs2: Fix potential illegal address access in jffs2_free_inode", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42115", "datePublished": "2024-07-30T07:46:08.276Z", "dateReserved": "2024-07-29T15:50:41.178Z", "dateUpdated": "2024-11-05T09:37:42.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42090
Vulnerability from cvelistv5
Published
2024-07-29 16:26
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.186Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e65a0dc2e85efb28e182aca50218e8a056d0ce04" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/420ce1261907e5dbeda1e4daffd5b6c76f8188c0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b813e3fd102a959c5b208ed68afe27e0137a561b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/01fe2f885f7813f8aed5d3704b384a97b1116a9e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b36efd2e3e22a329444b6b24fa48df6d20ae66e6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4038c57bf61631219b31f1bd6e92106ec7f084dc" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/48a7a7c9571c3e62f17012dd7f2063e926179ddd" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/adec57ff8e66aee632f3dd1f93787c13d112b7a1" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42090", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:18:41.131591Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:01.081Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/pinctrl/core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "e65a0dc2e85e", "status": "affected", "version": "42fed7ba44e4", "versionType": "git" }, { "lessThan": "420ce1261907", "status": "affected", "version": "42fed7ba44e4", "versionType": "git" }, { "lessThan": "b813e3fd102a", "status": "affected", "version": "42fed7ba44e4", "versionType": "git" }, { "lessThan": "01fe2f885f78", "status": "affected", "version": "42fed7ba44e4", "versionType": "git" }, { "lessThan": "b36efd2e3e22", "status": "affected", "version": "42fed7ba44e4", "versionType": "git" }, { "lessThan": "4038c57bf616", "status": "affected", "version": "42fed7ba44e4", "versionType": "git" }, { "lessThan": "48a7a7c9571c", "status": "affected", "version": "42fed7ba44e4", "versionType": "git" }, { "lessThan": "adec57ff8e66", "status": "affected", "version": "42fed7ba44e4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/pinctrl/core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "3.10" }, { "lessThan": "3.10", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.317", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.279", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER\n\nIn create_pinctrl(), pinctrl_maps_mutex is acquired before calling\nadd_setting(). If add_setting() returns -EPROBE_DEFER, create_pinctrl()\ncalls pinctrl_free(). However, pinctrl_free() attempts to acquire\npinctrl_maps_mutex, which is already held by create_pinctrl(), leading to\na potential deadlock.\n\nThis patch resolves the issue by releasing pinctrl_maps_mutex before\ncalling pinctrl_free(), preventing the deadlock.\n\nThis bug was discovered and resolved using Coverity Static Analysis\nSecurity Testing (SAST) by Synopsys, Inc." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:12.573Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/e65a0dc2e85efb28e182aca50218e8a056d0ce04" }, { "url": "https://git.kernel.org/stable/c/420ce1261907e5dbeda1e4daffd5b6c76f8188c0" }, { "url": "https://git.kernel.org/stable/c/b813e3fd102a959c5b208ed68afe27e0137a561b" }, { "url": "https://git.kernel.org/stable/c/01fe2f885f7813f8aed5d3704b384a97b1116a9e" }, { "url": "https://git.kernel.org/stable/c/b36efd2e3e22a329444b6b24fa48df6d20ae66e6" }, { "url": "https://git.kernel.org/stable/c/4038c57bf61631219b31f1bd6e92106ec7f084dc" }, { "url": "https://git.kernel.org/stable/c/48a7a7c9571c3e62f17012dd7f2063e926179ddd" }, { "url": "https://git.kernel.org/stable/c/adec57ff8e66aee632f3dd1f93787c13d112b7a1" } ], "title": "pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42090", "datePublished": "2024-07-29T16:26:30.139Z", "dateReserved": "2024-07-29T15:50:41.172Z", "dateUpdated": "2024-11-05T09:37:12.573Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41041
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.185Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7a67c4e47626e6daccda62888f8b096abb5d3940" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9f965684c57c3117cfd2f754dd3270383c529fba" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ddf516e50bf8a7bc9b3bd8a9831f9c7a8131a32a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a6db0d3ea6536e7120871e5448b3032570152ec6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c5fd77ca13d657c6e99bf04f0917445e6a80231e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/20ceae10623c3b29fdf7609690849475bcdebdb0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5c0b485a8c6116516f33925b9ce5b6104a6eadfd" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41041", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:23:13.757861Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:58.050Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/ipv4/udp.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "7a67c4e47626", "status": "affected", "version": "6acc9b432e67", "versionType": "git" }, { "lessThan": "9f965684c57c", "status": "affected", "version": "6acc9b432e67", "versionType": "git" }, { "lessThan": "ddf516e50bf8", "status": "affected", "version": "6acc9b432e67", "versionType": "git" }, { "lessThan": "a6db0d3ea653", "status": "affected", "version": "6acc9b432e67", "versionType": "git" }, { "lessThan": "c5fd77ca13d6", "status": "affected", "version": "6acc9b432e67", "versionType": "git" }, { "lessThan": "20ceae10623c", "status": "affected", "version": "6acc9b432e67", "versionType": "git" }, { "lessThan": "5c0b485a8c61", "status": "affected", "version": "6acc9b432e67", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/ipv4/udp.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.20" }, { "lessThan": "4.20", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nudp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().\n\nsyzkaller triggered the warning [0] in udp_v4_early_demux().\n\nIn udp_v[46]_early_demux() and sk_lookup(), we do not touch the refcount\nof the looked-up sk and use sock_pfree() as skb-\u003edestructor, so we check\nSOCK_RCU_FREE to ensure that the sk is safe to access during the RCU grace\nperiod.\n\nCurrently, SOCK_RCU_FREE is flagged for a bound socket after being put\ninto the hash table. Moreover, the SOCK_RCU_FREE check is done too early\nin udp_v[46]_early_demux() and sk_lookup(), so there could be a small race\nwindow:\n\n CPU1 CPU2\n ---- ----\n udp_v4_early_demux() udp_lib_get_port()\n | |- hlist_add_head_rcu()\n |- sk = __udp4_lib_demux_lookup() |\n |- DEBUG_NET_WARN_ON_ONCE(sk_is_refcounted(sk));\n `- sock_set_flag(sk, SOCK_RCU_FREE)\n\nWe had the same bug in TCP and fixed it in commit 871019b22d1b (\"net:\nset SOCK_RCU_FREE before inserting socket into hashtable\").\n\nLet\u0027s apply the same fix for UDP.\n\n[0]:\nWARNING: CPU: 0 PID: 11198 at net/ipv4/udp.c:2599 udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nModules linked in:\nCPU: 0 PID: 11198 Comm: syz-executor.1 Not tainted 6.9.0-g93bda33046e7 #13\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nRIP: 0010:udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nCode: c5 7a 15 fe bb 01 00 00 00 44 89 e9 31 ff d3 e3 81 e3 bf ef ff ff 89 de e8 2c 74 15 fe 85 db 0f 85 02 06 00 00 e8 9f 7a 15 fe \u003c0f\u003e 0b e8 98 7a 15 fe 49 8d 7e 60 e8 4f 39 2f fe 49 c7 46 60 20 52\nRSP: 0018:ffffc9000ce3fa58 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8318c92c\nRDX: ffff888036ccde00 RSI: ffffffff8318c2f1 RDI: 0000000000000001\nRBP: ffff88805a2dd6e0 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0001ffffffffffff R12: ffff88805a2dd680\nR13: 0000000000000007 R14: ffff88800923f900 R15: ffff88805456004e\nFS: 00007fc449127640(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fc449126e38 CR3: 000000003de4b002 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ip_rcv_finish_core.constprop.0+0xbdd/0xd20 net/ipv4/ip_input.c:349\n ip_rcv_finish+0xda/0x150 net/ipv4/ip_input.c:447\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n ip_rcv+0x16c/0x180 net/ipv4/ip_input.c:569\n __netif_receive_skb_one_core+0xb3/0xe0 net/core/dev.c:5624\n __netif_receive_skb+0x21/0xd0 net/core/dev.c:5738\n netif_receive_skb_internal net/core/dev.c:5824 [inline]\n netif_receive_skb+0x271/0x300 net/core/dev.c:5884\n tun_rx_batched drivers/net/tun.c:1549 [inline]\n tun_get_user+0x24db/0x2c50 drivers/net/tun.c:2002\n tun_chr_write_iter+0x107/0x1a0 drivers/net/tun.c:2048\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x76f/0x8d0 fs/read_write.c:590\n ksys_write+0xbf/0x190 fs/read_write.c:643\n __do_sys_write fs/read_write.c:655 [inline]\n __se_sys_write fs/read_write.c:652 [inline]\n __x64_sys_write+0x41/0x50 fs/read_write.c:652\n x64_sys_call+0xe66/0x1990 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x4b/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\nRIP: 0033:0x7fc44a68bc1f\nCode: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 e9 cf f5 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 3c d0 f5 ff 48\nRSP: 002b:00007fc449126c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00000000004bc050 RCX: 00007fc44a68bc1f\nR\n---truncated---" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:31.417Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/7a67c4e47626e6daccda62888f8b096abb5d3940" }, { "url": "https://git.kernel.org/stable/c/9f965684c57c3117cfd2f754dd3270383c529fba" }, { "url": "https://git.kernel.org/stable/c/ddf516e50bf8a7bc9b3bd8a9831f9c7a8131a32a" }, { "url": "https://git.kernel.org/stable/c/a6db0d3ea6536e7120871e5448b3032570152ec6" }, { "url": "https://git.kernel.org/stable/c/c5fd77ca13d657c6e99bf04f0917445e6a80231e" }, { "url": "https://git.kernel.org/stable/c/20ceae10623c3b29fdf7609690849475bcdebdb0" }, { "url": "https://git.kernel.org/stable/c/5c0b485a8c6116516f33925b9ce5b6104a6eadfd" } ], "title": "udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41041", "datePublished": "2024-07-29T14:31:54.647Z", "dateReserved": "2024-07-12T12:17:45.623Z", "dateUpdated": "2024-11-05T09:35:31.417Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42066
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-12-09 14:21
Severity ?
EPSS score ?
Summary
drm/xe: Fix potential integer overflow in page size calculation
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.373Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/79d54ddf0e292b810887994bb04709c5ac0e1531" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4f4fcafde343a54465f85a2909fc684918507a4b" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42066", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:59.323646Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:55.779Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/xe/xe_ttm_vram_mgr.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "79d54ddf0e29", "status": "affected", "version": "dd08ebf6c352", "versionType": "git" }, { "lessThan": "4f4fcafde343", "status": "affected", "version": "dd08ebf6c352", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/xe/xe_ttm_vram_mgr.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.8" }, { "lessThan": "6.8", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Fix potential integer overflow in page size calculation\n\nExplicitly cast tbo-\u003epage_alignment to u64 before bit-shifting to\nprevent overflow when assigning to min_page_size." } ], "providerMetadata": { "dateUpdated": "2024-12-09T14:21:21.820Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/79d54ddf0e292b810887994bb04709c5ac0e1531" }, { "url": "https://git.kernel.org/stable/c/4f4fcafde343a54465f85a2909fc684918507a4b" } ], "title": "drm/xe: Fix potential integer overflow in page size calculation", "x_generator": { "engine": "bippy-8e903de6a542" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42066", "datePublished": "2024-07-29T15:52:30.984Z", "dateReserved": "2024-07-29T15:50:41.167Z", "dateUpdated": "2024-12-09T14:21:21.820Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42131
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
mm: avoid overflows in dirty throttling logic
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.385Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7a49389771ae7666f4dc3426e2a4594bf23ae290" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a25e8536184516b55ef89ab91dd2eea429de28d2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c83ed422c24f0d4b264f89291d4fabe285f80dbc" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/bd16a7ee339aef3ee4c90cb23902afb6af379ea0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8e0b5e7f2895eccef5c2a0018b589266f90c4805" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/385d838df280eba6c8680f9777bfa0d0bfe7e8b2" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42131", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:25.346003Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:36.512Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "mm/page-writeback.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "2b2d2b8766db", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "4d3817b64eda", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "7a49389771ae", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "a25e85361845", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "c83ed422c24f", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "bd16a7ee339a", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "8e0b5e7f2895", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "385d838df280", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "mm/page-writeback.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.320", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.282", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: avoid overflows in dirty throttling logic\n\nThe dirty throttling logic is interspersed with assumptions that dirty\nlimits in PAGE_SIZE units fit into 32-bit (so that various multiplications\nfit into 64-bits). If limits end up being larger, we will hit overflows,\npossible divisions by 0 etc. Fix these problems by never allowing so\nlarge dirty limits as they have dubious practical value anyway. For\ndirty_bytes / dirty_background_bytes interfaces we can just refuse to set\nso large limits. For dirty_ratio / dirty_background_ratio it isn\u0027t so\nsimple as the dirty limit is computed from the amount of available memory\nwhich can change due to memory hotplug etc. So when converting dirty\nlimits from ratios to numbers of pages, we just don\u0027t allow the result to\nexceed UINT_MAX.\n\nThis is root-only triggerable problem which occurs when the operator\nsets dirty limits to \u003e16 TB." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:00.249Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/2b2d2b8766db028bd827af34075f221ae9e9efff" }, { "url": "https://git.kernel.org/stable/c/4d3817b64eda07491bdd86a234629fe0764fb42a" }, { "url": "https://git.kernel.org/stable/c/7a49389771ae7666f4dc3426e2a4594bf23ae290" }, { "url": "https://git.kernel.org/stable/c/a25e8536184516b55ef89ab91dd2eea429de28d2" }, { "url": "https://git.kernel.org/stable/c/c83ed422c24f0d4b264f89291d4fabe285f80dbc" }, { "url": "https://git.kernel.org/stable/c/bd16a7ee339aef3ee4c90cb23902afb6af379ea0" }, { "url": "https://git.kernel.org/stable/c/8e0b5e7f2895eccef5c2a0018b589266f90c4805" }, { "url": "https://git.kernel.org/stable/c/385d838df280eba6c8680f9777bfa0d0bfe7e8b2" } ], "title": "mm: avoid overflows in dirty throttling logic", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42131", "datePublished": "2024-07-30T07:46:26.872Z", "dateReserved": "2024-07-29T15:50:41.186Z", "dateUpdated": "2024-11-05T09:38:00.249Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41083
Vulnerability from cvelistv5
Published
2024-07-29 15:47
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
netfs: Fix netfs_page_mkwrite() to check folio->mapping is valid
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.318Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3473eb87afd402e415a8ca885b284ea0420dde25" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a81c98bfa40c11f8ea79b5a9b3f5fda73bfbb4d2" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41083", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:58.648407Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:59.223Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/netfs/buffered_write.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "3473eb87afd4", "status": "affected", "version": "102a7e2c598c", "versionType": "git" }, { "lessThan": "a81c98bfa40c", "status": "affected", "version": "102a7e2c598c", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/netfs/buffered_write.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.8" }, { "lessThan": "6.8", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfs: Fix netfs_page_mkwrite() to check folio-\u003emapping is valid\n\nFix netfs_page_mkwrite() to check that folio-\u003emapping is valid once it has\ntaken the folio lock (as filemap_page_mkwrite() does). Without this,\ngeneric/247 occasionally oopses with something like the following:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000000\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n\n RIP: 0010:trace_event_raw_event_netfs_folio+0x61/0xc0\n ...\n Call Trace:\n \u003cTASK\u003e\n ? __die_body+0x1a/0x60\n ? page_fault_oops+0x6e/0xa0\n ? exc_page_fault+0xc2/0xe0\n ? asm_exc_page_fault+0x22/0x30\n ? trace_event_raw_event_netfs_folio+0x61/0xc0\n trace_netfs_folio+0x39/0x40\n netfs_page_mkwrite+0x14c/0x1d0\n do_page_mkwrite+0x50/0x90\n do_pte_missing+0x184/0x200\n __handle_mm_fault+0x42d/0x500\n handle_mm_fault+0x121/0x1f0\n do_user_addr_fault+0x23e/0x3c0\n exc_page_fault+0xc2/0xe0\n asm_exc_page_fault+0x22/0x30\n\nThis is due to the invalidate_inode_pages2_range() issued at the end of the\nDIO write interfering with the mmap\u0027d writes." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:22.835Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/3473eb87afd402e415a8ca885b284ea0420dde25" }, { "url": "https://git.kernel.org/stable/c/a81c98bfa40c11f8ea79b5a9b3f5fda73bfbb4d2" } ], "title": "netfs: Fix netfs_page_mkwrite() to check folio-\u003emapping is valid", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41083", "datePublished": "2024-07-29T15:47:59.419Z", "dateReserved": "2024-07-12T12:17:45.633Z", "dateUpdated": "2024-11-05T09:36:22.835Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41065
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
powerpc/pseries: Whitelist dtl slub object for copying to userspace
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.323Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a7b952941ce07e1e7a2cafd08c64a98e14f553e6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6b16098148ea58a67430d90e20476be2377c3acd" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e59822f9d700349cd17968d22c979db23a2d347f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1ee68686d1e2a5da35d5650be0be1ce06fe2ceb2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e512a59b472684d8585125101ab03b86c2c1348a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0f5892212c27be31792ef1daa89c8dac1b3047e4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1a14150e1656f7a332a943154fc486504db4d586" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41065", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:55.941792Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:58.163Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "arch/powerpc/platforms/pseries/setup.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "a7b952941ce0", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "6b16098148ea", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "e59822f9d700", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "1ee68686d1e2", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "e512a59b4726", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "0f5892212c27", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "1a14150e1656", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "arch/powerpc/platforms/pseries/setup.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.281", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.223", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.164", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries: Whitelist dtl slub object for copying to userspace\n\nReading the dispatch trace log from /sys/kernel/debug/powerpc/dtl/cpu-*\nresults in a BUG() when the config CONFIG_HARDENED_USERCOPY is enabled as\nshown below.\n\n kernel BUG at mm/usercopy.c:102!\n Oops: Exception in kernel mode, sig: 5 [#1]\n LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries\n Modules linked in: xfs libcrc32c dm_service_time sd_mod t10_pi sg ibmvfc\n scsi_transport_fc ibmveth pseries_wdt dm_multipath dm_mirror dm_region_hash dm_log dm_mod fuse\n CPU: 27 PID: 1815 Comm: python3 Not tainted 6.10.0-rc3 #85\n Hardware name: IBM,9040-MRX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NM1060_042) hv:phyp pSeries\n NIP: c0000000005d23d4 LR: c0000000005d23d0 CTR: 00000000006ee6f8\n REGS: c000000120c078c0 TRAP: 0700 Not tainted (6.10.0-rc3)\n MSR: 8000000000029033 \u003cSF,EE,ME,IR,DR,RI,LE\u003e CR: 2828220f XER: 0000000e\n CFAR: c0000000001fdc80 IRQMASK: 0\n [ ... GPRs omitted ... ]\n NIP [c0000000005d23d4] usercopy_abort+0x78/0xb0\n LR [c0000000005d23d0] usercopy_abort+0x74/0xb0\n Call Trace:\n usercopy_abort+0x74/0xb0 (unreliable)\n __check_heap_object+0xf8/0x120\n check_heap_object+0x218/0x240\n __check_object_size+0x84/0x1a4\n dtl_file_read+0x17c/0x2c4\n full_proxy_read+0x8c/0x110\n vfs_read+0xdc/0x3a0\n ksys_read+0x84/0x144\n system_call_exception+0x124/0x330\n system_call_vectored_common+0x15c/0x2ec\n --- interrupt: 3000 at 0x7fff81f3ab34\n\nCommit 6d07d1cd300f (\"usercopy: Restrict non-usercopy caches to size 0\")\nrequires that only whitelisted areas in slab/slub objects can be copied to\nuserspace when usercopy hardening is enabled using CONFIG_HARDENED_USERCOPY.\nDtl contains hypervisor dispatch events which are expected to be read by\nprivileged users. Hence mark this safe for user access.\nSpecify useroffset=0 and usersize=DISPATCH_LOG_BYTES to whitelist the\nentire object." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:02.869Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/a7b952941ce07e1e7a2cafd08c64a98e14f553e6" }, { "url": "https://git.kernel.org/stable/c/6b16098148ea58a67430d90e20476be2377c3acd" }, { "url": "https://git.kernel.org/stable/c/e59822f9d700349cd17968d22c979db23a2d347f" }, { "url": "https://git.kernel.org/stable/c/1ee68686d1e2a5da35d5650be0be1ce06fe2ceb2" }, { "url": "https://git.kernel.org/stable/c/e512a59b472684d8585125101ab03b86c2c1348a" }, { "url": "https://git.kernel.org/stable/c/0f5892212c27be31792ef1daa89c8dac1b3047e4" }, { "url": "https://git.kernel.org/stable/c/1a14150e1656f7a332a943154fc486504db4d586" } ], "title": "powerpc/pseries: Whitelist dtl slub object for copying to userspace", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41065", "datePublished": "2024-07-29T14:57:27.011Z", "dateReserved": "2024-07-12T12:17:45.628Z", "dateUpdated": "2024-11-05T09:36:02.869Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41073
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
nvme: avoid double free special payload
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c5942a14f795de957ae9d66027aac8ff4fe70057" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f3ab45aacd25d957547fb6d115c1574c20964b3b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ae84383c96d6662c24697ab6b44aae855ab670aa" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1b9fd1265fac85916f90b4648de02adccdb7220b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e5d574ab37f5f2e7937405613d9b1a724811e5ad" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41073", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:30.593926Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:00.546Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/nvme/host/core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "c5942a14f795", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "f3ab45aacd25", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "ae84383c96d6", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "1b9fd1265fac", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "e5d574ab37f5", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/nvme/host/core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.164", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme: avoid double free special payload\n\nIf a discard request needs to be retried, and that retry may fail before\na new special payload is added, a double free will result. Clear the\nRQF_SPECIAL_LOAD when the request is cleaned." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:11.725Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/c5942a14f795de957ae9d66027aac8ff4fe70057" }, { "url": "https://git.kernel.org/stable/c/f3ab45aacd25d957547fb6d115c1574c20964b3b" }, { "url": "https://git.kernel.org/stable/c/ae84383c96d6662c24697ab6b44aae855ab670aa" }, { "url": "https://git.kernel.org/stable/c/1b9fd1265fac85916f90b4648de02adccdb7220b" }, { "url": "https://git.kernel.org/stable/c/e5d574ab37f5f2e7937405613d9b1a724811e5ad" } ], "title": "nvme: avoid double free special payload", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41073", "datePublished": "2024-07-29T14:57:33.253Z", "dateReserved": "2024-07-12T12:17:45.631Z", "dateUpdated": "2024-11-05T09:36:11.725Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41046
Vulnerability from cvelistv5
Published
2024-07-29 14:32
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
net: ethernet: lantiq_etop: fix double free in detach
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1a2db00a554cfda57c397cce79b2804bf9633fec" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/907443174e76b854d28024bd079f0e53b94dc9a1" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/22b16618a80858b3a9d607708444426948cc4ae1" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/69ad5fa0ce7c548262e0770fc2b726fe7ab4f156" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c2b66e2b3939af63699e4a4bd25a8ac4a9b1d1b3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9d23909ae041761cb2aa0c3cb1748598d8b6bc54" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/84aaaa796a19195fc59290154fef9aeb1fba964f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e1533b6319ab9c3a97dad314dd88b3783bc41b69" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41046", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:57.535074Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:02.313Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/lantiq_etop.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "1a2db00a554c", "status": "affected", "version": "504d4721ee8e", "versionType": "git" }, { "lessThan": "907443174e76", "status": "affected", "version": "504d4721ee8e", "versionType": "git" }, { "lessThan": "22b16618a808", "status": "affected", "version": "504d4721ee8e", "versionType": "git" }, { "lessThan": "69ad5fa0ce7c", "status": "affected", "version": "504d4721ee8e", "versionType": "git" }, { "lessThan": "c2b66e2b3939", "status": "affected", "version": "504d4721ee8e", "versionType": "git" }, { "lessThan": "9d23909ae041", "status": "affected", "version": "504d4721ee8e", "versionType": "git" }, { "lessThan": "84aaaa796a19", "status": "affected", "version": "504d4721ee8e", "versionType": "git" }, { "lessThan": "e1533b6319ab", "status": "affected", "version": "504d4721ee8e", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/lantiq_etop.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "3.0" }, { "lessThan": "3.0", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ethernet: lantiq_etop: fix double free in detach\n\nThe number of the currently released descriptor is never incremented\nwhich results in the same skb being released multiple times." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:36.896Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/1a2db00a554cfda57c397cce79b2804bf9633fec" }, { "url": "https://git.kernel.org/stable/c/907443174e76b854d28024bd079f0e53b94dc9a1" }, { "url": "https://git.kernel.org/stable/c/22b16618a80858b3a9d607708444426948cc4ae1" }, { "url": "https://git.kernel.org/stable/c/69ad5fa0ce7c548262e0770fc2b726fe7ab4f156" }, { "url": "https://git.kernel.org/stable/c/c2b66e2b3939af63699e4a4bd25a8ac4a9b1d1b3" }, { "url": "https://git.kernel.org/stable/c/9d23909ae041761cb2aa0c3cb1748598d8b6bc54" }, { "url": "https://git.kernel.org/stable/c/84aaaa796a19195fc59290154fef9aeb1fba964f" }, { "url": "https://git.kernel.org/stable/c/e1533b6319ab9c3a97dad314dd88b3783bc41b69" } ], "title": "net: ethernet: lantiq_etop: fix double free in detach", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41046", "datePublished": "2024-07-29T14:32:03.686Z", "dateReserved": "2024-07-12T12:17:45.625Z", "dateUpdated": "2024-11-05T09:35:36.896Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42120
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
drm/amd/display: Check pipe offset before setting vblank
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.091Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b2e9abc95583ac7bbb2c47da4d476a798146dfd6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0b3702f9d43d163fd05e43b7d7e22e766dbef329" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d2c3645a4a5ae5d933b4116c305d9d82b8199dbf" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/96bf81cc1bd058bb8af6e755a548e926e934dfd1" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c5ec2afeeee4c91cebc4eff6d4f1ecf4047259f4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5396a70e8cf462ec5ccf2dc8de103c79de9489e6" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42120", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:00.348266Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:05.414Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/irq/dce110/irq_service_dce110.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "b2e9abc95583", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "0b3702f9d43d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "d2c3645a4a5a", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "96bf81cc1bd0", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "c5ec2afeeee4", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "5396a70e8cf4", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/irq/dce110/irq_service_dce110.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check pipe offset before setting vblank\n\npipe_ctx has a size of MAX_PIPES so checking its index before accessing\nthe array.\n\nThis fixes an OVERRUN issue reported by Coverity." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:47.933Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/b2e9abc95583ac7bbb2c47da4d476a798146dfd6" }, { "url": "https://git.kernel.org/stable/c/0b3702f9d43d163fd05e43b7d7e22e766dbef329" }, { "url": "https://git.kernel.org/stable/c/d2c3645a4a5ae5d933b4116c305d9d82b8199dbf" }, { "url": "https://git.kernel.org/stable/c/96bf81cc1bd058bb8af6e755a548e926e934dfd1" }, { "url": "https://git.kernel.org/stable/c/c5ec2afeeee4c91cebc4eff6d4f1ecf4047259f4" }, { "url": "https://git.kernel.org/stable/c/5396a70e8cf462ec5ccf2dc8de103c79de9489e6" } ], "title": "drm/amd/display: Check pipe offset before setting vblank", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42120", "datePublished": "2024-07-30T07:46:12.136Z", "dateReserved": "2024-07-29T15:50:41.178Z", "dateUpdated": "2024-11-05T09:37:47.933Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42070
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.272Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/40188a25a9847dbeb7ec67517174a835a677752f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/23752737c6a618e994f9a310ec2568881a6b49c4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5d43d789b57943720dca4181a05f6477362b94cf" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/461302e07f49687ffe7d105fa0a330c07c7646d8" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/efb27ad05949403848f487823b597ed67060e007" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/952bf8df222599baadbd4f838a49c4fef81d2564" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/41a6375d48deaf7f730304b5153848bfa1c2980f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7931d32955e09d0a11b1fe0b6aac1bfa061c005c" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42070", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:46.237204Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:08.190Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "include/net/netfilter/nf_tables.h", "net/netfilter/nf_tables_api.c", "net/netfilter/nft_lookup.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "40188a25a984", "status": "affected", "version": "96518518cc41", "versionType": "git" }, { "lessThan": "23752737c6a6", "status": "affected", "version": "96518518cc41", "versionType": "git" }, { "lessThan": "5d43d789b579", "status": "affected", "version": "96518518cc41", "versionType": "git" }, { "lessThan": "461302e07f49", "status": "affected", "version": "96518518cc41", "versionType": "git" }, { "lessThan": "efb27ad05949", "status": "affected", "version": "96518518cc41", "versionType": "git" }, { "lessThan": "952bf8df2225", "status": "affected", "version": "96518518cc41", "versionType": "git" }, { "lessThan": "41a6375d48de", "status": "affected", "version": "96518518cc41", "versionType": "git" }, { "lessThan": "7931d32955e0", "status": "affected", "version": "96518518cc41", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "include/net/netfilter/nf_tables.h", "net/netfilter/nf_tables_api.c", "net/netfilter/nft_lookup.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "3.13" }, { "lessThan": "3.13", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.317", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.279", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers\n\nregister store validation for NFT_DATA_VALUE is conditional, however,\nthe datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This\nonly requires a new helper function to infer the register type from the\nset datatype so this conditional check can be removed. Otherwise,\npointer to chain object can be leaked through the registers." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:49.175Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/40188a25a9847dbeb7ec67517174a835a677752f" }, { "url": "https://git.kernel.org/stable/c/23752737c6a618e994f9a310ec2568881a6b49c4" }, { "url": "https://git.kernel.org/stable/c/5d43d789b57943720dca4181a05f6477362b94cf" }, { "url": "https://git.kernel.org/stable/c/461302e07f49687ffe7d105fa0a330c07c7646d8" }, { "url": "https://git.kernel.org/stable/c/efb27ad05949403848f487823b597ed67060e007" }, { "url": "https://git.kernel.org/stable/c/952bf8df222599baadbd4f838a49c4fef81d2564" }, { "url": "https://git.kernel.org/stable/c/41a6375d48deaf7f730304b5153848bfa1c2980f" }, { "url": "https://git.kernel.org/stable/c/7931d32955e09d0a11b1fe0b6aac1bfa061c005c" } ], "title": "netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42070", "datePublished": "2024-07-29T15:52:34.061Z", "dateReserved": "2024-07-29T15:50:41.168Z", "dateUpdated": "2024-11-05T09:36:49.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42121
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
drm/amd/display: Check index msg_id before read or write
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.543Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b5b8837d066cc182ff69fb5629ad32ade5484567" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/fbb0701af9734cff13917a4b98b5ee9da2fde48d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ae91ffbc8b8d942e3e7f188728cad557b7ed5ee4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9933eca6ada0cd612e19522e7a319bcef464c0eb" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a31ea49dc8064a557565725cf045944307476a6e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/59d99deb330af206a4541db0c4da8f73880fba03" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42121", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:57.136041Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:05.184Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/modules/hdcp/hdcp_ddc.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "b5b8837d066c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "fbb0701af973", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "ae91ffbc8b8d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "9933eca6ada0", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "a31ea49dc806", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "59d99deb330a", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/modules/hdcp/hdcp_ddc.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check index msg_id before read or write\n\n[WHAT]\nmsg_id is used as an array index and it cannot be a negative value, and\ntherefore cannot be equal to MOD_HDCP_MESSAGE_ID_INVALID (-1).\n\n[HOW]\nCheck whether msg_id is valid before reading and setting.\n\nThis fixes 4 OVERRUN issues reported by Coverity." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:49.092Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/b5b8837d066cc182ff69fb5629ad32ade5484567" }, { "url": "https://git.kernel.org/stable/c/fbb0701af9734cff13917a4b98b5ee9da2fde48d" }, { "url": "https://git.kernel.org/stable/c/ae91ffbc8b8d942e3e7f188728cad557b7ed5ee4" }, { "url": "https://git.kernel.org/stable/c/9933eca6ada0cd612e19522e7a319bcef464c0eb" }, { "url": "https://git.kernel.org/stable/c/a31ea49dc8064a557565725cf045944307476a6e" }, { "url": "https://git.kernel.org/stable/c/59d99deb330af206a4541db0c4da8f73880fba03" } ], "title": "drm/amd/display: Check index msg_id before read or write", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42121", "datePublished": "2024-07-30T07:46:13.064Z", "dateReserved": "2024-07-29T15:50:41.179Z", "dateUpdated": "2024-11-05T09:37:49.092Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42223
Vulnerability from cvelistv5
Published
2024-07-30 07:47
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
media: dvb-frontends: tda10048: Fix integer overflow
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.557Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8167e4d7dc086d4f7ca7897dcff3827e4d22c99a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5c72587d024f087aecec0221eaff2fe850d856ce" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e1ba22618758e95e09c9fd30c69ccce38edf94c0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/bd5620439959a7e02012588c724c6ff5143b80af" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1663e2474e4d777187d749a5c90ae83232db32bd" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8ac224e9371dc3c4eb666033e6b42d05cf5184a1" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1121d8a5c6ed6b8fad492e43b63b386cb6a3a9d8" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1aa1329a67cc214c3b7bd2a14d1301a795760b07" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42223", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:14:45.726631Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:07.151Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/media/dvb-frontends/tda10048.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "8167e4d7dc08", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "5c72587d024f", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "e1ba22618758", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "bd5620439959", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "1663e2474e4d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "8ac224e9371d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "1121d8a5c6ed", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "1aa1329a67cc", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/media/dvb-frontends/tda10048.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvb-frontends: tda10048: Fix integer overflow\n\nstate-\u003extal_hz can be up to 16M, so it can overflow a 32 bit integer\nwhen multiplied by pll_mfactor.\n\nCreate a new 64 bit variable to hold the calculations." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:34.972Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/8167e4d7dc086d4f7ca7897dcff3827e4d22c99a" }, { "url": "https://git.kernel.org/stable/c/5c72587d024f087aecec0221eaff2fe850d856ce" }, { "url": "https://git.kernel.org/stable/c/e1ba22618758e95e09c9fd30c69ccce38edf94c0" }, { "url": "https://git.kernel.org/stable/c/bd5620439959a7e02012588c724c6ff5143b80af" }, { "url": "https://git.kernel.org/stable/c/1663e2474e4d777187d749a5c90ae83232db32bd" }, { "url": "https://git.kernel.org/stable/c/8ac224e9371dc3c4eb666033e6b42d05cf5184a1" }, { "url": "https://git.kernel.org/stable/c/1121d8a5c6ed6b8fad492e43b63b386cb6a3a9d8" }, { "url": "https://git.kernel.org/stable/c/1aa1329a67cc214c3b7bd2a14d1301a795760b07" } ], "title": "media: dvb-frontends: tda10048: Fix integer overflow", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42223", "datePublished": "2024-07-30T07:47:04.861Z", "dateReserved": "2024-07-30T07:40:12.249Z", "dateUpdated": "2024-11-05T09:38:34.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42134
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
virtio-pci: Check if is_avq is NULL
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.027Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5e2024b0b9b3d5709e3f7e9b92951d7e29154106" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c8fae27d141a32a1624d0d0d5419d94252824498" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42134", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:15.915653Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:36.161Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/virtio/virtio_pci_common.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "5e2024b0b9b3", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "c8fae27d141a", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/virtio/virtio_pci_common.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-pci: Check if is_avq is NULL\n\n[bug]\nIn the virtio_pci_common.c function vp_del_vqs, vp_dev-\u003eis_avq is involved\nto determine whether it is admin virtqueue, but this function vp_dev-\u003eis_avq\n may be empty. For installations, virtio_pci_legacy does not assign a value\n to vp_dev-\u003eis_avq.\n\n[fix]\nCheck whether it is vp_dev-\u003eis_avq before use.\n\n[test]\nTest with virsh Attach device\nBefore this patch, the following command would crash the guest system\n\nAfter applying the patch, everything seems to be working fine." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:03.736Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/5e2024b0b9b3d5709e3f7e9b92951d7e29154106" }, { "url": "https://git.kernel.org/stable/c/c8fae27d141a32a1624d0d0d5419d94252824498" } ], "title": "virtio-pci: Check if is_avq is NULL", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42134", "datePublished": "2024-07-30T07:46:29.331Z", "dateReserved": "2024-07-29T15:50:41.187Z", "dateUpdated": "2024-11-05T09:38:03.736Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42081
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-12-09 14:21
Severity ?
EPSS score ?
Summary
drm/xe/xe_devcoredump: Check NULL before assignments
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/76ec0e33707282d5321555698d902f4e067aff37" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b15e65349553b1689d15fbdebea874ca5ae2274a" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42081", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:10.253541Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:07.494Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/xe/xe_devcoredump.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "76ec0e337072", "status": "affected", "version": "dd08ebf6c352", "versionType": "git" }, { "lessThan": "b15e65349553", "status": "affected", "version": "dd08ebf6c352", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/xe/xe_devcoredump.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.8" }, { "lessThan": "6.8", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/xe_devcoredump: Check NULL before assignments\n\nAssign \u0027xe_devcoredump_snapshot *\u0027 and \u0027xe_device *\u0027 only if\n\u0027coredump\u0027 is not NULL.\n\nv2\n- Fix commit messages.\n\nv3\n- Define variables before code.(Ashutosh/Jose)\n\nv4\n- Drop return check for coredump_to_xe. (Jose/Rodrigo)\n\nv5\n- Modify misleading commit message. (Matt)" } ], "providerMetadata": { "dateUpdated": "2024-12-09T14:21:23.230Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/76ec0e33707282d5321555698d902f4e067aff37" }, { "url": "https://git.kernel.org/stable/c/b15e65349553b1689d15fbdebea874ca5ae2274a" } ], "title": "drm/xe/xe_devcoredump: Check NULL before assignments", "x_generator": { "engine": "bippy-8e903de6a542" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42081", "datePublished": "2024-07-29T15:52:43.176Z", "dateReserved": "2024-07-29T15:50:41.170Z", "dateUpdated": "2024-12-09T14:21:23.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42076
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
net: can: j1939: Initialize unused data in j1939_send_one()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.919Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5e4ed38eb17eaca42de57d500cc0f9668d2b6abf" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a2a0ebff7fdeb2f66e29335adf64b9e457300dd4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4c5dc3927e17489c1cae6f48c0d5e4acb4cae01f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f97cbce633923588307049c4aef9feb2987e371b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ab2a683938ba4416d389c2f5651cbbb2c41b779f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ba7e5ae8208ac07d8e1eace0951a34c169a2d298" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b7cdf1dd5d2a2d8200efd98d1893684db48fe134" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42076", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:26.772684Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:57.462Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/can/j1939/main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "5e4ed38eb17e", "status": "affected", "version": "9d71dd0c7009", "versionType": "git" }, { "lessThan": "a2a0ebff7fde", "status": "affected", "version": "9d71dd0c7009", "versionType": "git" }, { "lessThan": "4c5dc3927e17", "status": "affected", "version": "9d71dd0c7009", "versionType": "git" }, { "lessThan": "f97cbce63392", "status": "affected", "version": "9d71dd0c7009", "versionType": "git" }, { "lessThan": "ab2a683938ba", "status": "affected", "version": "9d71dd0c7009", "versionType": "git" }, { "lessThan": "ba7e5ae8208a", "status": "affected", "version": "9d71dd0c7009", "versionType": "git" }, { "lessThan": "b7cdf1dd5d2a", "status": "affected", "version": "9d71dd0c7009", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/can/j1939/main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.4" }, { "lessThan": "5.4", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.279", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: can: j1939: Initialize unused data in j1939_send_one()\n\nsyzbot reported kernel-infoleak in raw_recvmsg() [1]. j1939_send_one()\ncreates full frame including unused data, but it doesn\u0027t initialize\nit. This causes the kernel-infoleak issue. Fix this by initializing\nunused data.\n\n[1]\nBUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\nBUG: KMSAN: kernel-infoleak in copy_to_user_iter lib/iov_iter.c:24 [inline]\nBUG: KMSAN: kernel-infoleak in iterate_ubuf include/linux/iov_iter.h:29 [inline]\nBUG: KMSAN: kernel-infoleak in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\nBUG: KMSAN: kernel-infoleak in iterate_and_advance include/linux/iov_iter.h:271 [inline]\nBUG: KMSAN: kernel-infoleak in _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185\n instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n copy_to_user_iter lib/iov_iter.c:24 [inline]\n iterate_ubuf include/linux/iov_iter.h:29 [inline]\n iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\n iterate_and_advance include/linux/iov_iter.h:271 [inline]\n _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185\n copy_to_iter include/linux/uio.h:196 [inline]\n memcpy_to_msg include/linux/skbuff.h:4113 [inline]\n raw_recvmsg+0x2b8/0x9e0 net/can/raw.c:1008\n sock_recvmsg_nosec net/socket.c:1046 [inline]\n sock_recvmsg+0x2c4/0x340 net/socket.c:1068\n ____sys_recvmsg+0x18a/0x620 net/socket.c:2803\n ___sys_recvmsg+0x223/0x840 net/socket.c:2845\n do_recvmmsg+0x4fc/0xfd0 net/socket.c:2939\n __sys_recvmmsg net/socket.c:3018 [inline]\n __do_sys_recvmmsg net/socket.c:3041 [inline]\n __se_sys_recvmmsg net/socket.c:3034 [inline]\n __x64_sys_recvmmsg+0x397/0x490 net/socket.c:3034\n x64_sys_call+0xf6c/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:300\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:3804 [inline]\n slab_alloc_node mm/slub.c:3845 [inline]\n kmem_cache_alloc_node+0x613/0xc50 mm/slub.c:3888\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577\n __alloc_skb+0x35b/0x7a0 net/core/skbuff.c:668\n alloc_skb include/linux/skbuff.h:1313 [inline]\n alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6504\n sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2795\n sock_alloc_send_skb include/net/sock.h:1842 [inline]\n j1939_sk_alloc_skb net/can/j1939/socket.c:878 [inline]\n j1939_sk_send_loop net/can/j1939/socket.c:1142 [inline]\n j1939_sk_sendmsg+0xc0a/0x2730 net/can/j1939/socket.c:1277\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x30f/0x380 net/socket.c:745\n ____sys_sendmsg+0x877/0xb60 net/socket.c:2584\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638\n __sys_sendmsg net/socket.c:2667 [inline]\n __do_sys_sendmsg net/socket.c:2676 [inline]\n __se_sys_sendmsg net/socket.c:2674 [inline]\n __x64_sys_sendmsg+0x307/0x4a0 net/socket.c:2674\n x64_sys_call+0xc4b/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:47\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nBytes 12-15 of 16 are uninitialized\nMemory access of size 16 starts at ffff888120969690\nData copied to user address 00000000200017c0\n\nCPU: 1 PID: 5050 Comm: syz-executor198 Not tainted 6.9.0-rc5-syzkaller-00031-g71b1543c83d6 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:56.237Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/5e4ed38eb17eaca42de57d500cc0f9668d2b6abf" }, { "url": "https://git.kernel.org/stable/c/a2a0ebff7fdeb2f66e29335adf64b9e457300dd4" }, { "url": "https://git.kernel.org/stable/c/4c5dc3927e17489c1cae6f48c0d5e4acb4cae01f" }, { "url": "https://git.kernel.org/stable/c/f97cbce633923588307049c4aef9feb2987e371b" }, { "url": "https://git.kernel.org/stable/c/ab2a683938ba4416d389c2f5651cbbb2c41b779f" }, { "url": "https://git.kernel.org/stable/c/ba7e5ae8208ac07d8e1eace0951a34c169a2d298" }, { "url": "https://git.kernel.org/stable/c/b7cdf1dd5d2a2d8200efd98d1893684db48fe134" } ], "title": "net: can: j1939: Initialize unused data in j1939_send_one()", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42076", "datePublished": "2024-07-29T15:52:38.981Z", "dateReserved": "2024-07-29T15:50:41.169Z", "dateUpdated": "2024-11-05T09:36:56.237Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41081
Vulnerability from cvelistv5
Published
2024-07-29 15:04
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
ila: block BH in ila_output()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.185Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7435bd2f84a25aba607030237261b3795ba782da" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/96103371091c6476eb07f4c66624bdd1b42f758a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a0cafb7b0b94d18e4813ee4b712a056f280e7b5a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/feac2391e26b086f73be30e9b1ab215eada8d830" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b4eb25a3d70df925a9fa4e82d17a958a0a228f5f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/522c3336c2025818fa05e9daf0ac35711e55e316" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9f9c79d8e527d867e0875868b14fb76e6011e70c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/cf28ff8e4c02e1ffa850755288ac954b6ff0db8c" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41081", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:05.349089Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:59.351Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/ipv6/ila/ila_lwt.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "7435bd2f84a2", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "96103371091c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "a0cafb7b0b94", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "feac2391e26b", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "b4eb25a3d70d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "522c3336c202", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "9f9c79d8e527", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "cf28ff8e4c02", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/ipv6/ila/ila_lwt.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.319", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.281", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.223", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.164", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nila: block BH in ila_output()\n\nAs explained in commit 1378817486d6 (\"tipc: block BH\nbefore using dst_cache\"), net/core/dst_cache.c\nhelpers need to be called with BH disabled.\n\nila_output() is called from lwtunnel_output()\npossibly from process context, and under rcu_read_lock().\n\nWe might be interrupted by a softirq, re-enter ila_output()\nand corrupt dst_cache data structures.\n\nFix the race by using local_bh_disable()." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:20.643Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/7435bd2f84a25aba607030237261b3795ba782da" }, { "url": "https://git.kernel.org/stable/c/96103371091c6476eb07f4c66624bdd1b42f758a" }, { "url": "https://git.kernel.org/stable/c/a0cafb7b0b94d18e4813ee4b712a056f280e7b5a" }, { "url": "https://git.kernel.org/stable/c/feac2391e26b086f73be30e9b1ab215eada8d830" }, { "url": "https://git.kernel.org/stable/c/b4eb25a3d70df925a9fa4e82d17a958a0a228f5f" }, { "url": "https://git.kernel.org/stable/c/522c3336c2025818fa05e9daf0ac35711e55e316" }, { "url": "https://git.kernel.org/stable/c/9f9c79d8e527d867e0875868b14fb76e6011e70c" }, { "url": "https://git.kernel.org/stable/c/cf28ff8e4c02e1ffa850755288ac954b6ff0db8c" } ], "title": "ila: block BH in ila_output()", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41081", "datePublished": "2024-07-29T15:04:18.459Z", "dateReserved": "2024-07-12T12:17:45.633Z", "dateUpdated": "2024-11-05T09:36:20.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41088
Vulnerability from cvelistv5
Published
2024-07-29 15:48
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
can: mcp251xfd: fix infinite loop when xmit fails
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.605Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f926c022ebaabf7963bebf89a97201d66978a025" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3e72558c1711d524e3150103739ddd06650e291b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6c6b4afa59c2fb4d1759235f866d8caed2aa4729" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d8fb63e46c884c898a38f061c2330f7729e75510" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41088", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:41.900253Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:56.256Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/can/spi/mcp251xfd/mcp251xfd-core.c", "drivers/net/can/spi/mcp251xfd/mcp251xfd-tx.c", "drivers/net/can/spi/mcp251xfd/mcp251xfd.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "f926c022ebaa", "status": "affected", "version": "55e5b97f003e", "versionType": "git" }, { "lessThan": "3e72558c1711", "status": "affected", "version": "55e5b97f003e", "versionType": "git" }, { "lessThan": "6c6b4afa59c2", "status": "affected", "version": "55e5b97f003e", "versionType": "git" }, { "lessThan": "d8fb63e46c88", "status": "affected", "version": "55e5b97f003e", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/can/spi/mcp251xfd/mcp251xfd-core.c", "drivers/net/can/spi/mcp251xfd/mcp251xfd-tx.c", "drivers/net/can/spi/mcp251xfd/mcp251xfd.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.10" }, { "lessThan": "5.10", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: mcp251xfd: fix infinite loop when xmit fails\n\nWhen the mcp251xfd_start_xmit() function fails, the driver stops\nprocessing messages, and the interrupt routine does not return,\nrunning indefinitely even after killing the running application.\n\nError messages:\n[ 441.298819] mcp251xfd spi2.0 can0: ERROR in mcp251xfd_start_xmit: -16\n[ 441.306498] mcp251xfd spi2.0 can0: Transmit Event FIFO buffer not empty. (seq=0x000017c7, tef_tail=0x000017cf, tef_head=0x000017d0, tx_head=0x000017d3).\n... and repeat forever.\n\nThe issue can be triggered when multiple devices share the same SPI\ninterface. And there is concurrent access to the bus.\n\nThe problem occurs because tx_ring-\u003ehead increments even if\nmcp251xfd_start_xmit() fails. Consequently, the driver skips one TX\npackage while still expecting a response in\nmcp251xfd_handle_tefif_one().\n\nResolve the issue by starting a workqueue to write the tx obj\nsynchronously if err = -EBUSY. In case of another error, decrement\ntx_ring-\u003ehead, remove skb from the echo stack, and drop the message.\n\n[mkl: use more imperative wording in patch description]" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:28.417Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/f926c022ebaabf7963bebf89a97201d66978a025" }, { "url": "https://git.kernel.org/stable/c/3e72558c1711d524e3150103739ddd06650e291b" }, { "url": "https://git.kernel.org/stable/c/6c6b4afa59c2fb4d1759235f866d8caed2aa4729" }, { "url": "https://git.kernel.org/stable/c/d8fb63e46c884c898a38f061c2330f7729e75510" } ], "title": "can: mcp251xfd: fix infinite loop when xmit fails", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41088", "datePublished": "2024-07-29T15:48:04.035Z", "dateReserved": "2024-07-12T12:17:45.634Z", "dateUpdated": "2024-11-05T09:36:28.417Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42119
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
drm/amd/display: Skip finding free audio for unknown engine_id
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.544Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9eb4db08a808e3a3ba59193aeb84a57a6dc4d8c9" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/eacca028a623f608607d02457122ee5284491e18" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ffa7bd3ca9cfa902b857d1dc9a5f46fededf86c8" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/afaaebdee9bb9f26d9e13cc34b33bd0a7bf59488" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/874261358d31fc772f2823604167e670983cc1ca" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/95ad20ee3c4efbb91f9a4ab08e070aa3697f5879" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/881fb6afc0004c5e6392ae2848f825bf051dae14" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1357b2165d9ad94faa4c4a20d5e2ce29c2ff29c3" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42119", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:03.551339Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:05.530Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/core/dc_resource.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "9eb4db08a808", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "eacca028a623", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "ffa7bd3ca9cf", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "afaaebdee9bb", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "874261358d31", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "95ad20ee3c4e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "881fb6afc000", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "1357b2165d9a", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/core/dc_resource.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Skip finding free audio for unknown engine_id\n\n[WHY]\nENGINE_ID_UNKNOWN = -1 and can not be used as an array index. Plus, it\nalso means it is uninitialized and does not need free audio.\n\n[HOW]\nSkip and return NULL.\n\nThis fixes 2 OVERRUN issues reported by Coverity." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:46.781Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/9eb4db08a808e3a3ba59193aeb84a57a6dc4d8c9" }, { "url": "https://git.kernel.org/stable/c/eacca028a623f608607d02457122ee5284491e18" }, { "url": "https://git.kernel.org/stable/c/ffa7bd3ca9cfa902b857d1dc9a5f46fededf86c8" }, { "url": "https://git.kernel.org/stable/c/afaaebdee9bb9f26d9e13cc34b33bd0a7bf59488" }, { "url": "https://git.kernel.org/stable/c/874261358d31fc772f2823604167e670983cc1ca" }, { "url": "https://git.kernel.org/stable/c/95ad20ee3c4efbb91f9a4ab08e070aa3697f5879" }, { "url": "https://git.kernel.org/stable/c/881fb6afc0004c5e6392ae2848f825bf051dae14" }, { "url": "https://git.kernel.org/stable/c/1357b2165d9ad94faa4c4a20d5e2ce29c2ff29c3" } ], "title": "drm/amd/display: Skip finding free audio for unknown engine_id", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42119", "datePublished": "2024-07-30T07:46:11.314Z", "dateReserved": "2024-07-29T15:50:41.178Z", "dateUpdated": "2024-11-05T09:37:46.781Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42088
Vulnerability from cvelistv5
Published
2024-07-29 16:26
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
ASoC: mediatek: mt8195: Add platform entry for ETDM1_OUT_BE dai link
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.140Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/42b9ab7a4d7e6c5efd71847541e4fcc213585aad" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/282a4482e198e03781c152c88aac8aa382ef9a55" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42088", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:18:47.495476Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:56.751Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "sound/soc/mediatek/mt8195/mt8195-mt6359.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "42b9ab7a4d7e", "status": "affected", "version": "e70b8dd26711", "versionType": "git" }, { "lessThan": "282a4482e198", "status": "affected", "version": "e70b8dd26711", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "sound/soc/mediatek/mt8195/mt8195-mt6359.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.8" }, { "lessThan": "6.8", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: mediatek: mt8195: Add platform entry for ETDM1_OUT_BE dai link\n\nCommit e70b8dd26711 (\"ASoC: mediatek: mt8195: Remove afe-dai component\nand rework codec link\") removed the codec entry for the ETDM1_OUT_BE\ndai link entirely instead of replacing it with COMP_EMPTY(). This worked\nby accident as the remaining COMP_EMPTY() platform entry became the codec\nentry, and the platform entry became completely empty, effectively the\nsame as COMP_DUMMY() since snd_soc_fill_dummy_dai() doesn\u0027t do anything\nfor platform entries.\n\nThis causes a KASAN out-of-bounds warning in mtk_soundcard_common_probe()\nin sound/soc/mediatek/common/mtk-soundcard-driver.c:\n\n\tfor_each_card_prelinks(card, i, dai_link) {\n\t\tif (adsp_node \u0026\u0026 !strncmp(dai_link-\u003ename, \"AFE_SOF\", strlen(\"AFE_SOF\")))\n\t\t\tdai_link-\u003eplatforms-\u003eof_node = adsp_node;\n\t\telse if (!dai_link-\u003eplatforms-\u003ename \u0026\u0026 !dai_link-\u003eplatforms-\u003eof_node)\n\t\t\tdai_link-\u003eplatforms-\u003eof_node = platform_node;\n\t}\n\nwhere the code expects the platforms array to have space for at least one entry.\n\nAdd an COMP_EMPTY() entry so that dai_link-\u003eplatforms has space." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:10.297Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/42b9ab7a4d7e6c5efd71847541e4fcc213585aad" }, { "url": "https://git.kernel.org/stable/c/282a4482e198e03781c152c88aac8aa382ef9a55" } ], "title": "ASoC: mediatek: mt8195: Add platform entry for ETDM1_OUT_BE dai link", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42088", "datePublished": "2024-07-29T16:26:28.523Z", "dateReserved": "2024-07-29T15:50:41.171Z", "dateUpdated": "2024-11-05T09:37:10.297Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41095
Vulnerability from cvelistv5
Published
2024-07-29 15:48
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.609Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9289cd3450d1da3e271ef4b054d4d2932c41243e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/dbd75f32252508ed6c46c3288a282c301a57ceeb" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/259549b2ccf795b7f91f7b5aba47286addcfa389" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0d17604f2e44b3df21e218fe8fb3b836d41bac49" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f95ed0f54b3d3faecae1140ddab854f904a6e7c8" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/cb751e48bbcffd292090f7882b23b215111b3d72" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/bdda5072494f2a7215d94fc4124ad1949a218714" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/66edf3fb331b6c55439b10f9862987b0916b3726" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41095", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:25.562753Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:09.325Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/nouveau/dispnv04/tvnv17.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "9289cd3450d1", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "dbd75f322525", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "259549b2ccf7", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "0d17604f2e44", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "f95ed0f54b3d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "cb751e48bbcf", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "bdda5072494f", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "66edf3fb331b", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/nouveau/dispnv04/tvnv17.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.317", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.279", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes\n\nIn nv17_tv_get_ld_modes(), the return value of drm_mode_duplicate() is\nassigned to mode, which will lead to a possible NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:36.485Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/9289cd3450d1da3e271ef4b054d4d2932c41243e" }, { "url": "https://git.kernel.org/stable/c/dbd75f32252508ed6c46c3288a282c301a57ceeb" }, { "url": "https://git.kernel.org/stable/c/259549b2ccf795b7f91f7b5aba47286addcfa389" }, { "url": "https://git.kernel.org/stable/c/0d17604f2e44b3df21e218fe8fb3b836d41bac49" }, { "url": "https://git.kernel.org/stable/c/f95ed0f54b3d3faecae1140ddab854f904a6e7c8" }, { "url": "https://git.kernel.org/stable/c/cb751e48bbcffd292090f7882b23b215111b3d72" }, { "url": "https://git.kernel.org/stable/c/bdda5072494f2a7215d94fc4124ad1949a218714" }, { "url": "https://git.kernel.org/stable/c/66edf3fb331b6c55439b10f9862987b0916b3726" } ], "title": "drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41095", "datePublished": "2024-07-29T15:48:08.324Z", "dateReserved": "2024-07-12T12:17:45.637Z", "dateUpdated": "2024-11-05T09:36:36.485Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42097
Vulnerability from cvelistv5
Published
2024-07-29 17:39
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
ALSA: emux: improve patch ioctl data validation
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.545Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/40d7def67841343c10f8642a41031fecbb248bab" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/79d9a000f0220cdaba1682d2a23c0d0c61d620a3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d23982ea9aa438f35a8c8a6305943e98a8db90f6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7a18293fd8d8519c2f7a03753bc1583b18e3db69" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d0ff2443fcbb472206d45a5d2a90cc694065804e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d8f5ce3cb9adf0c72e2ad6089aba02d7a32469c2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/87039b83fb7bfd7d0e0499aaa8e6c049906b4d14" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/89b32ccb12ae67e630c6453d778ec30a592a212f" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42097", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:18:18.485738Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:00.102Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "sound/synth/emux/soundfont.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "40d7def67841", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "79d9a000f022", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "d23982ea9aa4", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "7a18293fd8d8", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "d0ff2443fcbb", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "d8f5ce3cb9ad", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "87039b83fb7b", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "89b32ccb12ae", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "sound/synth/emux/soundfont.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.317", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.279", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: emux: improve patch ioctl data validation\n\nIn load_data(), make the validation of and skipping over the main info\nblock match that in load_guspatch().\n\nIn load_guspatch(), add checking that the specified patch length matches\nthe actually supplied data, like load_data() already did." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:20.830Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/40d7def67841343c10f8642a41031fecbb248bab" }, { "url": "https://git.kernel.org/stable/c/79d9a000f0220cdaba1682d2a23c0d0c61d620a3" }, { "url": "https://git.kernel.org/stable/c/d23982ea9aa438f35a8c8a6305943e98a8db90f6" }, { "url": "https://git.kernel.org/stable/c/7a18293fd8d8519c2f7a03753bc1583b18e3db69" }, { "url": "https://git.kernel.org/stable/c/d0ff2443fcbb472206d45a5d2a90cc694065804e" }, { "url": "https://git.kernel.org/stable/c/d8f5ce3cb9adf0c72e2ad6089aba02d7a32469c2" }, { "url": "https://git.kernel.org/stable/c/87039b83fb7bfd7d0e0499aaa8e6c049906b4d14" }, { "url": "https://git.kernel.org/stable/c/89b32ccb12ae67e630c6453d778ec30a592a212f" } ], "title": "ALSA: emux: improve patch ioctl data validation", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42097", "datePublished": "2024-07-29T17:39:32.470Z", "dateReserved": "2024-07-29T15:50:41.173Z", "dateUpdated": "2024-11-05T09:37:20.830Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41061
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
drm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.669Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/94166fe12543fbef122ca2d093e794ea41073a85" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0ad4b4a2f6357c45fbe444ead1a929a0b4017d03" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41061", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:08.835662Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:01.320Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/dml2/dml2_utils.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "94166fe12543", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "0ad4b4a2f635", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/dml2/dml2_utils.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport\n\n[Why]\nPotential out of bounds access in dml2_calculate_rq_and_dlg_params()\nbecause the value of out_lowest_state_idx used as an index for FCLKChangeSupport\narray can be greater than 1.\n\n[How]\nCurrently dml2 core specifies identical values for all FCLKChangeSupport\nelements. Always use index 0 in the condition to avoid out of bounds access." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:57.768Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/94166fe12543fbef122ca2d093e794ea41073a85" }, { "url": "https://git.kernel.org/stable/c/0ad4b4a2f6357c45fbe444ead1a929a0b4017d03" } ], "title": "drm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41061", "datePublished": "2024-07-29T14:57:23.459Z", "dateReserved": "2024-07-12T12:17:45.627Z", "dateUpdated": "2024-11-05T09:35:57.768Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42113
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
net: txgbe: initialize num_q_vectors for MSI/INTx interrupts
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.254Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9edc7a83cd40ac96ff14fe3a17a38f7ace6611df" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c98969226d1fe0c1dd779db8b1c444bc5294fc83" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7c36711a2cd8059c2d24f5e5c1d76e8ea2d5613c" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42113", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:23.403447Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:06.288Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/wangxun/libwx/wx_lib.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "9edc7a83cd40", "status": "affected", "version": "3f703186113f", "versionType": "git" }, { "lessThan": "c98969226d1f", "status": "affected", "version": "3f703186113f", "versionType": "git" }, { "lessThan": "7c36711a2cd8", "status": "affected", "version": "3f703186113f", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/wangxun/libwx/wx_lib.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.3" }, { "lessThan": "6.3", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: txgbe: initialize num_q_vectors for MSI/INTx interrupts\n\nWhen using MSI/INTx interrupts, wx-\u003enum_q_vectors is uninitialized.\nThus there will be kernel panic in wx_alloc_q_vectors() to allocate\nqueue vectors." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:39.879Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/9edc7a83cd40ac96ff14fe3a17a38f7ace6611df" }, { "url": "https://git.kernel.org/stable/c/c98969226d1fe0c1dd779db8b1c444bc5294fc83" }, { "url": "https://git.kernel.org/stable/c/7c36711a2cd8059c2d24f5e5c1d76e8ea2d5613c" } ], "title": "net: txgbe: initialize num_q_vectors for MSI/INTx interrupts", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42113", "datePublished": "2024-07-30T07:46:06.942Z", "dateReserved": "2024-07-29T15:50:41.177Z", "dateUpdated": "2024-11-05T09:37:39.879Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42073
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.349Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/bfa86a96912faa0b6142a918db88cc0c738a769e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/942901e0fc74ad4b7992ef7ca9336e68d5fd6d36" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/bf8781ede7bd9a37c0fcabca78976e61300b5a1a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c28947de2bed40217cf256c5d0d16880054fcf13" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42073", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:36.665774Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:57.825Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/mellanox/mlxsw/spectrum_buffers.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "bfa86a96912f", "status": "affected", "version": "f8538aec88b4", "versionType": "git" }, { "lessThan": "942901e0fc74", "status": "affected", "version": "f8538aec88b4", "versionType": "git" }, { "lessThan": "bf8781ede7bd", "status": "affected", "version": "f8538aec88b4", "versionType": "git" }, { "lessThan": "c28947de2bed", "status": "affected", "version": "f8538aec88b4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/mellanox/mlxsw/spectrum_buffers.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.17" }, { "lessThan": "5.17", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems\n\nThe following two shared buffer operations make use of the Shared Buffer\nStatus Register (SBSR):\n\n # devlink sb occupancy snapshot pci/0000:01:00.0\n # devlink sb occupancy clearmax pci/0000:01:00.0\n\nThe register has two masks of 256 bits to denote on which ingress /\negress ports the register should operate on. Spectrum-4 has more than\n256 ports, so the register was extended by cited commit with a new\n\u0027port_page\u0027 field.\n\nHowever, when filling the register\u0027s payload, the driver specifies the\nports as absolute numbers and not relative to the first port of the port\npage, resulting in memory corruptions [1].\n\nFix by specifying the ports relative to the first port of the port page.\n\n[1]\nBUG: KASAN: slab-use-after-free in mlxsw_sp_sb_occ_snapshot+0xb6d/0xbc0\nRead of size 1 at addr ffff8881068cb00f by task devlink/1566\n[...]\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xc6/0x120\n print_report+0xce/0x670\n kasan_report+0xd7/0x110\n mlxsw_sp_sb_occ_snapshot+0xb6d/0xbc0\n mlxsw_devlink_sb_occ_snapshot+0x75/0xb0\n devlink_nl_sb_occ_snapshot_doit+0x1f9/0x2a0\n genl_family_rcv_msg_doit+0x20c/0x300\n genl_rcv_msg+0x567/0x800\n netlink_rcv_skb+0x170/0x450\n genl_rcv+0x2d/0x40\n netlink_unicast+0x547/0x830\n netlink_sendmsg+0x8d4/0xdb0\n __sys_sendto+0x49b/0x510\n __x64_sys_sendto+0xe5/0x1c0\n do_syscall_64+0xc1/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[...]\nAllocated by task 1:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x8f/0xa0\n copy_verifier_state+0xbc2/0xfb0\n do_check_common+0x2c51/0xc7e0\n bpf_check+0x5107/0x9960\n bpf_prog_load+0xf0e/0x2690\n __sys_bpf+0x1a61/0x49d0\n __x64_sys_bpf+0x7d/0xc0\n do_syscall_64+0xc1/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFreed by task 1:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3b/0x60\n poison_slab_object+0x109/0x170\n __kasan_slab_free+0x14/0x30\n kfree+0xca/0x2b0\n free_verifier_state+0xce/0x270\n do_check_common+0x4828/0xc7e0\n bpf_check+0x5107/0x9960\n bpf_prog_load+0xf0e/0x2690\n __sys_bpf+0x1a61/0x49d0\n __x64_sys_bpf+0x7d/0xc0\n do_syscall_64+0xc1/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:52.581Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/bfa86a96912faa0b6142a918db88cc0c738a769e" }, { "url": "https://git.kernel.org/stable/c/942901e0fc74ad4b7992ef7ca9336e68d5fd6d36" }, { "url": "https://git.kernel.org/stable/c/bf8781ede7bd9a37c0fcabca78976e61300b5a1a" }, { "url": "https://git.kernel.org/stable/c/c28947de2bed40217cf256c5d0d16880054fcf13" } ], "title": "mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42073", "datePublished": "2024-07-29T15:52:36.416Z", "dateReserved": "2024-07-29T15:50:41.169Z", "dateUpdated": "2024-11-05T09:36:52.581Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42139
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
ice: Fix improper extts handling
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.564Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9f69b31ae9e25dec27ad31fbc64dd99af16ee3d3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/00d3b4f54582d4e4a02cda5886bb336eeab268cc" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42139", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:59.830923Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:35.575Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/intel/ice/ice_ptp.c", "drivers/net/ethernet/intel/ice/ice_ptp.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "9f69b31ae9e2", "status": "affected", "version": "172db5f91d5f", "versionType": "git" }, { "lessThan": "00d3b4f54582", "status": "affected", "version": "172db5f91d5f", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/intel/ice/ice_ptp.c", "drivers/net/ethernet/intel/ice/ice_ptp.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.14" }, { "lessThan": "5.14", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix improper extts handling\n\nExtts events are disabled and enabled by the application ts2phc.\nHowever, in case where the driver is removed when the application is\nrunning, a specific extts event remains enabled and can cause a kernel\ncrash.\nAs a side effect, when the driver is reloaded and application is started\nagain, remaining extts event for the channel from a previous run will\nkeep firing and the message \"extts on unexpected channel\" might be\nprinted to the user.\n\nTo avoid that, extts events shall be disabled when PTP is released." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:09.244Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/9f69b31ae9e25dec27ad31fbc64dd99af16ee3d3" }, { "url": "https://git.kernel.org/stable/c/00d3b4f54582d4e4a02cda5886bb336eeab268cc" } ], "title": "ice: Fix improper extts handling", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42139", "datePublished": "2024-07-30T07:46:33.401Z", "dateReserved": "2024-07-29T15:50:41.189Z", "dateUpdated": "2024-11-05T09:38:09.244Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41071
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
wifi: mac80211: Avoid address calculations via out of bounds array indexing
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4f43a614b1b84f0d1e3c48cc541c3bfdf414a6d0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2663d0462eb32ae7c9b035300ab6b1523886c718" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41071", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:36.947348Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:00.801Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/mac80211/scan.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "a2bb0c5d0086", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "26b177ecdd31", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "4f43a614b1b8", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "2663d0462eb3", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/mac80211/scan.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.113", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.57", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Avoid address calculations via out of bounds array indexing\n\nreq-\u003en_channels must be set before req-\u003echannels[] can be used.\n\nThis patch fixes one of the issues encountered in [1].\n\n[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4\n[ 83.964258] index 0 is out of range for type \u0027struct ieee80211_channel *[]\u0027\n[...]\n[ 83.964264] Call Trace:\n[ 83.964267] \u003cTASK\u003e\n[ 83.964269] dump_stack_lvl+0x3f/0xc0\n[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110\n[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0\n[ 83.964281] __ieee80211_start_scan+0x601/0x990\n[ 83.964291] nl80211_trigger_scan+0x874/0x980\n[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160\n[ 83.964298] genl_rcv_msg+0x240/0x270\n[...]\n\n[1] https://bugzilla.kernel.org/show_bug.cgi?id=218810" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:09.505Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/a2bb0c5d0086be5ab5054465dfaa381a1144905c" }, { "url": "https://git.kernel.org/stable/c/26b177ecdd311f20de4c379f0630858a675dfc0c" }, { "url": "https://git.kernel.org/stable/c/4f43a614b1b84f0d1e3c48cc541c3bfdf414a6d0" }, { "url": "https://git.kernel.org/stable/c/2663d0462eb32ae7c9b035300ab6b1523886c718" } ], "title": "wifi: mac80211: Avoid address calculations via out of bounds array indexing", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41071", "datePublished": "2024-07-29T14:57:31.623Z", "dateReserved": "2024-07-12T12:17:45.631Z", "dateUpdated": "2024-11-05T09:36:09.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41067
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
btrfs: scrub: handle RST lookup error correctly
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.378Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/17d1fd302a53d7e456a7412da74be74a0cf63a72" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2c49908634a2b97b1c3abe0589be2739ac5e7fd5" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41067", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:49.560093Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:00.426Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/btrfs/scrub.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "17d1fd302a53", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "2c49908634a2", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/btrfs/scrub.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: scrub: handle RST lookup error correctly\n\n[BUG]\nWhen running btrfs/060 with forced RST feature, it would crash the\nfollowing ASSERT() inside scrub_read_endio():\n\n\tASSERT(sector_nr \u003c stripe-\u003enr_sectors);\n\nBefore that, we would have tree dump from\nbtrfs_get_raid_extent_offset(), as we failed to find the RST entry for\nthe range.\n\n[CAUSE]\nInside scrub_submit_extent_sector_read() every time we allocated a new\nbbio we immediately called btrfs_map_block() to make sure there was some\nRST range covering the scrub target.\n\nBut if btrfs_map_block() fails, we immediately call endio for the bbio,\nwhile the bbio is newly allocated, it\u0027s completely empty.\n\nThen inside scrub_read_endio(), we go through the bvecs to find\nthe sector number (as bi_sector is no longer reliable if the bio is\nsubmitted to lower layers).\n\nAnd since the bio is empty, such bvecs iteration would not find any\nsector matching the sector, and return sector_nr == stripe-\u003enr_sectors,\ntriggering the ASSERT().\n\n[FIX]\nInstead of calling btrfs_map_block() after allocating a new bbio, call\nbtrfs_map_block() first.\n\nSince our only objective of calling btrfs_map_block() is only to update\nstripe_len, there is really no need to do that after btrfs_alloc_bio().\n\nThis new timing would avoid the problem of handling empty bbio\ncompletely, and in fact fixes a possible race window for the old code,\nwhere if the submission thread is the only owner of the pending_io, the\nscrub would never finish (since we didn\u0027t decrease the pending_io\ncounter).\n\nAlthough the root cause of RST lookup failure still needs to be\naddressed." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:05.089Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/17d1fd302a53d7e456a7412da74be74a0cf63a72" }, { "url": "https://git.kernel.org/stable/c/2c49908634a2b97b1c3abe0589be2739ac5e7fd5" } ], "title": "btrfs: scrub: handle RST lookup error correctly", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41067", "datePublished": "2024-07-29T14:57:28.543Z", "dateReserved": "2024-07-12T12:17:45.630Z", "dateUpdated": "2024-11-05T09:36:05.089Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41034
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
nilfs2: fix kernel bug on rename operation of broken directory
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.078Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ff9767ba2cb949701e45e6e4287f8af82986b703" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/24c1c8566a9b6be51f5347be2ea76e25fc82b11e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a9a466a69b85059b341239766a10efdd3ee68a4b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7000b438dda9d0f41a956fc9bffed92d2eb6be0d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1a8879c0771a68d70ee2e5e66eea34207e8c6231" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/60f61514374e4a0c3b65b08c6024dd7e26150bfd" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/298cd810d7fb687c90a14d8f9fd1b8719a7cb8a5" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41034", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:23:37.441886Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:58.811Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/nilfs2/dir.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "ff9767ba2cb9", "status": "affected", "version": "2ba466d74ed7", "versionType": "git" }, { "lessThan": "24c1c8566a9b", "status": "affected", "version": "2ba466d74ed7", "versionType": "git" }, { "lessThan": "a9a466a69b85", "status": "affected", "version": "2ba466d74ed7", "versionType": "git" }, { "lessThan": "7000b438dda9", "status": "affected", "version": "2ba466d74ed7", "versionType": "git" }, { "lessThan": "1a8879c0771a", "status": "affected", "version": "2ba466d74ed7", "versionType": "git" }, { "lessThan": "60f61514374e", "status": "affected", "version": "2ba466d74ed7", "versionType": "git" }, { "lessThan": "298cd810d7fb", "status": "affected", "version": "2ba466d74ed7", "versionType": "git" }, { "lessThan": "a9e1ddc09ca5", "status": "affected", "version": "2ba466d74ed7", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/nilfs2/dir.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "2.6.30" }, { "lessThan": "2.6.30", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix kernel bug on rename operation of broken directory\n\nSyzbot reported that in rename directory operation on broken directory on\nnilfs2, __block_write_begin_int() called to prepare block write may fail\nBUG_ON check for access exceeding the folio/page size.\n\nThis is because nilfs_dotdot(), which gets parent directory reference\nentry (\"..\") of the directory to be moved or renamed, does not check\nconsistency enough, and may return location exceeding folio/page size for\nbroken directories.\n\nFix this issue by checking required directory entries (\".\" and \"..\") in\nthe first chunk of the directory in nilfs_dotdot()." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:23.584Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/ff9767ba2cb949701e45e6e4287f8af82986b703" }, { "url": "https://git.kernel.org/stable/c/24c1c8566a9b6be51f5347be2ea76e25fc82b11e" }, { "url": "https://git.kernel.org/stable/c/a9a466a69b85059b341239766a10efdd3ee68a4b" }, { "url": "https://git.kernel.org/stable/c/7000b438dda9d0f41a956fc9bffed92d2eb6be0d" }, { "url": "https://git.kernel.org/stable/c/1a8879c0771a68d70ee2e5e66eea34207e8c6231" }, { "url": "https://git.kernel.org/stable/c/60f61514374e4a0c3b65b08c6024dd7e26150bfd" }, { "url": "https://git.kernel.org/stable/c/298cd810d7fb687c90a14d8f9fd1b8719a7cb8a5" }, { "url": "https://git.kernel.org/stable/c/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4" } ], "title": "nilfs2: fix kernel bug on rename operation of broken directory", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41034", "datePublished": "2024-07-29T14:31:49.043Z", "dateReserved": "2024-07-12T12:17:45.619Z", "dateUpdated": "2024-11-05T09:35:23.584Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42102
Vulnerability from cvelistv5
Published
2024-07-30 07:45
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again"
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/253f9ea7e8e53a5176bd80ceb174907b10724c1a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/145faa3d03688cbb7bbaaecbd84c01539852942c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2820005edae13b140f2d54267d1bd6bb23915f59" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/cbbe17a324437c0ff99881a3ee453da45b228a00" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f6620df12cb6bdcad671d269debbb23573502f9d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/000099d71648504fb9c7a4616f92c2b70c3e44ec" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/30139c702048f1097342a31302cbd3d478f50c63" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42102", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:59.274407Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:59.444Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "mm/page-writeback.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "253f9ea7e8e5", "status": "affected", "version": "c593d26fb5d5", "versionType": "git" }, { "lessThan": "23a28f5f3f6c", "status": "affected", "version": "1f12e4b3284d", "versionType": "git" }, { "lessThan": "145faa3d0368", "status": "affected", "version": "81e7d2530d45", "versionType": "git" }, { "lessThan": "2820005edae1", "status": "affected", "version": "5099871b3703", "versionType": "git" }, { "lessThan": "cbbe17a32443", "status": "affected", "version": "16b1025eaa8f", "versionType": "git" }, { "lessThan": "f6620df12cb6", "status": "affected", "version": "ec18ec230301", "versionType": "git" }, { "lessThan": "000099d71648", "status": "affected", "version": "9319b647902c", "versionType": "git" }, { "lessThan": "30139c702048", "status": "affected", "version": "9319b647902c", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "mm/page-writeback.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.8" }, { "lessThan": "6.8", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again\"\n\nPatch series \"mm: Avoid possible overflows in dirty throttling\".\n\nDirty throttling logic assumes dirty limits in page units fit into\n32-bits. This patch series makes sure this is true (see patch 2/2 for\nmore details).\n\n\nThis patch (of 2):\n\nThis reverts commit 9319b647902cbd5cc884ac08a8a6d54ce111fc78.\n\nThe commit is broken in several ways. Firstly, the removed (u64) cast\nfrom the multiplication will introduce a multiplication overflow on 32-bit\narchs if wb_thresh * bg_thresh \u003e= 1\u003c\u003c32 (which is actually common - the\ndefault settings with 4GB of RAM will trigger this). Secondly, the\ndiv64_u64() is unnecessarily expensive on 32-bit archs. We have\ndiv64_ul() in case we want to be safe \u0026 cheap. Thirdly, if dirty\nthresholds are larger than 1\u003c\u003c32 pages, then dirty balancing is going to\nblow up in many other spectacular ways anyway so trying to fix one\npossible overflow is just moot." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:26.589Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/253f9ea7e8e53a5176bd80ceb174907b10724c1a" }, { "url": "https://git.kernel.org/stable/c/23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807" }, { "url": "https://git.kernel.org/stable/c/145faa3d03688cbb7bbaaecbd84c01539852942c" }, { "url": "https://git.kernel.org/stable/c/2820005edae13b140f2d54267d1bd6bb23915f59" }, { "url": "https://git.kernel.org/stable/c/cbbe17a324437c0ff99881a3ee453da45b228a00" }, { "url": "https://git.kernel.org/stable/c/f6620df12cb6bdcad671d269debbb23573502f9d" }, { "url": "https://git.kernel.org/stable/c/000099d71648504fb9c7a4616f92c2b70c3e44ec" }, { "url": "https://git.kernel.org/stable/c/30139c702048f1097342a31302cbd3d478f50c63" } ], "title": "Revert \"mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again\"", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42102", "datePublished": "2024-07-30T07:45:58.423Z", "dateReserved": "2024-07-29T15:50:41.174Z", "dateUpdated": "2024-11-05T09:37:26.589Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42098
Vulnerability from cvelistv5
Published
2024-07-29 17:39
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
crypto: ecdh - explicitly zeroize private_key
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/39173b04abda87872b43c331468a4a14f8f05ce8" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/fd7ef325911eba1b7191b83cb580463242f2090d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/80575b252ab0358b7e93895b2a510beb3cb3f975" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d96187eb8e59b572a8e6a68b6a9837a867ea29df" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/73e5984e540a76a2ee1868b91590c922da8c24c9" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42098", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:18:15.393547Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:59.924Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "crypto/ecdh.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "39173b04abda", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "fd7ef325911e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "80575b252ab0", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "d96187eb8e59", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "73e5984e540a", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "crypto/ecdh.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: ecdh - explicitly zeroize private_key\n\nprivate_key is overwritten with the key parameter passed in by the\ncaller (if present), or alternatively a newly generated private key.\nHowever, it is possible that the caller provides a key (or the newly\ngenerated key) which is shorter than the previous key. In that\nscenario, some key material from the previous key would not be\noverwritten. The easiest solution is to explicitly zeroize the entire\nprivate_key array first.\n\nNote that this patch slightly changes the behavior of this function:\npreviously, if the ecc_gen_privkey failed, the old private_key would\nremain. Now, the private_key is always zeroized. This behavior is\nconsistent with the case where params.key is set and ecc_is_key_valid\nfails." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:22.060Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/39173b04abda87872b43c331468a4a14f8f05ce8" }, { "url": "https://git.kernel.org/stable/c/fd7ef325911eba1b7191b83cb580463242f2090d" }, { "url": "https://git.kernel.org/stable/c/80575b252ab0358b7e93895b2a510beb3cb3f975" }, { "url": "https://git.kernel.org/stable/c/d96187eb8e59b572a8e6a68b6a9837a867ea29df" }, { "url": "https://git.kernel.org/stable/c/73e5984e540a76a2ee1868b91590c922da8c24c9" } ], "title": "crypto: ecdh - explicitly zeroize private_key", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42098", "datePublished": "2024-07-29T17:39:33.395Z", "dateReserved": "2024-07-29T15:50:41.173Z", "dateUpdated": "2024-11-05T09:37:22.060Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42095
Vulnerability from cvelistv5
Published
2024-07-29 17:39
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
serial: 8250_omap: Implementation of Errata i2310
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.163Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/cb879300669881970eabebe64bd509dbbe42b9de" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/87257a28271c828a98f762bf2dd803c1793d2b5b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/98840e410d53329f5331ecdce095e740791963d0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e67d7f38008e56fb691b6a72cadf16c107c2f48b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6270051f656004ca5cde644c73cb1fa4d718792e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9d141c1e615795eeb93cd35501ad144ee997a826" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42095", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:18:24.897254Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:00.606Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/tty/serial/8250/8250_omap.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "cb8793006698", "status": "affected", "version": "9443acbd251f", "versionType": "git" }, { "lessThan": "87257a28271c", "status": "affected", "version": "b67e830d38fa", "versionType": "git" }, { "lessThan": "98840e410d53", "status": "affected", "version": "b67e830d38fa", "versionType": "git" }, { "lessThan": "e67d7f38008e", "status": "affected", "version": "b67e830d38fa", "versionType": "git" }, { "lessThan": "6270051f6560", "status": "affected", "version": "b67e830d38fa", "versionType": "git" }, { "lessThan": "9d141c1e6157", "status": "affected", "version": "b67e830d38fa", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/tty/serial/8250/8250_omap.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.14" }, { "lessThan": "5.14", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250_omap: Implementation of Errata i2310\n\nAs per Errata i2310[0], Erroneous timeout can be triggered,\nif this Erroneous interrupt is not cleared then it may leads\nto storm of interrupts, therefore apply Errata i2310 solution.\n\n[0] https://www.ti.com/lit/pdf/sprz536 page 23" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:18.653Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/cb879300669881970eabebe64bd509dbbe42b9de" }, { "url": "https://git.kernel.org/stable/c/87257a28271c828a98f762bf2dd803c1793d2b5b" }, { "url": "https://git.kernel.org/stable/c/98840e410d53329f5331ecdce095e740791963d0" }, { "url": "https://git.kernel.org/stable/c/e67d7f38008e56fb691b6a72cadf16c107c2f48b" }, { "url": "https://git.kernel.org/stable/c/6270051f656004ca5cde644c73cb1fa4d718792e" }, { "url": "https://git.kernel.org/stable/c/9d141c1e615795eeb93cd35501ad144ee997a826" } ], "title": "serial: 8250_omap: Implementation of Errata i2310", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42095", "datePublished": "2024-07-29T17:39:30.948Z", "dateReserved": "2024-07-29T15:50:41.173Z", "dateUpdated": "2024-11-05T09:37:18.653Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42099
Vulnerability from cvelistv5
Published
2024-07-30 07:45
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
s390/dasd: Fix invalid dereferencing of indirect CCW data pointer
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.742Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c116475f7d6410b1e6d399207ac75de6cf9c3652" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b3a58f3b90f564f42a5c35778d8c5107b2c2150b" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42099", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:18:08.885976Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:49.224Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/s390/block/dasd_eckd.c", "drivers/s390/block/dasd_fba.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "c116475f7d64", "status": "affected", "version": "c0bd39601c13", "versionType": "git" }, { "lessThan": "b3a58f3b90f5", "status": "affected", "version": "c0bd39601c13", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/s390/block/dasd_eckd.c", "drivers/s390/block/dasd_fba.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.9" }, { "lessThan": "6.9", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: Fix invalid dereferencing of indirect CCW data pointer\n\nFix invalid dereferencing of indirect CCW data pointer in\ndasd_eckd_dump_sense() that leads to a kernel panic in error cases.\n\nWhen using indirect addressing for DASD CCWs (IDAW) the CCW CDA pointer\ndoes not contain the data address itself but a pointer to the IDAL.\nThis needs to be translated from physical to virtual as well before\nusing it.\n\nThis dereferencing is also used for dasd_page_cache and also fixed\nalthough it is very unlikely that this code path ever gets used." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:23.185Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/c116475f7d6410b1e6d399207ac75de6cf9c3652" }, { "url": "https://git.kernel.org/stable/c/b3a58f3b90f564f42a5c35778d8c5107b2c2150b" } ], "title": "s390/dasd: Fix invalid dereferencing of indirect CCW data pointer", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42099", "datePublished": "2024-07-30T07:45:55.643Z", "dateReserved": "2024-07-29T15:50:41.173Z", "dateUpdated": "2024-11-05T09:37:23.185Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42148
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
bnx2x: Fix multiple UBSAN array-index-out-of-bounds
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.025Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/cfb04472ce33bee2579caf4dc9f4242522f6e26e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/cbe53087026ad929cd3950508397e8892a6a2a0f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8b17cec33892a66bbd71f8d9a70a45e2072ae84f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0edae06b4c227bcfaf3ce21208d49191e1009d3b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9504a1550686f53b0bab4cab31d435383b1ee2ce" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f1313ea92f82451923e28ab45a4aaa0e70e80b98" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b9ea38e767459111a511ed4fb74abc37db95a59d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/134061163ee5ca4759de5c24ca3bd71608891ba7" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42148", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:34.762201Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:34.889Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/broadcom/bnx2x/bnx2x.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "cfb04472ce33", "status": "affected", "version": "50f0a562f8cc", "versionType": "git" }, { "lessThan": "cbe53087026a", "status": "affected", "version": "50f0a562f8cc", "versionType": "git" }, { "lessThan": "8b17cec33892", "status": "affected", "version": "50f0a562f8cc", "versionType": "git" }, { "lessThan": "0edae06b4c22", "status": "affected", "version": "50f0a562f8cc", "versionType": "git" }, { "lessThan": "9504a1550686", "status": "affected", "version": "50f0a562f8cc", "versionType": "git" }, { "lessThan": "f1313ea92f82", "status": "affected", "version": "50f0a562f8cc", "versionType": "git" }, { "lessThan": "b9ea38e76745", "status": "affected", "version": "50f0a562f8cc", "versionType": "git" }, { "lessThan": "134061163ee5", "status": "affected", "version": "50f0a562f8cc", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/broadcom/bnx2x/bnx2x.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "3.3" }, { "lessThan": "3.3", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbnx2x: Fix multiple UBSAN array-index-out-of-bounds\n\nFix UBSAN warnings that occur when using a system with 32 physical\ncpu cores or more, or when the user defines a number of Ethernet\nqueues greater than or equal to FP_SB_MAX_E1x using the num_queues\nmodule parameter.\n\nCurrently there is a read/write out of bounds that occurs on the array\n\"struct stats_query_entry query\" present inside the \"bnx2x_fw_stats_req\"\nstruct in \"drivers/net/ethernet/broadcom/bnx2x/bnx2x.h\".\nLooking at the definition of the \"struct stats_query_entry query\" array:\n\nstruct stats_query_entry query[FP_SB_MAX_E1x+\n BNX2X_FIRST_QUEUE_QUERY_IDX];\n\nFP_SB_MAX_E1x is defined as the maximum number of fast path interrupts and\nhas a value of 16, while BNX2X_FIRST_QUEUE_QUERY_IDX has a value of 3\nmeaning the array has a total size of 19.\nSince accesses to \"struct stats_query_entry query\" are offset-ted by\nBNX2X_FIRST_QUEUE_QUERY_IDX, that means that the total number of Ethernet\nqueues should not exceed FP_SB_MAX_E1x (16). However one of these queues\nis reserved for FCOE and thus the number of Ethernet queues should be set\nto [FP_SB_MAX_E1x -1] (15) if FCOE is enabled or [FP_SB_MAX_E1x] (16) if\nit is not.\n\nThis is also described in a comment in the source code in\ndrivers/net/ethernet/broadcom/bnx2x/bnx2x.h just above the Macro definition\nof FP_SB_MAX_E1x. Below is the part of this explanation that it important\nfor this patch\n\n/*\n * The total number of L2 queues, MSIX vectors and HW contexts (CIDs) is\n * control by the number of fast-path status blocks supported by the\n * device (HW/FW). Each fast-path status block (FP-SB) aka non-default\n * status block represents an independent interrupts context that can\n * serve a regular L2 networking queue. However special L2 queues such\n * as the FCoE queue do not require a FP-SB and other components like\n * the CNIC may consume FP-SB reducing the number of possible L2 queues\n *\n * If the maximum number of FP-SB available is X then:\n * a. If CNIC is supported it consumes 1 FP-SB thus the max number of\n * regular L2 queues is Y=X-1\n * b. In MF mode the actual number of L2 queues is Y= (X-1/MF_factor)\n * c. If the FCoE L2 queue is supported the actual number of L2 queues\n * is Y+1\n * d. The number of irqs (MSIX vectors) is either Y+1 (one extra for\n * slow-path interrupts) or Y+2 if CNIC is supported (one additional\n * FP interrupt context for the CNIC).\n * e. The number of HW context (CID count) is always X or X+1 if FCoE\n * L2 queue is supported. The cid for the FCoE L2 queue is always X.\n */\n\nHowever this driver also supports NICs that use the E2 controller which can\nhandle more queues due to having more FP-SB represented by FP_SB_MAX_E2.\nLooking at the commits when the E2 support was added, it was originally\nusing the E1x parameters: commit f2e0899f0f27 (\"bnx2x: Add 57712 support\").\nBack then FP_SB_MAX_E2 was set to 16 the same as E1x. However the driver\nwas later updated to take full advantage of the E2 instead of having it be\nlimited to the capabilities of the E1x. But as far as we can tell, the\narray \"stats_query_entry query\" was still limited to using the FP-SB\navailable to the E1x cards as part of an oversignt when the driver was\nupdated to take full advantage of the E2, and now with the driver being\naware of the greater queue size supported by E2 NICs, it causes the UBSAN\nwarnings seen in the stack traces below.\n\nThis patch increases the size of the \"stats_query_entry query\" array by\nreplacing FP_SB_MAX_E1x with FP_SB_MAX_E2 to be large enough to handle\nboth types of NICs.\n\nStack traces:\n\nUBSAN: array-index-out-of-bounds in\n drivers/net/ethernet/broadcom/bnx2x/bnx2x_stats.c:1529:11\nindex 20 is out of range for type \u0027stats_query_entry [19]\u0027\nCPU: 12 PID: 858 Comm: systemd-network Not tainted 6.9.0-060900rc7-generic\n\t #202405052133\nHardware name: HP ProLiant DL360 Gen9/ProLiant DL360 \n---truncated---" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:18.124Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/cfb04472ce33bee2579caf4dc9f4242522f6e26e" }, { "url": "https://git.kernel.org/stable/c/cbe53087026ad929cd3950508397e8892a6a2a0f" }, { "url": "https://git.kernel.org/stable/c/8b17cec33892a66bbd71f8d9a70a45e2072ae84f" }, { "url": "https://git.kernel.org/stable/c/0edae06b4c227bcfaf3ce21208d49191e1009d3b" }, { "url": "https://git.kernel.org/stable/c/9504a1550686f53b0bab4cab31d435383b1ee2ce" }, { "url": "https://git.kernel.org/stable/c/f1313ea92f82451923e28ab45a4aaa0e70e80b98" }, { "url": "https://git.kernel.org/stable/c/b9ea38e767459111a511ed4fb74abc37db95a59d" }, { "url": "https://git.kernel.org/stable/c/134061163ee5ca4759de5c24ca3bd71608891ba7" } ], "title": "bnx2x: Fix multiple UBSAN array-index-out-of-bounds", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42148", "datePublished": "2024-07-30T07:46:41.203Z", "dateReserved": "2024-07-29T15:50:41.191Z", "dateUpdated": "2024-11-05T09:38:18.124Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41036
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
net: ks8851: Fix deadlock with the SPI chip variant
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:55.963Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a0c69c492f4a8fad52f0a97565241c926160c9a4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/80ece00137300d74642f2038c8fe5440deaf9f05" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/10fec0cd0e8f56ff06c46bb24254c7d8f8f2bbf0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0913ec336a6c0c4a2b296bd9f74f8e41c4c83c8c" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41036", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:23:30.114712Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:03.463Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/micrel/ks8851_common.c", "drivers/net/ethernet/micrel/ks8851_spi.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "a0c69c492f4a", "status": "affected", "version": "1092525155ea", "versionType": "git" }, { "lessThan": "80ece0013730", "status": "affected", "version": "30302b41ffdc", "versionType": "git" }, { "lessThan": "10fec0cd0e8f", "status": "affected", "version": "3dc5d4454545", "versionType": "git" }, { "lessThan": "0913ec336a6c", "status": "affected", "version": "3dc5d4454545", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/micrel/ks8851_common.c", "drivers/net/ethernet/micrel/ks8851_spi.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.7" }, { "lessThan": "6.7", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ks8851: Fix deadlock with the SPI chip variant\n\nWhen SMP is enabled and spinlocks are actually functional then there is\na deadlock with the \u0027statelock\u0027 spinlock between ks8851_start_xmit_spi\nand ks8851_irq:\n\n watchdog: BUG: soft lockup - CPU#0 stuck for 27s!\n call trace:\n queued_spin_lock_slowpath+0x100/0x284\n do_raw_spin_lock+0x34/0x44\n ks8851_start_xmit_spi+0x30/0xb8\n ks8851_start_xmit+0x14/0x20\n netdev_start_xmit+0x40/0x6c\n dev_hard_start_xmit+0x6c/0xbc\n sch_direct_xmit+0xa4/0x22c\n __qdisc_run+0x138/0x3fc\n qdisc_run+0x24/0x3c\n net_tx_action+0xf8/0x130\n handle_softirqs+0x1ac/0x1f0\n __do_softirq+0x14/0x20\n ____do_softirq+0x10/0x1c\n call_on_irq_stack+0x3c/0x58\n do_softirq_own_stack+0x1c/0x28\n __irq_exit_rcu+0x54/0x9c\n irq_exit_rcu+0x10/0x1c\n el1_interrupt+0x38/0x50\n el1h_64_irq_handler+0x18/0x24\n el1h_64_irq+0x64/0x68\n __netif_schedule+0x6c/0x80\n netif_tx_wake_queue+0x38/0x48\n ks8851_irq+0xb8/0x2c8\n irq_thread_fn+0x2c/0x74\n irq_thread+0x10c/0x1b0\n kthread+0xc8/0xd8\n ret_from_fork+0x10/0x20\n\nThis issue has not been identified earlier because tests were done on\na device with SMP disabled and so spinlocks were actually NOPs.\n\nNow use spin_(un)lock_bh for TX queue related locking to avoid execution\nof softirq work synchronously that would lead to a deadlock." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:25.746Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/a0c69c492f4a8fad52f0a97565241c926160c9a4" }, { "url": "https://git.kernel.org/stable/c/80ece00137300d74642f2038c8fe5440deaf9f05" }, { "url": "https://git.kernel.org/stable/c/10fec0cd0e8f56ff06c46bb24254c7d8f8f2bbf0" }, { "url": "https://git.kernel.org/stable/c/0913ec336a6c0c4a2b296bd9f74f8e41c4c83c8c" } ], "title": "net: ks8851: Fix deadlock with the SPI chip variant", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41036", "datePublished": "2024-07-29T14:31:50.669Z", "dateReserved": "2024-07-12T12:17:45.620Z", "dateUpdated": "2024-11-05T09:35:25.746Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42132
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.923Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4970e48f83dbd21d2a6a7cdaaafc2a71f7f45dc4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d311036696fed778301d08a71a4bef737b86d8c5" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1cc18c2ab2e8c54c355ea7c0423a636e415a0c23" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42132", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:22.191923Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:36.401Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/bluetooth/hci_conn.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "4970e48f83db", "status": "affected", "version": "84cb0143fb8a", "versionType": "git" }, { "lessThan": "d311036696fe", "status": "affected", "version": "181a42edddf5", "versionType": "git" }, { "lessThan": "1cc18c2ab2e8", "status": "affected", "version": "181a42edddf5", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/bluetooth/hci_conn.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.7" }, { "lessThan": "6.7", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX\n\nSyzbot hit warning in hci_conn_del() caused by freeing handle that was\nnot allocated using ida allocator.\n\nThis is caused by handle bigger than HCI_CONN_HANDLE_MAX passed by\nhci_le_big_sync_established_evt(), which makes code think it\u0027s unset\nconnection.\n\nAdd same check for handle upper bound as in hci_conn_set_handle() to\nprevent warning." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:01.361Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/4970e48f83dbd21d2a6a7cdaaafc2a71f7f45dc4" }, { "url": "https://git.kernel.org/stable/c/d311036696fed778301d08a71a4bef737b86d8c5" }, { "url": "https://git.kernel.org/stable/c/1cc18c2ab2e8c54c355ea7c0423a636e415a0c23" } ], "title": "bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42132", "datePublished": "2024-07-30T07:46:27.684Z", "dateReserved": "2024-07-29T15:50:41.186Z", "dateUpdated": "2024-11-05T09:38:01.361Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42091
Vulnerability from cvelistv5
Published
2024-07-29 17:35
Modified
2024-12-09 14:21
Severity ?
EPSS score ?
Summary
drm/xe: Check pat.ops before dumping PAT settings
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.261Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/583ce246c7ff9edeb0de49130cdc3d45db8545cb" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a918e771e6fbe1fa68932af5b0cdf473e23090cc" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42091", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:18:37.765217Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:00.959Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/xe/xe_pat.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "583ce246c7ff", "status": "affected", "version": "dd08ebf6c352", "versionType": "git" }, { "lessThan": "a918e771e6fb", "status": "affected", "version": "dd08ebf6c352", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/xe/xe_pat.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.8" }, { "lessThan": "6.8", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Check pat.ops before dumping PAT settings\n\nWe may leave pat.ops unset when running on brand new platform or\nwhen running as a VF. While the former is unlikely, the latter\nis valid (future) use case and will cause NPD when someone will\ntry to dump PAT settings by debugfs.\n\nIt\u0027s better to check pointer to pat.ops instead of specific .dump\nhook, as we have this hook always defined for every .ops variant." } ], "providerMetadata": { "dateUpdated": "2024-12-09T14:21:24.552Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/583ce246c7ff9edeb0de49130cdc3d45db8545cb" }, { "url": "https://git.kernel.org/stable/c/a918e771e6fbe1fa68932af5b0cdf473e23090cc" } ], "title": "drm/xe: Check pat.ops before dumping PAT settings", "x_generator": { "engine": "bippy-8e903de6a542" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42091", "datePublished": "2024-07-29T17:35:00.340Z", "dateReserved": "2024-07-29T15:50:41.172Z", "dateUpdated": "2024-12-09T14:21:24.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42137
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/215a26c2404fa34625c725d446967fa328a703eb" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4ca6013cd18e58ac1044908c40d4006a92093a11" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e6e200b264271f62a3fadb51ada9423015ece37b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e2d8aa4c763593704ac21e7591aed4f13e32f3b5" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/977b9dc65e14fb80de4763d949c7dec2ecb15b9b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/88e72239ead9814b886db54fc4ee39ef3c2b8f26" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42137", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:06.425192Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:35.827Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/bluetooth/hci_qca.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "215a26c2404f", "status": "affected", "version": "e84ec6e25df9", "versionType": "git" }, { "lessThan": "4ca6013cd18e", "status": "affected", "version": "908d1742b6e6", "versionType": "git" }, { "lessThan": "e6e200b26427", "status": "affected", "version": "ea3ebda47dd5", "versionType": "git" }, { "lessThan": "e2d8aa4c7635", "status": "affected", "version": "272970be3dab", "versionType": "git" }, { "lessThan": "977b9dc65e14", "status": "affected", "version": "272970be3dab", "versionType": "git" }, { "lessThan": "88e72239ead9", "status": "affected", "version": "272970be3dab", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/bluetooth/hci_qca.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.2" }, { "lessThan": "6.2", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot\n\nCommit 272970be3dab (\"Bluetooth: hci_qca: Fix driver shutdown on closed\nserdev\") will cause below regression issue:\n\nBT can\u0027t be enabled after below steps:\ncold boot -\u003e enable BT -\u003e disable BT -\u003e warm reboot -\u003e BT enable failure\nif property enable-gpios is not configured within DT|ACPI for QCA6390.\n\nThe commit is to fix a use-after-free issue within qca_serdev_shutdown()\nby adding condition to avoid the serdev is flushed or wrote after closed\nbut also introduces this regression issue regarding above steps since the\nVSC is not sent to reset controller during warm reboot.\n\nFixed by sending the VSC to reset controller within qca_serdev_shutdown()\nonce BT was ever enabled, and the use-after-free issue is also fixed by\nthis change since the serdev is still opened before it is flushed or wrote.\n\nVerified by the reported machine Dell XPS 13 9310 laptop over below two\nkernel commits:\ncommit e00fc2700a3f (\"Bluetooth: btusb: Fix triggering coredump\nimplementation for QCA\") of bluetooth-next tree.\ncommit b23d98d46d28 (\"Bluetooth: btusb: Fix triggering coredump\nimplementation for QCA\") of linus mainline tree." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:07.073Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/215a26c2404fa34625c725d446967fa328a703eb" }, { "url": "https://git.kernel.org/stable/c/4ca6013cd18e58ac1044908c40d4006a92093a11" }, { "url": "https://git.kernel.org/stable/c/e6e200b264271f62a3fadb51ada9423015ece37b" }, { "url": "https://git.kernel.org/stable/c/e2d8aa4c763593704ac21e7591aed4f13e32f3b5" }, { "url": "https://git.kernel.org/stable/c/977b9dc65e14fb80de4763d949c7dec2ecb15b9b" }, { "url": "https://git.kernel.org/stable/c/88e72239ead9814b886db54fc4ee39ef3c2b8f26" } ], "title": "Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42137", "datePublished": "2024-07-30T07:46:31.748Z", "dateReserved": "2024-07-29T15:50:41.188Z", "dateUpdated": "2024-11-05T09:38:07.073Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41082
Vulnerability from cvelistv5
Published
2024-07-29 15:04
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
nvme-fabrics: use reserved tag for reg read/write command
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.643Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/165da9c67a26f08c9b956c15d701da7690f45bcb" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7dc3bfcb4c9cc58970fff6aaa48172cb224d85aa" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41082", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:02.205379Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:09.536Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/nvme/host/fabrics.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "165da9c67a26", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "7dc3bfcb4c9c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/nvme/host/fabrics.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-fabrics: use reserved tag for reg read/write command\n\nIn some scenarios, if too many commands are issued by nvme command in\nthe same time by user tasks, this may exhaust all tags of admin_q. If\na reset (nvme reset or IO timeout) occurs before these commands finish,\nreconnect routine may fail to update nvme regs due to insufficient tags,\nwhich will cause kernel hang forever. In order to workaround this issue,\nmaybe we can let reg_read32()/reg_read64()/reg_write32() use reserved\ntags. This maybe safe for nvmf:\n\n1. For the disable ctrl path, we will not issue connect command\n2. For the enable ctrl / fw activate path, since connect and reg_xx()\n are called serially.\n\nSo the reserved tags may still be enough while reg_xx() use reserved tags." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:21.749Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/165da9c67a26f08c9b956c15d701da7690f45bcb" }, { "url": "https://git.kernel.org/stable/c/7dc3bfcb4c9cc58970fff6aaa48172cb224d85aa" } ], "title": "nvme-fabrics: use reserved tag for reg read/write command", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41082", "datePublished": "2024-07-29T15:04:19.372Z", "dateReserved": "2024-07-12T12:17:45.633Z", "dateUpdated": "2024-11-05T09:36:21.749Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42158
Vulnerability from cvelistv5
Published
2024-07-30 07:47
Modified
2024-12-02 08:32
Severity ?
EPSS score ?
Summary
s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.078Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/62151a0acde90823bdfa991d598c85cf4b1d387d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/22e6824622e8a8889df0f8fc4ed5aea0e702a694" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42158", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:02.030879Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:33.882Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/s390/crypto/pkey_api.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "62151a0acde9", "status": "affected", "version": "e80d4af0a320", "versionType": "git" }, { "lessThan": "22e6824622e8", "status": "affected", "version": "e80d4af0a320", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/s390/crypto/pkey_api.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.11" }, { "lessThan": "4.11", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/pkey: Use kfree_sensitive() to fix Coccinelle warnings\n\nReplace memzero_explicit() and kfree() with kfree_sensitive() to fix\nwarnings reported by Coccinelle:\n\nWARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1506)\nWARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1643)\nWARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1770)" } ], "providerMetadata": { "dateUpdated": "2024-12-02T08:32:40.046Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/62151a0acde90823bdfa991d598c85cf4b1d387d" }, { "url": "https://git.kernel.org/stable/c/22e6824622e8a8889df0f8fc4ed5aea0e702a694" } ], "title": "s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings", "x_generator": { "engine": "bippy-8e903de6a542" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42158", "datePublished": "2024-07-30T07:47:00.343Z", "dateReserved": "2024-07-29T15:50:41.195Z", "dateUpdated": "2024-12-02T08:32:40.046Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42130
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
nfc/nci: Add the inconsistency check between the input data length and count
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.159Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f07bcd8bba803c9e6ad2048543185d6c56587a2f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/41f5e2840cd0629f049ce5ce2f8dd10a8299de42" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/056478b4321b36ca33567089d39ac992f6c9c37a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/22a72c1c10f43ca645a98725e0faff34592f4d08" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/068648aab72c9ba7b0597354ef4d81ffaac7b979" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42130", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:28.692005Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:36.616Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/nfc/virtual_ncidev.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "f07bcd8bba80", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "41f5e2840cd0", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "056478b4321b", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "22a72c1c10f4", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "068648aab72c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/nfc/virtual_ncidev.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc/nci: Add the inconsistency check between the input data length and count\n\nwrite$nci(r0, \u0026(0x7f0000000740)=ANY=[@ANYBLOB=\"610501\"], 0xf)\n\nSyzbot constructed a write() call with a data length of 3 bytes but a count value\nof 15, which passed too little data to meet the basic requirements of the function\nnci_rf_intf_activated_ntf_packet().\n\nTherefore, increasing the comparison between data length and count value to avoid\nproblems caused by inconsistent data length and count." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:59.134Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/f07bcd8bba803c9e6ad2048543185d6c56587a2f" }, { "url": "https://git.kernel.org/stable/c/41f5e2840cd0629f049ce5ce2f8dd10a8299de42" }, { "url": "https://git.kernel.org/stable/c/056478b4321b36ca33567089d39ac992f6c9c37a" }, { "url": "https://git.kernel.org/stable/c/22a72c1c10f43ca645a98725e0faff34592f4d08" }, { "url": "https://git.kernel.org/stable/c/068648aab72c9ba7b0597354ef4d81ffaac7b979" } ], "title": "nfc/nci: Add the inconsistency check between the input data length and count", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42130", "datePublished": "2024-07-30T07:46:26.153Z", "dateReserved": "2024-07-29T15:50:41.186Z", "dateUpdated": "2024-11-05T09:37:59.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41037
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
ASoC: SOF: Intel: hda: fix null deref on system suspend entry
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.066Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8246bbf818ed7b8d5afc92b951e6d562b45c2450" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/993af0f2d9f24e3c18a445ae22b34190d1fcad61" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9065693dcc13f287b9e4991f43aee70cf5538fdd" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41037", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:23:26.833410Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:03.339Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "sound/soc/sof/intel/hda-dai.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "8246bbf818ed", "status": "affected", "version": "2b009fa0823c", "versionType": "git" }, { "lessThan": "993af0f2d9f2", "status": "affected", "version": "2b009fa0823c", "versionType": "git" }, { "lessThan": "9065693dcc13", "status": "affected", "version": "2b009fa0823c", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "sound/soc/sof/intel/hda-dai.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.4" }, { "lessThan": "6.4", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: Intel: hda: fix null deref on system suspend entry\n\nWhen system enters suspend with an active stream, SOF core\ncalls hw_params_upon_resume(). On Intel platforms with HDA DMA used\nto manage the link DMA, this leads to call chain of\n\n hda_dsp_set_hw_params_upon_resume()\n -\u003e hda_dsp_dais_suspend()\n -\u003e hda_dai_suspend()\n -\u003e hda_ipc4_post_trigger()\n\nA bug is hit in hda_dai_suspend() as hda_link_dma_cleanup() is run first,\nwhich clears hext_stream-\u003elink_substream, and then hda_ipc4_post_trigger()\nis called with a NULL snd_pcm_substream pointer." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:26.838Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/8246bbf818ed7b8d5afc92b951e6d562b45c2450" }, { "url": "https://git.kernel.org/stable/c/993af0f2d9f24e3c18a445ae22b34190d1fcad61" }, { "url": "https://git.kernel.org/stable/c/9065693dcc13f287b9e4991f43aee70cf5538fdd" } ], "title": "ASoC: SOF: Intel: hda: fix null deref on system suspend entry", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41037", "datePublished": "2024-07-29T14:31:51.501Z", "dateReserved": "2024-07-12T12:17:45.620Z", "dateUpdated": "2024-11-05T09:35:26.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41078
Vulnerability from cvelistv5
Published
2024-07-29 15:04
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
btrfs: qgroup: fix quota root leak after quota disable failure
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/94818bdb00ef34a996a06aa63d11f591074cb757" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8a69529f22590b67bb018de9acbcf94abc8603cf" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5ef3961682e5310f2221bae99bcf9f5d0f4b0d51" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f88aeff5a173e8ba3133314eb4b964236ef3589d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7dd6a5b96157a21245566b21fd58276a214357ff" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a7e4c6a3031c74078dba7fa36239d0f4fe476c53" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41078", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:14.829308Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:59.724Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/btrfs/qgroup.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "94818bdb00ef", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "8a69529f2259", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "5ef3961682e5", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "f88aeff5a173", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "7dd6a5b96157", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "a7e4c6a3031c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/btrfs/qgroup.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.223", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.164", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: qgroup: fix quota root leak after quota disable failure\n\nIf during the quota disable we fail when cleaning the quota tree or when\ndeleting the root from the root tree, we jump to the \u0027out\u0027 label without\never dropping the reference on the quota root, resulting in a leak of the\nroot since fs_info-\u003equota_root is no longer pointing to the root (we have\nset it to NULL just before those steps).\n\nFix this by always doing a btrfs_put_root() call under the \u0027out\u0027 label.\nThis is a problem that exists since qgroups were first added in 2012 by\ncommit bed92eae26cc (\"Btrfs: qgroup implementation and prototypes\"), but\nback then we missed a kfree on the quota root and free_extent_buffer()\ncalls on its root and commit root nodes, since back then roots were not\nyet reference counted." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:17.334Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/94818bdb00ef34a996a06aa63d11f591074cb757" }, { "url": "https://git.kernel.org/stable/c/8a69529f22590b67bb018de9acbcf94abc8603cf" }, { "url": "https://git.kernel.org/stable/c/5ef3961682e5310f2221bae99bcf9f5d0f4b0d51" }, { "url": "https://git.kernel.org/stable/c/f88aeff5a173e8ba3133314eb4b964236ef3589d" }, { "url": "https://git.kernel.org/stable/c/7dd6a5b96157a21245566b21fd58276a214357ff" }, { "url": "https://git.kernel.org/stable/c/a7e4c6a3031c74078dba7fa36239d0f4fe476c53" } ], "title": "btrfs: qgroup: fix quota root leak after quota disable failure", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41078", "datePublished": "2024-07-29T15:04:15.812Z", "dateReserved": "2024-07-12T12:17:45.632Z", "dateUpdated": "2024-11-05T09:36:17.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41048
Vulnerability from cvelistv5
Published
2024-07-29 14:32
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
skmsg: Skip zero length skb in sk_msg_recvmsg
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.622Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/195b7bcdfc5adc5b2468f279dd9eb7eebd2e7632" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/fb61d7b9fb6ef0032de469499a54dab4c7260d0d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b180739b45a38b4caa88fe16bb5273072e6613dc" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f8bd689f37f4198a4c61c4684f591ba639595b97" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f0c18025693707ec344a70b6887f7450bf4c826b" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41048", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:50.876207Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:02.036Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/core/skmsg.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "195b7bcdfc5a", "status": "affected", "version": "604326b41a6f", "versionType": "git" }, { "lessThan": "fb61d7b9fb6e", "status": "affected", "version": "604326b41a6f", "versionType": "git" }, { "lessThan": "b180739b45a3", "status": "affected", "version": "604326b41a6f", "versionType": "git" }, { "lessThan": "f8bd689f37f4", "status": "affected", "version": "604326b41a6f", "versionType": "git" }, { "lessThan": "f0c180256937", "status": "affected", "version": "604326b41a6f", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/core/skmsg.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.20" }, { "lessThan": "4.20", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nskmsg: Skip zero length skb in sk_msg_recvmsg\n\nWhen running BPF selftests (./test_progs -t sockmap_basic) on a Loongarch\nplatform, the following kernel panic occurs:\n\n [...]\n Oops[#1]:\n CPU: 22 PID: 2824 Comm: test_progs Tainted: G OE 6.10.0-rc2+ #18\n Hardware name: LOONGSON Dabieshan/Loongson-TC542F0, BIOS Loongson-UDK2018\n ... ...\n ra: 90000000048bf6c0 sk_msg_recvmsg+0x120/0x560\n ERA: 9000000004162774 copy_page_to_iter+0x74/0x1c0\n CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n PRMD: 0000000c (PPLV0 +PIE +PWE)\n EUEN: 00000007 (+FPE +SXE +ASXE -BTE)\n ECFG: 00071c1d (LIE=0,2-4,10-12 VS=7)\n ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)\n BADV: 0000000000000040\n PRID: 0014c011 (Loongson-64bit, Loongson-3C5000)\n Modules linked in: bpf_testmod(OE) xt_CHECKSUM xt_MASQUERADE xt_conntrack\n Process test_progs (pid: 2824, threadinfo=0000000000863a31, task=...)\n Stack : ...\n Call Trace:\n [\u003c9000000004162774\u003e] copy_page_to_iter+0x74/0x1c0\n [\u003c90000000048bf6c0\u003e] sk_msg_recvmsg+0x120/0x560\n [\u003c90000000049f2b90\u003e] tcp_bpf_recvmsg_parser+0x170/0x4e0\n [\u003c90000000049aae34\u003e] inet_recvmsg+0x54/0x100\n [\u003c900000000481ad5c\u003e] sock_recvmsg+0x7c/0xe0\n [\u003c900000000481e1a8\u003e] __sys_recvfrom+0x108/0x1c0\n [\u003c900000000481e27c\u003e] sys_recvfrom+0x1c/0x40\n [\u003c9000000004c076ec\u003e] do_syscall+0x8c/0xc0\n [\u003c9000000003731da4\u003e] handle_syscall+0xc4/0x160\n Code: ...\n ---[ end trace 0000000000000000 ]---\n Kernel panic - not syncing: Fatal exception\n Kernel relocated by 0x3510000\n .text @ 0x9000000003710000\n .data @ 0x9000000004d70000\n .bss @ 0x9000000006469400\n ---[ end Kernel panic - not syncing: Fatal exception ]---\n [...]\n\nThis crash happens every time when running sockmap_skb_verdict_shutdown\nsubtest in sockmap_basic.\n\nThis crash is because a NULL pointer is passed to page_address() in the\nsk_msg_recvmsg(). Due to the different implementations depending on the\narchitecture, page_address(NULL) will trigger a panic on Loongarch\nplatform but not on x86 platform. So this bug was hidden on x86 platform\nfor a while, but now it is exposed on Loongarch platform. The root cause\nis that a zero length skb (skb-\u003elen == 0) was put on the queue.\n\nThis zero length skb is a TCP FIN packet, which was sent by shutdown(),\ninvoked in test_sockmap_skb_verdict_shutdown():\n\n\tshutdown(p1, SHUT_WR);\n\nIn this case, in sk_psock_skb_ingress_enqueue(), num_sge is zero, and no\npage is put to this sge (see sg_set_page in sg_set_page), but this empty\nsge is queued into ingress_msg list.\n\nAnd in sk_msg_recvmsg(), this empty sge is used, and a NULL page is got by\nsg_page(sge). Pass this NULL page to copy_page_to_iter(), which passes it\nto kmap_local_page() and to page_address(), then kernel panics.\n\nTo solve this, we should skip this zero length skb. So in sk_msg_recvmsg(),\nif copy is zero, that means it\u0027s a zero length skb, skip invoking\ncopy_page_to_iter(). We are using the EFAULT return triggered by\ncopy_page_to_iter to check for is_fin in tcp_bpf.c." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:39.160Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/195b7bcdfc5adc5b2468f279dd9eb7eebd2e7632" }, { "url": "https://git.kernel.org/stable/c/fb61d7b9fb6ef0032de469499a54dab4c7260d0d" }, { "url": "https://git.kernel.org/stable/c/b180739b45a38b4caa88fe16bb5273072e6613dc" }, { "url": "https://git.kernel.org/stable/c/f8bd689f37f4198a4c61c4684f591ba639595b97" }, { "url": "https://git.kernel.org/stable/c/f0c18025693707ec344a70b6887f7450bf4c826b" } ], "title": "skmsg: Skip zero length skb in sk_msg_recvmsg", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41048", "datePublished": "2024-07-29T14:32:05.224Z", "dateReserved": "2024-07-12T12:17:45.625Z", "dateUpdated": "2024-11-05T09:35:39.160Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41076
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
NFSv4: Fix memory leak in nfs4_set_security_label
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.384Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/899604a7c958771840941caff9ee3dd8193d984c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b98090699319e64f5de1e8db5bb75870f1eb1c6e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d130220ccc94d74d70da984a199477937e7bf03c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/aad11473f8f4be3df86461081ce35ec5b145ba68" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41076", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:21.046974Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:59.952Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/nfs/nfs4proc.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "899604a7c958", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "b98090699319", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "d130220ccc94", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "aad11473f8f4", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/nfs/nfs4proc.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4: Fix memory leak in nfs4_set_security_label\n\nWe leak nfs_fattr and nfs4_label every time we set a security xattr." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:15.132Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/899604a7c958771840941caff9ee3dd8193d984c" }, { "url": "https://git.kernel.org/stable/c/b98090699319e64f5de1e8db5bb75870f1eb1c6e" }, { "url": "https://git.kernel.org/stable/c/d130220ccc94d74d70da984a199477937e7bf03c" }, { "url": "https://git.kernel.org/stable/c/aad11473f8f4be3df86461081ce35ec5b145ba68" } ], "title": "NFSv4: Fix memory leak in nfs4_set_security_label", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41076", "datePublished": "2024-07-29T14:57:35.807Z", "dateReserved": "2024-07-12T12:17:45.632Z", "dateUpdated": "2024-11-05T09:36:15.132Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41026
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
mmc: davinci_mmc: Prevent transmitted data size from exceeding sgm's length
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.171Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c561c4ecce712f94b442db5960e281f13b28df2e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/16198eef11c1929374381d7f6271b4bf6aa44615" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41026", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:24:09.083090Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:04.488Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/mmc/host/davinci_mmc.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "c561c4ecce71", "status": "affected", "version": "ed01d210fd91", "versionType": "git" }, { "lessThan": "16198eef11c1", "status": "affected", "version": "ed01d210fd91", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/mmc/host/davinci_mmc.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.9" }, { "lessThan": "6.9", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: davinci_mmc: Prevent transmitted data size from exceeding sgm\u0027s length\n\nNo check is done on the size of the data to be transmiited. This causes\na kernel panic when this size exceeds the sg_miter\u0027s length.\n\nLimit the number of transmitted bytes to sgm-\u003elength." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:14.322Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/c561c4ecce712f94b442db5960e281f13b28df2e" }, { "url": "https://git.kernel.org/stable/c/16198eef11c1929374381d7f6271b4bf6aa44615" } ], "title": "mmc: davinci_mmc: Prevent transmitted data size from exceeding sgm\u0027s length", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41026", "datePublished": "2024-07-29T14:31:43.056Z", "dateReserved": "2024-07-12T12:17:45.616Z", "dateUpdated": "2024-11-05T09:35:14.322Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42162
Vulnerability from cvelistv5
Published
2024-07-30 07:47
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
gve: Account for stopped queues when reading NIC stats
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.609Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/32675d828c8a392e20d5b42375ed112c407e4b62" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/af9bcf910b1f86244f39e15e701b2dc564b469a6" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42162", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:14:49.244034Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:07.261Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/google/gve/gve_ethtool.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "32675d828c8a", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "af9bcf910b1f", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/google/gve/gve_ethtool.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: Account for stopped queues when reading NIC stats\n\nWe now account for the fact that the NIC might send us stats for a\nsubset of queues. Without this change, gve_get_ethtool_stats might make\nan invalid access on the priv-\u003estats_report-\u003estats array." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:33.882Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/32675d828c8a392e20d5b42375ed112c407e4b62" }, { "url": "https://git.kernel.org/stable/c/af9bcf910b1f86244f39e15e701b2dc564b469a6" } ], "title": "gve: Account for stopped queues when reading NIC stats", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42162", "datePublished": "2024-07-30T07:47:04.050Z", "dateReserved": "2024-07-29T15:50:41.197Z", "dateUpdated": "2024-11-05T09:38:33.882Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41074
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
cachefiles: Set object to close if ondemand_id < 0 in copen
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.484Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/703bea37d13e4ccdafd17ae7c4cb583752ba7663" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c32ee78fbc670e6f90989a45d340748e34cad333" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0845c553db11c84ff53fccd59da11b6d6ece4a60" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4f8703fb3482f92edcfd31661857b16fec89c2c0" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41074", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:27.454112Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:00.299Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/cachefiles/ondemand.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "703bea37d13e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "c32ee78fbc67", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "0845c553db11", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "4f8703fb3482", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/cachefiles/ondemand.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: Set object to close if ondemand_id \u003c 0 in copen\n\nIf copen is maliciously called in the user mode, it may delete the request\ncorresponding to the random id. And the request may have not been read yet.\n\nNote that when the object is set to reopen, the open request will be done\nwith the still reopen state in above case. As a result, the request\ncorresponding to this object is always skipped in select_req function, so\nthe read request is never completed and blocks other process.\n\nFix this issue by simply set object to close if its id \u003c 0 in copen." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:12.809Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/703bea37d13e4ccdafd17ae7c4cb583752ba7663" }, { "url": "https://git.kernel.org/stable/c/c32ee78fbc670e6f90989a45d340748e34cad333" }, { "url": "https://git.kernel.org/stable/c/0845c553db11c84ff53fccd59da11b6d6ece4a60" }, { "url": "https://git.kernel.org/stable/c/4f8703fb3482f92edcfd31661857b16fec89c2c0" } ], "title": "cachefiles: Set object to close if ondemand_id \u003c 0 in copen", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41074", "datePublished": "2024-07-29T14:57:33.976Z", "dateReserved": "2024-07-12T12:17:45.631Z", "dateUpdated": "2024-11-05T09:36:12.809Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42093
Vulnerability from cvelistv5
Published
2024-07-29 17:39
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
net/dpaa2: Avoid explicit cpumask var allocation on stack
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.468Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b2262b3be27cee334a2fa175ae3afb53f38fb0b1" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/763896ab62a672d728f5eb10ac90d98c607a8509" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a55afc0f5f20ba30970aaf7271929dc00eee5e7d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/48147337d7efdea6ad6e49f5b8eb894b95868ef0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/69f49527aea12c23b78fb3d0a421950bf44fb4e2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5e4f25091e6d06e99a23f724c839a58a8776a527" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d33fe1714a44ff540629b149d8fab4ac6967585c" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42093", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:18:31.047930Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:00.736Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/freescale/dpaa2/dpaa2-eth.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "b2262b3be27c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "763896ab62a6", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "a55afc0f5f20", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "48147337d7ef", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "69f49527aea1", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "5e4f25091e6d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "d33fe1714a44", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/freescale/dpaa2/dpaa2-eth.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.279", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/dpaa2: Avoid explicit cpumask var allocation on stack\n\nFor CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask\nvariable on stack is not recommended since it can cause potential stack\noverflow.\n\nInstead, kernel code should always use *cpumask_var API(s) to allocate\ncpumask var in config-neutral way, leaving allocation strategy to\nCONFIG_CPUMASK_OFFSTACK.\n\nUse *cpumask_var API(s) to address it." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:16.305Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/b2262b3be27cee334a2fa175ae3afb53f38fb0b1" }, { "url": "https://git.kernel.org/stable/c/763896ab62a672d728f5eb10ac90d98c607a8509" }, { "url": "https://git.kernel.org/stable/c/a55afc0f5f20ba30970aaf7271929dc00eee5e7d" }, { "url": "https://git.kernel.org/stable/c/48147337d7efdea6ad6e49f5b8eb894b95868ef0" }, { "url": "https://git.kernel.org/stable/c/69f49527aea12c23b78fb3d0a421950bf44fb4e2" }, { "url": "https://git.kernel.org/stable/c/5e4f25091e6d06e99a23f724c839a58a8776a527" }, { "url": "https://git.kernel.org/stable/c/d33fe1714a44ff540629b149d8fab4ac6967585c" } ], "title": "net/dpaa2: Avoid explicit cpumask var allocation on stack", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42093", "datePublished": "2024-07-29T17:39:29.470Z", "dateReserved": "2024-07-29T15:50:41.172Z", "dateUpdated": "2024-11-05T09:37:16.305Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41079
Vulnerability from cvelistv5
Published
2024-07-29 15:04
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
nvmet: always initialize cqe.result
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/30d35b24b7957922f81cfdaa66f2e1b1e9b9aed2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/10967873b80742261527a071954be8b54f0f8e4d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0990e8a863645496b9e3f91cfcfd63cd95c80319" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/cd0c1b8e045a8d2785342b385cb2684d9b48e426" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41079", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:11.653239Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:59.600Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/nvme/target/core.c", "drivers/nvme/target/fabrics-cmd-auth.c", "drivers/nvme/target/fabrics-cmd.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "30d35b24b795", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "10967873b807", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "0990e8a86364", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "cd0c1b8e045a", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/nvme/target/core.c", "drivers/nvme/target/fabrics-cmd-auth.c", "drivers/nvme/target/fabrics-cmd.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: always initialize cqe.result\n\nThe spec doesn\u0027t mandate that the first two double words (aka results)\nfor the command queue entry need to be set to 0 when they are not\nused (not specified). Though, the target implemention returns 0 for TCP\nand FC but not for RDMA.\n\nLet\u0027s make RDMA behave the same and thus explicitly initializing the\nresult field. This prevents leaking any data from the stack." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:18.430Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/30d35b24b7957922f81cfdaa66f2e1b1e9b9aed2" }, { "url": "https://git.kernel.org/stable/c/10967873b80742261527a071954be8b54f0f8e4d" }, { "url": "https://git.kernel.org/stable/c/0990e8a863645496b9e3f91cfcfd63cd95c80319" }, { "url": "https://git.kernel.org/stable/c/cd0c1b8e045a8d2785342b385cb2684d9b48e426" } ], "title": "nvmet: always initialize cqe.result", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41079", "datePublished": "2024-07-29T15:04:16.733Z", "dateReserved": "2024-07-12T12:17:45.632Z", "dateUpdated": "2024-11-05T09:36:18.430Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42077
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
ocfs2: fix DIO failure due to insufficient transaction credits
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a68b896aa56e435506453ec8835bc991ec3ae687" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/320273b5649bbcee87f9e65343077189699d2a7a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9ea2d1c6789722d58ec191f14f9a02518d55b6b4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c05ffb693bfb42a48ef3ee88a55b57392984e111" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/331d1079d58206ff7dc5518185f800b412f89bc6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/be346c1a6eeb49d8fda827d2a9522124c2f72f36" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42077", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:23.681677Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:57.349Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/ocfs2/aops.c", "fs/ocfs2/journal.c", "fs/ocfs2/journal.h", "fs/ocfs2/ocfs2_trace.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "a68b896aa56e", "status": "affected", "version": "c15471f79506", "versionType": "git" }, { "lessThan": "320273b5649b", "status": "affected", "version": "c15471f79506", "versionType": "git" }, { "lessThan": "9ea2d1c67897", "status": "affected", "version": "c15471f79506", "versionType": "git" }, { "lessThan": "c05ffb693bfb", "status": "affected", "version": "c15471f79506", "versionType": "git" }, { "lessThan": "331d1079d582", "status": "affected", "version": "c15471f79506", "versionType": "git" }, { "lessThan": "be346c1a6eeb", "status": "affected", "version": "c15471f79506", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/ocfs2/aops.c", "fs/ocfs2/journal.c", "fs/ocfs2/journal.h", "fs/ocfs2/ocfs2_trace.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.6" }, { "lessThan": "4.6", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix DIO failure due to insufficient transaction credits\n\nThe code in ocfs2_dio_end_io_write() estimates number of necessary\ntransaction credits using ocfs2_calc_extend_credits(). This however does\nnot take into account that the IO could be arbitrarily large and can\ncontain arbitrary number of extents.\n\nExtent tree manipulations do often extend the current transaction but not\nin all of the cases. For example if we have only single block extents in\nthe tree, ocfs2_mark_extent_written() will end up calling\nocfs2_replace_extent_rec() all the time and we will never extend the\ncurrent transaction and eventually exhaust all the transaction credits if\nthe IO contains many single block extents. Once that happens a\nWARN_ON(jbd2_handle_buffer_credits(handle) \u003c= 0) is triggered in\njbd2_journal_dirty_metadata() and subsequently OCFS2 aborts in response to\nthis error. This was actually triggered by one of our customers on a\nheavily fragmented OCFS2 filesystem.\n\nTo fix the issue make sure the transaction always has enough credits for\none extent insert before each call of ocfs2_mark_extent_written().\n\nHeming Zhao said:\n\n------\nPANIC: \"Kernel panic - not syncing: OCFS2: (device dm-1): panic forced after error\"\n\nPID: xxx TASK: xxxx CPU: 5 COMMAND: \"SubmitThread-CA\"\n #0 machine_kexec at ffffffff8c069932\n #1 __crash_kexec at ffffffff8c1338fa\n #2 panic at ffffffff8c1d69b9\n #3 ocfs2_handle_error at ffffffffc0c86c0c [ocfs2]\n #4 __ocfs2_abort at ffffffffc0c88387 [ocfs2]\n #5 ocfs2_journal_dirty at ffffffffc0c51e98 [ocfs2]\n #6 ocfs2_split_extent at ffffffffc0c27ea3 [ocfs2]\n #7 ocfs2_change_extent_flag at ffffffffc0c28053 [ocfs2]\n #8 ocfs2_mark_extent_written at ffffffffc0c28347 [ocfs2]\n #9 ocfs2_dio_end_io_write at ffffffffc0c2bef9 [ocfs2]\n#10 ocfs2_dio_end_io at ffffffffc0c2c0f5 [ocfs2]\n#11 dio_complete at ffffffff8c2b9fa7\n#12 do_blockdev_direct_IO at ffffffff8c2bc09f\n#13 ocfs2_direct_IO at ffffffffc0c2b653 [ocfs2]\n#14 generic_file_direct_write at ffffffff8c1dcf14\n#15 __generic_file_write_iter at ffffffff8c1dd07b\n#16 ocfs2_file_write_iter at ffffffffc0c49f1f [ocfs2]\n#17 aio_write at ffffffff8c2cc72e\n#18 kmem_cache_alloc at ffffffff8c248dde\n#19 do_io_submit at ffffffff8c2ccada\n#20 do_syscall_64 at ffffffff8c004984\n#21 entry_SYSCALL_64_after_hwframe at ffffffff8c8000ba" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:57.431Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/a68b896aa56e435506453ec8835bc991ec3ae687" }, { "url": "https://git.kernel.org/stable/c/320273b5649bbcee87f9e65343077189699d2a7a" }, { "url": "https://git.kernel.org/stable/c/9ea2d1c6789722d58ec191f14f9a02518d55b6b4" }, { "url": "https://git.kernel.org/stable/c/c05ffb693bfb42a48ef3ee88a55b57392984e111" }, { "url": "https://git.kernel.org/stable/c/331d1079d58206ff7dc5518185f800b412f89bc6" }, { "url": "https://git.kernel.org/stable/c/be346c1a6eeb49d8fda827d2a9522124c2f72f36" } ], "title": "ocfs2: fix DIO failure due to insufficient transaction credits", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42077", "datePublished": "2024-07-29T15:52:39.661Z", "dateReserved": "2024-07-29T15:50:41.169Z", "dateUpdated": "2024-11-05T09:36:57.431Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42078
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
nfsd: initialise nfsd_info.mutex early.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.944Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7e8b94045bc77ce4f085ddfb9eb04e5760e66169" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e0011bca603c101f2a3c007bdb77f7006fa78fb1" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42078", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:20.354975Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:57.225Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/nfsd/nfsctl.c", "fs/nfsd/nfssvc.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "7e8b94045bc7", "status": "affected", "version": "7b207ccd9833", "versionType": "git" }, { "lessThan": "e0011bca603c", "status": "affected", "version": "7b207ccd9833", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/nfsd/nfsctl.c", "fs/nfsd/nfssvc.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.8" }, { "lessThan": "6.8", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: initialise nfsd_info.mutex early.\n\nnfsd_info.mutex can be dereferenced by svc_pool_stats_start()\nimmediately after the new netns is created. Currently this can\ntrigger an oops.\n\nMove the initialisation earlier before it can possibly be dereferenced." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:58.635Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/7e8b94045bc77ce4f085ddfb9eb04e5760e66169" }, { "url": "https://git.kernel.org/stable/c/e0011bca603c101f2a3c007bdb77f7006fa78fb1" } ], "title": "nfsd: initialise nfsd_info.mutex early.", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42078", "datePublished": "2024-07-29T15:52:40.632Z", "dateReserved": "2024-07-29T15:50:41.169Z", "dateUpdated": "2024-11-05T09:36:58.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42101
Vulnerability from cvelistv5
Published
2024-07-30 07:45
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.566Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9baf60323efa992b7c915094529f0a1882c34e7e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e36364f5f3785d054a94e57e971385284886d41a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/274cba8d2d1b48c72d8bd90e76c9e2dc1aa0a81d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f48dd3f19614022f2e1b794fbd169d2b4c398c07" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1f32535238493008587a8c5cb17eb2ca097592ef" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/744b229f09134ccd091427a6f9ea6d97302cfdd9" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7db5411c5d0bd9c29b8c2ad93c36b5c16ea46c9e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/80bec6825b19d95ccdfd3393cf8ec15ff2a749b4" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42101", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:18:02.587669Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:59.551Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/nouveau/nouveau_connector.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "9baf60323efa", "status": "affected", "version": "6ee738610f41", "versionType": "git" }, { "lessThan": "e36364f5f378", "status": "affected", "version": "6ee738610f41", "versionType": "git" }, { "lessThan": "274cba8d2d1b", "status": "affected", "version": "6ee738610f41", "versionType": "git" }, { "lessThan": "f48dd3f19614", "status": "affected", "version": "6ee738610f41", "versionType": "git" }, { "lessThan": "1f3253523849", "status": "affected", "version": "6ee738610f41", "versionType": "git" }, { "lessThan": "744b229f0913", "status": "affected", "version": "6ee738610f41", "versionType": "git" }, { "lessThan": "7db5411c5d0b", "status": "affected", "version": "6ee738610f41", "versionType": "git" }, { "lessThan": "80bec6825b19", "status": "affected", "version": "6ee738610f41", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/nouveau/nouveau_connector.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "2.6.33" }, { "lessThan": "2.6.33", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau: fix null pointer dereference in nouveau_connector_get_modes\n\nIn nouveau_connector_get_modes(), the return value of drm_mode_duplicate()\nis assigned to mode, which will lead to a possible NULL pointer\ndereference on failure of drm_mode_duplicate(). Add a check to avoid npd." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:25.447Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/9baf60323efa992b7c915094529f0a1882c34e7e" }, { "url": "https://git.kernel.org/stable/c/e36364f5f3785d054a94e57e971385284886d41a" }, { "url": "https://git.kernel.org/stable/c/274cba8d2d1b48c72d8bd90e76c9e2dc1aa0a81d" }, { "url": "https://git.kernel.org/stable/c/f48dd3f19614022f2e1b794fbd169d2b4c398c07" }, { "url": "https://git.kernel.org/stable/c/1f32535238493008587a8c5cb17eb2ca097592ef" }, { "url": "https://git.kernel.org/stable/c/744b229f09134ccd091427a6f9ea6d97302cfdd9" }, { "url": "https://git.kernel.org/stable/c/7db5411c5d0bd9c29b8c2ad93c36b5c16ea46c9e" }, { "url": "https://git.kernel.org/stable/c/80bec6825b19d95ccdfd3393cf8ec15ff2a749b4" } ], "title": "drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42101", "datePublished": "2024-07-30T07:45:57.384Z", "dateReserved": "2024-07-29T15:50:41.173Z", "dateUpdated": "2024-11-05T09:37:25.447Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42129
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-12-02 07:59
Severity ?
EPSS score ?
Summary
leds: mlxreg: Use devm_mutex_init() for mutex initialization
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.248Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3b62888307ae44b68512d3f7735c26a4c8e45b51" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/efc347b9efee1c2b081f5281d33be4559fa50a16" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42129", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:31.842142Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:36.739Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/leds/leds-mlxreg.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "172ffd26a5af", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "3b62888307ae", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "efc347b9efee", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/leds/leds-mlxreg.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.63", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nleds: mlxreg: Use devm_mutex_init() for mutex initialization\n\nIn this driver LEDs are registered using devm_led_classdev_register()\nso they are automatically unregistered after module\u0027s remove() is done.\nled_classdev_unregister() calls module\u0027s led_set_brightness() to turn off\nthe LEDs and that callback uses mutex which was destroyed already\nin module\u0027s remove() so use devm API instead." } ], "providerMetadata": { "dateUpdated": "2024-12-02T07:59:32.092Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/172ffd26a5af13e951d0e82df7cfc5a95b04fa80" }, { "url": "https://git.kernel.org/stable/c/3b62888307ae44b68512d3f7735c26a4c8e45b51" }, { "url": "https://git.kernel.org/stable/c/efc347b9efee1c2b081f5281d33be4559fa50a16" } ], "title": "leds: mlxreg: Use devm_mutex_init() for mutex initialization", "x_generator": { "engine": "bippy-8e903de6a542" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42129", "datePublished": "2024-07-30T07:46:25.436Z", "dateReserved": "2024-07-29T15:50:41.185Z", "dateUpdated": "2024-12-02T07:59:32.092Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42143
Vulnerability from cvelistv5
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Show details on NVD website{ "containers": { "cna": { "providerMetadata": { "dateUpdated": "2024-08-22T00:01:12.570Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "rejectedReasons": [ { "lang": "en", "value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42143", "datePublished": "2024-07-30T07:46:36.904Z", "dateRejected": "2024-08-22T00:01:12.570Z", "dateReserved": "2024-07-29T15:50:41.190Z", "dateUpdated": "2024-08-22T00:01:12.570Z", "state": "REJECTED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42123
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
drm/amdgpu: fix double free err_addr pointer warnings
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.545Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8e24beb3c2b08a4763f920399a9cc577ed440a1a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/506c245f3f1cd989cb89811a7f06e04ff8813a0d" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42123", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:50.921873Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:04.953Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/amdgpu/amdgpu_umc.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "8e24beb3c2b0", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "506c245f3f1c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/amdgpu/amdgpu_umc.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix double free err_addr pointer warnings\n\nIn amdgpu_umc_bad_page_polling_timeout, the amdgpu_umc_handle_bad_pages\nwill be run many times so that double free err_addr in some special case.\nSo set the err_addr to NULL to avoid the warnings." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:51.315Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/8e24beb3c2b08a4763f920399a9cc577ed440a1a" }, { "url": "https://git.kernel.org/stable/c/506c245f3f1cd989cb89811a7f06e04ff8813a0d" } ], "title": "drm/amdgpu: fix double free err_addr pointer warnings", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42123", "datePublished": "2024-07-30T07:46:15.130Z", "dateReserved": "2024-07-29T15:50:41.179Z", "dateUpdated": "2024-11-05T09:37:51.315Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41050
Vulnerability from cvelistv5
Published
2024-07-29 14:32
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
cachefiles: cyclic allocation of msg_id to avoid reuse
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/35710c6c4a1c64478ec1b5e0e81d386c0844dec6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/de045a82e1a4e04be62718d3c2981a55150765a0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9d3bf4e9aa23f0d9e99ebe7a94f232ddba54ee17" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/19f4f399091478c95947f6bd7ad61622300c30d9" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41050", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:44.765096Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:57.925Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/cachefiles/internal.h", "fs/cachefiles/ondemand.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "35710c6c4a1c", "status": "affected", "version": "c8383054506c", "versionType": "git" }, { "lessThan": "de045a82e1a4", "status": "affected", "version": "c8383054506c", "versionType": "git" }, { "lessThan": "9d3bf4e9aa23", "status": "affected", "version": "c8383054506c", "versionType": "git" }, { "lessThan": "19f4f3990914", "status": "affected", "version": "c8383054506c", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/cachefiles/internal.h", "fs/cachefiles/ondemand.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.19" }, { "lessThan": "5.19", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: cyclic allocation of msg_id to avoid reuse\n\nReusing the msg_id after a maliciously completed reopen request may cause\na read request to remain unprocessed and result in a hung, as shown below:\n\n t1 | t2 | t3\n-------------------------------------------------\ncachefiles_ondemand_select_req\n cachefiles_ondemand_object_is_close(A)\n cachefiles_ondemand_set_object_reopening(A)\n queue_work(fscache_object_wq, \u0026info-\u003ework)\n ondemand_object_worker\n cachefiles_ondemand_init_object(A)\n cachefiles_ondemand_send_req(OPEN)\n // get msg_id 6\n wait_for_completion(\u0026req_A-\u003edone)\ncachefiles_ondemand_daemon_read\n // read msg_id 6 req_A\n cachefiles_ondemand_get_fd\n copy_to_user\n // Malicious completion msg_id 6\n copen 6,-1\n cachefiles_ondemand_copen\n complete(\u0026req_A-\u003edone)\n // will not set the object to close\n // because ondemand_id \u0026\u0026 fd is valid.\n\n // ondemand_object_worker() is done\n // but the object is still reopening.\n\n // new open req_B\n cachefiles_ondemand_init_object(B)\n cachefiles_ondemand_send_req(OPEN)\n // reuse msg_id 6\nprocess_open_req\n copen 6,A.size\n // The expected failed copen was executed successfully\n\nExpect copen to fail, and when it does, it closes fd, which sets the\nobject to close, and then close triggers reopen again. However, due to\nmsg_id reuse resulting in a successful copen, the anonymous fd is not\nclosed until the daemon exits. Therefore read requests waiting for reopen\nto complete may trigger hung task.\n\nTo avoid this issue, allocate the msg_id cyclically to avoid reusing the\nmsg_id for a very short duration of time." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:41.468Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/35710c6c4a1c64478ec1b5e0e81d386c0844dec6" }, { "url": "https://git.kernel.org/stable/c/de045a82e1a4e04be62718d3c2981a55150765a0" }, { "url": "https://git.kernel.org/stable/c/9d3bf4e9aa23f0d9e99ebe7a94f232ddba54ee17" }, { "url": "https://git.kernel.org/stable/c/19f4f399091478c95947f6bd7ad61622300c30d9" } ], "title": "cachefiles: cyclic allocation of msg_id to avoid reuse", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41050", "datePublished": "2024-07-29T14:32:06.761Z", "dateReserved": "2024-07-12T12:17:45.626Z", "dateUpdated": "2024-11-05T09:35:41.468Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42086
Vulnerability from cvelistv5
Published
2024-07-29 16:26
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
iio: chemical: bme680: Fix overflows in compensate() functions
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6fa31bbe2ea8665ee970258eb8320cbf231dbe9e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b0af334616ed425024bf220adda0f004806b5feb" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c326551e99f5416986074ce78bef94f6a404b517" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7a13d1357658d3a3c1cd7b3b9543c805a6e5e6e9" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ba1bb3e2a38a7fef1c1818dd4f2d9abbfdde553a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b5967393d50e3c6e632efda3ea3fdde14c1bfd0e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3add41bbda92938e9a528d74659dfc552796be4e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/fdd478c3ae98c3f13628e110dce9b6cfb0d9b3c8" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42086", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:18:54.149750Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:56.982Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/iio/chemical/bme680_core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "6fa31bbe2ea8", "status": "affected", "version": "1b3bd8592780", "versionType": "git" }, { "lessThan": "b0af334616ed", "status": "affected", "version": "1b3bd8592780", "versionType": "git" }, { "lessThan": "c326551e99f5", "status": "affected", "version": "1b3bd8592780", "versionType": "git" }, { "lessThan": "7a13d1357658", "status": "affected", "version": "1b3bd8592780", "versionType": "git" }, { "lessThan": "ba1bb3e2a38a", "status": "affected", "version": "1b3bd8592780", "versionType": "git" }, { "lessThan": "b5967393d50e", "status": "affected", "version": "1b3bd8592780", "versionType": "git" }, { "lessThan": "3add41bbda92", "status": "affected", "version": "1b3bd8592780", "versionType": "git" }, { "lessThan": "fdd478c3ae98", "status": "affected", "version": "1b3bd8592780", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/iio/chemical/bme680_core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.19" }, { "lessThan": "4.19", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.317", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.279", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: chemical: bme680: Fix overflows in compensate() functions\n\nThere are cases in the compensate functions of the driver that\nthere could be overflows of variables due to bit shifting ops.\nThese implications were initially discussed here [1] and they\nwere mentioned in log message of Commit 1b3bd8592780 (\"iio:\nchemical: Add support for Bosch BME680 sensor\").\n\n[1]: https://lore.kernel.org/linux-iio/20180728114028.3c1bbe81@archlinux/" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:07.958Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/6fa31bbe2ea8665ee970258eb8320cbf231dbe9e" }, { "url": "https://git.kernel.org/stable/c/b0af334616ed425024bf220adda0f004806b5feb" }, { "url": "https://git.kernel.org/stable/c/c326551e99f5416986074ce78bef94f6a404b517" }, { "url": "https://git.kernel.org/stable/c/7a13d1357658d3a3c1cd7b3b9543c805a6e5e6e9" }, { "url": "https://git.kernel.org/stable/c/ba1bb3e2a38a7fef1c1818dd4f2d9abbfdde553a" }, { "url": "https://git.kernel.org/stable/c/b5967393d50e3c6e632efda3ea3fdde14c1bfd0e" }, { "url": "https://git.kernel.org/stable/c/3add41bbda92938e9a528d74659dfc552796be4e" }, { "url": "https://git.kernel.org/stable/c/fdd478c3ae98c3f13628e110dce9b6cfb0d9b3c8" } ], "title": "iio: chemical: bme680: Fix overflows in compensate() functions", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42086", "datePublished": "2024-07-29T16:26:27.075Z", "dateReserved": "2024-07-29T15:50:41.170Z", "dateUpdated": "2024-11-05T09:37:07.958Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41087
Vulnerability from cvelistv5
Published
2024-07-29 15:48
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
ata: libata-core: Fix double free on error
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.364Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/290073b2b557e4dc21ee74a1e403d9ae79e393a2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/56f1c7e290cd6c69c948fcd2e2a49e6a637ec38f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/010de9acbea58fbcbda08e3793d6262086a493fe" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5dde5f8b790274723640d29a07c5a97d57d62047" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/702c1edbafb2e6f9d20f6d391273b5be09d366a5" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/062e256516d7db5e7dcdef117f52025cd5c456e3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8106da4d88bbaed809e023cc8014b766223d6e76" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ab9e0c529eb7cafebdd31fe1644524e80a48b05d" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41087", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:45.691103Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:58.682Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/ata/libata-core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "290073b2b557", "status": "affected", "version": "dafd6c496381", "versionType": "git" }, { "lessThan": "56f1c7e290cd", "status": "affected", "version": "dafd6c496381", "versionType": "git" }, { "lessThan": "010de9acbea5", "status": "affected", "version": "dafd6c496381", "versionType": "git" }, { "lessThan": "5dde5f8b7902", "status": "affected", "version": "dafd6c496381", "versionType": "git" }, { "lessThan": "702c1edbafb2", "status": "affected", "version": "dafd6c496381", "versionType": "git" }, { "lessThan": "062e256516d7", "status": "affected", "version": "dafd6c496381", "versionType": "git" }, { "lessThan": "8106da4d88bb", "status": "affected", "version": "dafd6c496381", "versionType": "git" }, { "lessThan": "ab9e0c529eb7", "status": "affected", "version": "dafd6c496381", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/ata/libata-core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.17" }, { "lessThan": "4.17", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.317", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.279", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nata: libata-core: Fix double free on error\n\nIf e.g. the ata_port_alloc() call in ata_host_alloc() fails, we will jump\nto the err_out label, which will call devres_release_group().\ndevres_release_group() will trigger a call to ata_host_release().\nata_host_release() calls kfree(host), so executing the kfree(host) in\nata_host_alloc() will lead to a double free:\n\nkernel BUG at mm/slub.c:553!\nOops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 11 PID: 599 Comm: (udev-worker) Not tainted 6.10.0-rc5 #47\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014\nRIP: 0010:kfree+0x2cf/0x2f0\nCode: 5d 41 5e 41 5f 5d e9 80 d6 ff ff 4d 89 f1 41 b8 01 00 00 00 48 89 d9 48 89 da\nRSP: 0018:ffffc90000f377f0 EFLAGS: 00010246\nRAX: ffff888112b1f2c0 RBX: ffff888112b1f2c0 RCX: ffff888112b1f320\nRDX: 000000000000400b RSI: ffffffffc02c9de5 RDI: ffff888112b1f2c0\nRBP: ffffc90000f37830 R08: 0000000000000000 R09: 0000000000000000\nR10: ffffc90000f37610 R11: 617461203a736b6e R12: ffffea00044ac780\nR13: ffff888100046400 R14: ffffffffc02c9de5 R15: 0000000000000006\nFS: 00007f2f1cabe980(0000) GS:ffff88813b380000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f2f1c3acf75 CR3: 0000000111724000 CR4: 0000000000750ef0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? __die_body.cold+0x19/0x27\n ? die+0x2e/0x50\n ? do_trap+0xca/0x110\n ? do_error_trap+0x6a/0x90\n ? kfree+0x2cf/0x2f0\n ? exc_invalid_op+0x50/0x70\n ? kfree+0x2cf/0x2f0\n ? asm_exc_invalid_op+0x1a/0x20\n ? ata_host_alloc+0xf5/0x120 [libata]\n ? ata_host_alloc+0xf5/0x120 [libata]\n ? kfree+0x2cf/0x2f0\n ata_host_alloc+0xf5/0x120 [libata]\n ata_host_alloc_pinfo+0x14/0xa0 [libata]\n ahci_init_one+0x6c9/0xd20 [ahci]\n\nEnsure that we will not call kfree(host) twice, by performing the kfree()\nonly if the devres_open_group() call failed." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:27.309Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/290073b2b557e4dc21ee74a1e403d9ae79e393a2" }, { "url": "https://git.kernel.org/stable/c/56f1c7e290cd6c69c948fcd2e2a49e6a637ec38f" }, { "url": "https://git.kernel.org/stable/c/010de9acbea58fbcbda08e3793d6262086a493fe" }, { "url": "https://git.kernel.org/stable/c/5dde5f8b790274723640d29a07c5a97d57d62047" }, { "url": "https://git.kernel.org/stable/c/702c1edbafb2e6f9d20f6d391273b5be09d366a5" }, { "url": "https://git.kernel.org/stable/c/062e256516d7db5e7dcdef117f52025cd5c456e3" }, { "url": "https://git.kernel.org/stable/c/8106da4d88bbaed809e023cc8014b766223d6e76" }, { "url": "https://git.kernel.org/stable/c/ab9e0c529eb7cafebdd31fe1644524e80a48b05d" } ], "title": "ata: libata-core: Fix double free on error", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41087", "datePublished": "2024-07-29T15:48:03.127Z", "dateReserved": "2024-07-12T12:17:45.634Z", "dateUpdated": "2024-11-05T09:36:27.309Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42145
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
IB/core: Implement a limit on UMAD receive List
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.255Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1288cf1cceb0e6df276e182f5412370fb4169bcb" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b4913702419d064ec4c4bbf7270643c95cc89a1b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/62349fbf86b5e13b02721bdadf98c29afd1e7b5f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d73cb8862e4d6760ccc94d3b57b9ef6271400607" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/63d202d948bb6d3a28cd8e8b96b160fa53e18baa" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b8c5f635997f49c625178d1a0cb32a80ed33abe6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a6627fba793cc75b7365d9504a0095fb2902dda4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ca0b44e20a6f3032224599f02e7c8fb49525c894" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42145", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:44.209486Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:35.248Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/infiniband/core/user_mad.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "1288cf1cceb0", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "b4913702419d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "62349fbf86b5", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "d73cb8862e4d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "63d202d948bb", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "b8c5f635997f", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "a6627fba793c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "ca0b44e20a6f", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/infiniband/core/user_mad.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/core: Implement a limit on UMAD receive List\n\nThe existing behavior of ib_umad, which maintains received MAD\npackets in an unbounded list, poses a risk of uncontrolled growth.\nAs user-space applications extract packets from this list, the rate\nof extraction may not match the rate of incoming packets, leading\nto potential list overflow.\n\nTo address this, we introduce a limit to the size of the list. After\nconsidering typical scenarios, such as OpenSM processing, which can\nhandle approximately 100k packets per second, and the 1-second retry\ntimeout for most packets, we set the list size limit to 200k. Packets\nreceived beyond this limit are dropped, assuming they are likely timed\nout by the time they are handled by user-space.\n\nNotably, packets queued on the receive list due to reasons like\ntimed-out sends are preserved even when the list is full." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:14.705Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/1288cf1cceb0e6df276e182f5412370fb4169bcb" }, { "url": "https://git.kernel.org/stable/c/b4913702419d064ec4c4bbf7270643c95cc89a1b" }, { "url": "https://git.kernel.org/stable/c/62349fbf86b5e13b02721bdadf98c29afd1e7b5f" }, { "url": "https://git.kernel.org/stable/c/d73cb8862e4d6760ccc94d3b57b9ef6271400607" }, { "url": "https://git.kernel.org/stable/c/63d202d948bb6d3a28cd8e8b96b160fa53e18baa" }, { "url": "https://git.kernel.org/stable/c/b8c5f635997f49c625178d1a0cb32a80ed33abe6" }, { "url": "https://git.kernel.org/stable/c/a6627fba793cc75b7365d9504a0095fb2902dda4" }, { "url": "https://git.kernel.org/stable/c/ca0b44e20a6f3032224599f02e7c8fb49525c894" } ], "title": "IB/core: Implement a limit on UMAD receive List", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42145", "datePublished": "2024-07-30T07:46:38.650Z", "dateReserved": "2024-07-29T15:50:41.190Z", "dateUpdated": "2024-11-05T09:38:14.705Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42140
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
riscv: kexec: Avoid deadlock in kexec crash path
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/bb80a7911218bbab2a69b5db7d2545643ab0073d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/653deee48a4682ea17a05b96fb6842795ab5943c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7692c9b6baacdee378435f58f19baf0eb69e4155" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/484dd545271d02d1571e1c6b62ea7df9dbe5e692" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c562ba719df570c986caf0941fea2449150bcbc4" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42140", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:56.730173Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:09.207Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "arch/riscv/kernel/machine_kexec.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "bb80a7911218", "status": "affected", "version": "12f237200c16", "versionType": "git" }, { "lessThan": "653deee48a46", "status": "affected", "version": "b17d19a5314a", "versionType": "git" }, { "lessThan": "7692c9b6baac", "status": "affected", "version": "b17d19a5314a", "versionType": "git" }, { "lessThan": "484dd545271d", "status": "affected", "version": "b17d19a5314a", "versionType": "git" }, { "lessThan": "c562ba719df5", "status": "affected", "version": "b17d19a5314a", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "arch/riscv/kernel/machine_kexec.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.1" }, { "lessThan": "6.1", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: kexec: Avoid deadlock in kexec crash path\n\nIf the kexec crash code is called in the interrupt context, the\nmachine_kexec_mask_interrupts() function will trigger a deadlock while\ntrying to acquire the irqdesc spinlock and then deactivate irqchip in\nirq_set_irqchip_state() function.\n\nUnlike arm64, riscv only requires irq_eoi handler to complete EOI and\nkeeping irq_set_irqchip_state() will only leave this possible deadlock\nwithout any use. So we simply remove it." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:10.312Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/bb80a7911218bbab2a69b5db7d2545643ab0073d" }, { "url": "https://git.kernel.org/stable/c/653deee48a4682ea17a05b96fb6842795ab5943c" }, { "url": "https://git.kernel.org/stable/c/7692c9b6baacdee378435f58f19baf0eb69e4155" }, { "url": "https://git.kernel.org/stable/c/484dd545271d02d1571e1c6b62ea7df9dbe5e692" }, { "url": "https://git.kernel.org/stable/c/c562ba719df570c986caf0941fea2449150bcbc4" } ], "title": "riscv: kexec: Avoid deadlock in kexec crash path", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42140", "datePublished": "2024-07-30T07:46:34.260Z", "dateReserved": "2024-07-29T15:50:41.189Z", "dateUpdated": "2024-11-05T09:38:10.312Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41058
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
cachefiles: fix slab-use-after-free in fscache_withdraw_volume()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/90f17e47f1e209c6a3c92a1d038a0a80c95c460e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9dd7f5663899ea13a6a73216106d9c13c37453e3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/38b88d544216f806d93a273a62ff8ebe82254003" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/522018a0de6b6fcce60c04f86dfc5f0e4b6a1b36" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41058", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:18.541006Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:01.669Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/cachefiles/cache.c", "include/trace/events/fscache.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "90f17e47f1e2", "status": "affected", "version": "fe2140e2f57f", "versionType": "git" }, { "lessThan": "9dd7f5663899", "status": "affected", "version": "fe2140e2f57f", "versionType": "git" }, { "lessThan": "38b88d544216", "status": "affected", "version": "fe2140e2f57f", "versionType": "git" }, { "lessThan": "522018a0de6b", "status": "affected", "version": "fe2140e2f57f", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/cachefiles/cache.c", "include/trace/events/fscache.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.17" }, { "lessThan": "5.17", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: fix slab-use-after-free in fscache_withdraw_volume()\n\nWe got the following issue in our fault injection stress test:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in fscache_withdraw_volume+0x2e1/0x370\nRead of size 4 at addr ffff88810680be08 by task ondemand-04-dae/5798\n\nCPU: 0 PID: 5798 Comm: ondemand-04-dae Not tainted 6.8.0-dirty #565\nCall Trace:\n kasan_check_range+0xf6/0x1b0\n fscache_withdraw_volume+0x2e1/0x370\n cachefiles_withdraw_volume+0x31/0x50\n cachefiles_withdraw_cache+0x3ad/0x900\n cachefiles_put_unbind_pincount+0x1f6/0x250\n cachefiles_daemon_release+0x13b/0x290\n __fput+0x204/0xa00\n task_work_run+0x139/0x230\n\nAllocated by task 5820:\n __kmalloc+0x1df/0x4b0\n fscache_alloc_volume+0x70/0x600\n __fscache_acquire_volume+0x1c/0x610\n erofs_fscache_register_volume+0x96/0x1a0\n erofs_fscache_register_fs+0x49a/0x690\n erofs_fc_fill_super+0x6c0/0xcc0\n vfs_get_super+0xa9/0x140\n vfs_get_tree+0x8e/0x300\n do_new_mount+0x28c/0x580\n [...]\n\nFreed by task 5820:\n kfree+0xf1/0x2c0\n fscache_put_volume.part.0+0x5cb/0x9e0\n erofs_fscache_unregister_fs+0x157/0x1b0\n erofs_kill_sb+0xd9/0x1c0\n deactivate_locked_super+0xa3/0x100\n vfs_get_super+0x105/0x140\n vfs_get_tree+0x8e/0x300\n do_new_mount+0x28c/0x580\n [...]\n==================================================================\n\nFollowing is the process that triggers the issue:\n\n mount failed | daemon exit\n------------------------------------------------------------\n deactivate_locked_super cachefiles_daemon_release\n erofs_kill_sb\n erofs_fscache_unregister_fs\n fscache_relinquish_volume\n __fscache_relinquish_volume\n fscache_put_volume(fscache_volume, fscache_volume_put_relinquish)\n zero = __refcount_dec_and_test(\u0026fscache_volume-\u003eref, \u0026ref);\n cachefiles_put_unbind_pincount\n cachefiles_daemon_unbind\n cachefiles_withdraw_cache\n cachefiles_withdraw_volumes\n list_del_init(\u0026volume-\u003ecache_link)\n fscache_free_volume(fscache_volume)\n cache-\u003eops-\u003efree_volume\n cachefiles_free_volume\n list_del_init(\u0026cachefiles_volume-\u003ecache_link);\n kfree(fscache_volume)\n cachefiles_withdraw_volume\n fscache_withdraw_volume\n fscache_volume-\u003en_accesses\n // fscache_volume UAF !!!\n\nThe fscache_volume in cache-\u003evolumes must not have been freed yet, but its\nreference count may be 0. So use the new fscache_try_get_volume() helper\nfunction try to get its reference count.\n\nIf the reference count of fscache_volume is 0, fscache_put_volume() is\nfreeing it, so wait for it to be removed from cache-\u003evolumes.\n\nIf its reference count is not 0, call cachefiles_withdraw_volume() with\nreference count protection to avoid the above issue." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:51.271Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/90f17e47f1e209c6a3c92a1d038a0a80c95c460e" }, { "url": "https://git.kernel.org/stable/c/9dd7f5663899ea13a6a73216106d9c13c37453e3" }, { "url": "https://git.kernel.org/stable/c/38b88d544216f806d93a273a62ff8ebe82254003" }, { "url": "https://git.kernel.org/stable/c/522018a0de6b6fcce60c04f86dfc5f0e4b6a1b36" } ], "title": "cachefiles: fix slab-use-after-free in fscache_withdraw_volume()", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41058", "datePublished": "2024-07-29T14:57:20.894Z", "dateReserved": "2024-07-12T12:17:45.627Z", "dateUpdated": "2024-11-05T09:35:51.271Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41054
Vulnerability from cvelistv5
Published
2024-07-29 14:32
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
scsi: ufs: core: Fix ufshcd_clear_cmd racing issue
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.022Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/bed0896008334eeee4b4bfd7150491ca098cbf72" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/11d81233f4ebe6907b12c79ad7d8787aa4db0633" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9307a998cb9846a2557fdca286997430bee36a2a" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41054", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:31.645122Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:01.432Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/ufs/core/ufs-mcq.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "bed089600833", "status": "affected", "version": "8d7290348992", "versionType": "git" }, { "lessThan": "11d81233f4eb", "status": "affected", "version": "8d7290348992", "versionType": "git" }, { "lessThan": "9307a998cb98", "status": "affected", "version": "8d7290348992", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/ufs/core/ufs-mcq.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.5" }, { "lessThan": "6.5", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Fix ufshcd_clear_cmd racing issue\n\nWhen ufshcd_clear_cmd is racing with the completion ISR, the completed tag\nof the request\u0027s mq_hctx pointer will be set to NULL by the ISR. And\nufshcd_clear_cmd\u0027s call to ufshcd_mcq_req_to_hwq will get NULL pointer KE.\nReturn success when the request is completed by ISR because sq does not\nneed cleanup.\n\nThe racing flow is:\n\nThread A\nufshcd_err_handler\t\t\t\t\tstep 1\n\tufshcd_try_to_abort_task\n\t\tufshcd_cmd_inflight(true)\t\tstep 3\n\t\tufshcd_clear_cmd\n\t\t\t...\n\t\t\tufshcd_mcq_req_to_hwq\n\t\t\tblk_mq_unique_tag\n\t\t\t\trq-\u003emq_hctx-\u003equeue_num\tstep 5\n\nThread B\nufs_mtk_mcq_intr(cq complete ISR)\t\t\tstep 2\n\tscsi_done\n\t\t...\n\t\t__blk_mq_free_request\n\t\t\trq-\u003emq_hctx = NULL;\t\tstep 4\n\nBelow is KE back trace:\n\n ufshcd_try_to_abort_task: cmd pending in the device. tag = 6\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000194\n pc : [0xffffffd589679bf8] blk_mq_unique_tag+0x8/0x14\n lr : [0xffffffd5862f95b4] ufshcd_mcq_sq_cleanup+0x6c/0x1cc [ufs_mediatek_mod_ise]\n Workqueue: ufs_eh_wq_0 ufshcd_err_handler [ufs_mediatek_mod_ise]\n Call trace:\n dump_backtrace+0xf8/0x148\n show_stack+0x18/0x24\n dump_stack_lvl+0x60/0x7c\n dump_stack+0x18/0x3c\n mrdump_common_die+0x24c/0x398 [mrdump]\n ipanic_die+0x20/0x34 [mrdump]\n notify_die+0x80/0xd8\n die+0x94/0x2b8\n __do_kernel_fault+0x264/0x298\n do_page_fault+0xa4/0x4b8\n do_translation_fault+0x38/0x54\n do_mem_abort+0x58/0x118\n el1_abort+0x3c/0x5c\n el1h_64_sync_handler+0x54/0x90\n el1h_64_sync+0x68/0x6c\n blk_mq_unique_tag+0x8/0x14\n ufshcd_clear_cmd+0x34/0x118 [ufs_mediatek_mod_ise]\n ufshcd_try_to_abort_task+0x2c8/0x5b4 [ufs_mediatek_mod_ise]\n ufshcd_err_handler+0xa7c/0xfa8 [ufs_mediatek_mod_ise]\n process_one_work+0x208/0x4fc\n worker_thread+0x228/0x438\n kthread+0x104/0x1d4\n ret_from_fork+0x10/0x20" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:46.857Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/bed0896008334eeee4b4bfd7150491ca098cbf72" }, { "url": "https://git.kernel.org/stable/c/11d81233f4ebe6907b12c79ad7d8787aa4db0633" }, { "url": "https://git.kernel.org/stable/c/9307a998cb9846a2557fdca286997430bee36a2a" } ], "title": "scsi: ufs: core: Fix ufshcd_clear_cmd racing issue", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41054", "datePublished": "2024-07-29T14:32:09.829Z", "dateReserved": "2024-07-12T12:17:45.627Z", "dateUpdated": "2024-11-05T09:35:46.857Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41072
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
wifi: cfg80211: wext: add extra SIOCSIWSCAN data check
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.210Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b02ba9a0b55b762bd04743a22f3d9f9645005e79" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/de5fcf757e33596eed32de170ce5a93fa44dd2ac" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6295bad58f988eaafcf0e6f8b198a580398acb3b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a43cc0558530b6c065976b6b9246f512f8d3593b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/001120ff0c9e3557dee9b5ee0d358e0fc189996f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/fe9644efd86704afe50e56b64b609de340ab7c95" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/35cee10ccaee5bd451a480521bbc25dc9f07fa5b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6ef09cdc5ba0f93826c09d810c141a8d103a80fc" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41072", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:33.807600Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:00.660Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/wireless/scan.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "b02ba9a0b55b", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "de5fcf757e33", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "6295bad58f98", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "a43cc0558530", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "001120ff0c9e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "fe9644efd867", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "35cee10ccaee", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "6ef09cdc5ba0", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/wireless/scan.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.319", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.281", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.223", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.164", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: wext: add extra SIOCSIWSCAN data check\n\nIn \u0027cfg80211_wext_siwscan()\u0027, add extra check whether number of\nchannels passed via \u0027ioctl(sock, SIOCSIWSCAN, ...)\u0027 doesn\u0027t exceed\nIW_MAX_FREQUENCIES and reject invalid request with -EINVAL otherwise." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:10.622Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/b02ba9a0b55b762bd04743a22f3d9f9645005e79" }, { "url": "https://git.kernel.org/stable/c/de5fcf757e33596eed32de170ce5a93fa44dd2ac" }, { "url": "https://git.kernel.org/stable/c/6295bad58f988eaafcf0e6f8b198a580398acb3b" }, { "url": "https://git.kernel.org/stable/c/a43cc0558530b6c065976b6b9246f512f8d3593b" }, { "url": "https://git.kernel.org/stable/c/001120ff0c9e3557dee9b5ee0d358e0fc189996f" }, { "url": "https://git.kernel.org/stable/c/fe9644efd86704afe50e56b64b609de340ab7c95" }, { "url": "https://git.kernel.org/stable/c/35cee10ccaee5bd451a480521bbc25dc9f07fa5b" }, { "url": "https://git.kernel.org/stable/c/6ef09cdc5ba0f93826c09d810c141a8d103a80fc" } ], "title": "wifi: cfg80211: wext: add extra SIOCSIWSCAN data check", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41072", "datePublished": "2024-07-29T14:57:32.432Z", "dateReserved": "2024-07-12T12:17:45.631Z", "dateUpdated": "2024-11-05T09:36:10.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42124
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
scsi: qedf: Make qedf_execute_tmf() non-preemptible
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.246Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4f314aadeed8cdf42c8cf30769425b5e44702748" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5ceb40cdee721e13cbe15a0515cacf984e11236b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0a8a91932b2772e75bf3f6d133ca4225d1d3e920" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/fa49c65a1cec6a3901ef884fdb24d98068b63493" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b6ded5316ec56e973dcf5f9997945aad01a9f062" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2b9c7787cfcd1e76d873a78f16cf45bfa4b100ea" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0d8b637c9c5eeaa1a4e3dfb336f3ff918eb64fec" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42124", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:47.741543Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:04.801Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/scsi/qedf/qedf_io.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "4f314aadeed8", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "5ceb40cdee72", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "0a8a91932b27", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "fa49c65a1cec", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "b6ded5316ec5", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "2b9c7787cfcd", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "0d8b637c9c5e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/scsi/qedf/qedf_io.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Make qedf_execute_tmf() non-preemptible\n\nStop calling smp_processor_id() from preemptible code in\nqedf_execute_tmf90. This results in BUG_ON() when running an RT kernel.\n\n[ 659.343280] BUG: using smp_processor_id() in preemptible [00000000] code: sg_reset/3646\n[ 659.343282] caller is qedf_execute_tmf+0x8b/0x360 [qedf]" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:52.446Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/4f314aadeed8cdf42c8cf30769425b5e44702748" }, { "url": "https://git.kernel.org/stable/c/5ceb40cdee721e13cbe15a0515cacf984e11236b" }, { "url": "https://git.kernel.org/stable/c/0a8a91932b2772e75bf3f6d133ca4225d1d3e920" }, { "url": "https://git.kernel.org/stable/c/fa49c65a1cec6a3901ef884fdb24d98068b63493" }, { "url": "https://git.kernel.org/stable/c/b6ded5316ec56e973dcf5f9997945aad01a9f062" }, { "url": "https://git.kernel.org/stable/c/2b9c7787cfcd1e76d873a78f16cf45bfa4b100ea" }, { "url": "https://git.kernel.org/stable/c/0d8b637c9c5eeaa1a4e3dfb336f3ff918eb64fec" } ], "title": "scsi: qedf: Make qedf_execute_tmf() non-preemptible", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42124", "datePublished": "2024-07-30T07:46:16.052Z", "dateReserved": "2024-07-29T15:50:41.179Z", "dateUpdated": "2024-11-05T09:37:52.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42125
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-12-09 14:21
Severity ?
EPSS score ?
Summary
wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.547Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ce4ba62f8bc5195a9a0d49c6235a9c99e619cadc" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/bb38626f3f97e16e6d368a9ff6daf320f3fe31d9" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42125", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:44.636996Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:04.674Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/wireless/realtek/rtw89/fw.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "ce4ba62f8bc5", "status": "affected", "version": "e3ec7017f6a2", "versionType": "git" }, { "lessThan": "bb38626f3f97", "status": "affected", "version": "e3ec7017f6a2", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/wireless/realtek/rtw89/fw.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.16" }, { "lessThan": "5.16", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband\n\nWe have some policy via BIOS to block uses of 6 GHz. In this case, 6 GHz\nsband will be NULL even if it is WiFi 7 chip. So, add NULL handling here\nto avoid crash." } ], "providerMetadata": { "dateUpdated": "2024-12-09T14:21:25.897Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/ce4ba62f8bc5195a9a0d49c6235a9c99e619cadc" }, { "url": "https://git.kernel.org/stable/c/bb38626f3f97e16e6d368a9ff6daf320f3fe31d9" } ], "title": "wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband", "x_generator": { "engine": "bippy-8e903de6a542" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42125", "datePublished": "2024-07-30T07:46:22.046Z", "dateReserved": "2024-07-29T15:50:41.179Z", "dateUpdated": "2024-12-09T14:21:25.897Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42144
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
thermal/drivers/mediatek/lvts_thermal: Check NULL ptr on lvts_data
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/79ef1a5593fdb8aa4dbccf6085c48f1739338bc9" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/fd7ae1cabfedd727be5bee774c87acbc7b10b886" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a1191a77351e25ddf091bb1a231cae12ee598b5d" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42144", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:47.386110Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:08.965Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/thermal/mediatek/lvts_thermal.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "79ef1a5593fd", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "fd7ae1cabfed", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "a1191a77351e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/thermal/mediatek/lvts_thermal.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal/drivers/mediatek/lvts_thermal: Check NULL ptr on lvts_data\n\nVerify that lvts_data is not NULL before using it." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:13.630Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/79ef1a5593fdb8aa4dbccf6085c48f1739338bc9" }, { "url": "https://git.kernel.org/stable/c/fd7ae1cabfedd727be5bee774c87acbc7b10b886" }, { "url": "https://git.kernel.org/stable/c/a1191a77351e25ddf091bb1a231cae12ee598b5d" } ], "title": "thermal/drivers/mediatek/lvts_thermal: Check NULL ptr on lvts_data", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42144", "datePublished": "2024-07-30T07:46:37.837Z", "dateReserved": "2024-07-29T15:50:41.190Z", "dateUpdated": "2024-11-05T09:38:13.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42138
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ab557f5cd993a3201b09593633d04b891263d5c0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f8b55a465b0e8a500179808166fe9420f5c091a1" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9af7437669b72f804fc4269f487528dbbed142a2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8ce34dccbe8fa7d2ef86f2d8e7db2a9b67cabfc3" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42138", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:03.260282Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:35.704Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/mellanox/mlxsw/core_linecards.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "ab557f5cd993", "status": "affected", "version": "b217127e5e4e", "versionType": "git" }, { "lessThan": "f8b55a465b0e", "status": "affected", "version": "b217127e5e4e", "versionType": "git" }, { "lessThan": "9af7437669b7", "status": "affected", "version": "b217127e5e4e", "versionType": "git" }, { "lessThan": "8ce34dccbe8f", "status": "affected", "version": "b217127e5e4e", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/mellanox/mlxsw/core_linecards.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.19" }, { "lessThan": "5.19", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file\n\nIn case of invalid INI file mlxsw_linecard_types_init() deallocates memory\nbut doesn\u0027t reset pointer to NULL and returns 0. In case of any error\noccurred after mlxsw_linecard_types_init() call, mlxsw_linecards_init()\ncalls mlxsw_linecard_types_fini() which performs memory deallocation again.\n\nAdd pointer reset to NULL.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:08.167Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/ab557f5cd993a3201b09593633d04b891263d5c0" }, { "url": "https://git.kernel.org/stable/c/f8b55a465b0e8a500179808166fe9420f5c091a1" }, { "url": "https://git.kernel.org/stable/c/9af7437669b72f804fc4269f487528dbbed142a2" }, { "url": "https://git.kernel.org/stable/c/8ce34dccbe8fa7d2ef86f2d8e7db2a9b67cabfc3" } ], "title": "mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42138", "datePublished": "2024-07-30T07:46:32.611Z", "dateReserved": "2024-07-29T15:50:41.188Z", "dateUpdated": "2024-11-05T09:38:08.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41059
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
hfsplus: fix uninit-value in copy_name
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.410Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/72805debec8f7aa342da194fe0ed7bc8febea335" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c733e24a61cbcff10f660041d6d84d32bb7e4cb4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/34f8efd2743f2d961e92e8e994de4c7a2f9e74a0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d02d8c1dacafb28930c39e16d48e40bb6e4cbc70" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/22999936b91ba545ce1fbbecae6895127945e91c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f08956d8e0f80fd0d4ad84ec917302bb2f3a9c6a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ad57dc2caf1e0a3c0a9904400fae7afbc9f74bb2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0570730c16307a72f8241df12363f76600baf57d" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41059", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:15.385503Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:01.548Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/hfsplus/xattr.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "72805debec8f", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "c733e24a61cb", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "34f8efd2743f", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "d02d8c1dacaf", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "22999936b91b", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "f08956d8e0f8", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "ad57dc2caf1e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "0570730c1630", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/hfsplus/xattr.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.319", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.281", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.223", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.164", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix uninit-value in copy_name\n\n[syzbot reported]\nBUG: KMSAN: uninit-value in sized_strscpy+0xc4/0x160\n sized_strscpy+0xc4/0x160\n copy_name+0x2af/0x320 fs/hfsplus/xattr.c:411\n hfsplus_listxattr+0x11e9/0x1a50 fs/hfsplus/xattr.c:750\n vfs_listxattr fs/xattr.c:493 [inline]\n listxattr+0x1f3/0x6b0 fs/xattr.c:840\n path_listxattr fs/xattr.c:864 [inline]\n __do_sys_listxattr fs/xattr.c:876 [inline]\n __se_sys_listxattr fs/xattr.c:873 [inline]\n __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873\n x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:3877 [inline]\n slab_alloc_node mm/slub.c:3918 [inline]\n kmalloc_trace+0x57b/0xbe0 mm/slub.c:4065\n kmalloc include/linux/slab.h:628 [inline]\n hfsplus_listxattr+0x4cc/0x1a50 fs/hfsplus/xattr.c:699\n vfs_listxattr fs/xattr.c:493 [inline]\n listxattr+0x1f3/0x6b0 fs/xattr.c:840\n path_listxattr fs/xattr.c:864 [inline]\n __do_sys_listxattr fs/xattr.c:876 [inline]\n __se_sys_listxattr fs/xattr.c:873 [inline]\n __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873\n x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[Fix]\nWhen allocating memory to strbuf, initialize memory to 0." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:53.587Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/72805debec8f7aa342da194fe0ed7bc8febea335" }, { "url": "https://git.kernel.org/stable/c/c733e24a61cbcff10f660041d6d84d32bb7e4cb4" }, { "url": "https://git.kernel.org/stable/c/34f8efd2743f2d961e92e8e994de4c7a2f9e74a0" }, { "url": "https://git.kernel.org/stable/c/d02d8c1dacafb28930c39e16d48e40bb6e4cbc70" }, { "url": "https://git.kernel.org/stable/c/22999936b91ba545ce1fbbecae6895127945e91c" }, { "url": "https://git.kernel.org/stable/c/f08956d8e0f80fd0d4ad84ec917302bb2f3a9c6a" }, { "url": "https://git.kernel.org/stable/c/ad57dc2caf1e0a3c0a9904400fae7afbc9f74bb2" }, { "url": "https://git.kernel.org/stable/c/0570730c16307a72f8241df12363f76600baf57d" } ], "title": "hfsplus: fix uninit-value in copy_name", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41059", "datePublished": "2024-07-29T14:57:21.616Z", "dateReserved": "2024-07-12T12:17:45.627Z", "dateUpdated": "2024-11-05T09:35:53.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42156
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-12-09 10:43
Severity ?
EPSS score ?
Summary
s390/pkey: Wipe copies of clear-key structures on failure
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7f6243edd901b75aaece326c90a1cc0dcb60cc3d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d65d76a44ffe74c73298ada25b0f578680576073" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42156", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:08.677401Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:34.120Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/s390/crypto/pkey_api.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "a891938947f4", "status": "affected", "version": "e80d4af0a320", "versionType": "git" }, { "lessThan": "7f6243edd901", "status": "affected", "version": "e80d4af0a320", "versionType": "git" }, { "lessThan": "d65d76a44ffe", "status": "affected", "version": "e80d4af0a320", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/s390/crypto/pkey_api.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.11" }, { "lessThan": "4.11", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.64", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/pkey: Wipe copies of clear-key structures on failure\n\nWipe all sensitive data from stack for all IOCTLs, which convert a\nclear-key into a protected- or secure-key." } ], "providerMetadata": { "dateUpdated": "2024-12-09T10:43:32.529Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/a891938947f4427f98cb1ce54f27223501efe750" }, { "url": "https://git.kernel.org/stable/c/7f6243edd901b75aaece326c90a1cc0dcb60cc3d" }, { "url": "https://git.kernel.org/stable/c/d65d76a44ffe74c73298ada25b0f578680576073" } ], "title": "s390/pkey: Wipe copies of clear-key structures on failure", "x_generator": { "engine": "bippy-8e903de6a542" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42156", "datePublished": "2024-07-30T07:46:58.513Z", "dateReserved": "2024-07-29T15:50:41.194Z", "dateUpdated": "2024-12-09T10:43:32.529Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41044
Vulnerability from cvelistv5
Published
2024-07-29 14:32
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
ppp: reject claimed-as-LCP but actually malformed packets
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.636Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/97d1efd8be26615ff680cdde86937d5943138f37" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6e8f1c21174f9482033bbb59f13ce1a8cbe843c3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3ba12c2afd933fc1bf800f6d3f6c7ec8f602ce56" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ebc5c630457783d17d0c438b0ad70b232a64a82f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3134bdf7356ed952dcecb480861d2afcc1e40492" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/099502ca410922b56353ccef2749bc0de669da78" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d683e7f3fc48f59576af34631b4fb07fd931343e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f2aeb7306a898e1cbd03963d376f4b6656ca2b55" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41044", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:23:03.869705Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:02.594Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ppp/ppp_generic.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "97d1efd8be26", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "6e8f1c21174f", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "3ba12c2afd93", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "ebc5c6304577", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "3134bdf7356e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "099502ca4109", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "d683e7f3fc48", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "f2aeb7306a89", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ppp/ppp_generic.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "2.6.12" }, { "lessThan": "2.6.12", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nppp: reject claimed-as-LCP but actually malformed packets\n\nSince \u0027ppp_async_encode()\u0027 assumes valid LCP packets (with code\nfrom 1 to 7 inclusive), add \u0027ppp_check_packet()\u0027 to ensure that\nLCP packet has an actual body beyond PPP_LCP header bytes, and\nreject claimed-as-LCP but actually malformed data otherwise." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:34.734Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/97d1efd8be26615ff680cdde86937d5943138f37" }, { "url": "https://git.kernel.org/stable/c/6e8f1c21174f9482033bbb59f13ce1a8cbe843c3" }, { "url": "https://git.kernel.org/stable/c/3ba12c2afd933fc1bf800f6d3f6c7ec8f602ce56" }, { "url": "https://git.kernel.org/stable/c/ebc5c630457783d17d0c438b0ad70b232a64a82f" }, { "url": "https://git.kernel.org/stable/c/3134bdf7356ed952dcecb480861d2afcc1e40492" }, { "url": "https://git.kernel.org/stable/c/099502ca410922b56353ccef2749bc0de669da78" }, { "url": "https://git.kernel.org/stable/c/d683e7f3fc48f59576af34631b4fb07fd931343e" }, { "url": "https://git.kernel.org/stable/c/f2aeb7306a898e1cbd03963d376f4b6656ca2b55" } ], "title": "ppp: reject claimed-as-LCP but actually malformed packets", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41044", "datePublished": "2024-07-29T14:32:02.126Z", "dateReserved": "2024-07-12T12:17:45.624Z", "dateUpdated": "2024-11-05T09:35:34.734Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41024
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
misc: fastrpc: Restrict untrusted app to attach to privileged PD
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5e305b5986dc52122a9368a1461f0c13e1de3fd6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c69fd8afacebfdf2f8a1ee1ea7e0723786529874" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/bab2f5e8fd5d2f759db26b78d9db57412888f187" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41024", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:24:15.824922Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:04.740Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/misc/fastrpc.c", "include/uapi/misc/fastrpc.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "5e305b5986dc", "status": "affected", "version": "0871561055e6", "versionType": "git" }, { "lessThan": "ea13bd807f1c", "status": "affected", "version": "0871561055e6", "versionType": "git" }, { "lessThan": "c69fd8afaceb", "status": "affected", "version": "0871561055e6", "versionType": "git" }, { "lessThan": "bab2f5e8fd5d", "status": "affected", "version": "0871561055e6", "versionType": "git" }, { "lessThan": "2eb973ee4770", "status": "affected", "version": "0871561055e6", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/misc/fastrpc.c", "include/uapi/misc/fastrpc.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.2" }, { "lessThan": "6.2", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.48", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" }, { "lessThanOrEqual": "6.10.*", "status": "unaffected", "version": "6.10.7", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: Restrict untrusted app to attach to privileged PD\n\nUntrusted application with access to only non-secure fastrpc device\nnode can attach to root_pd or static PDs if it can make the respective\ninit request. This can cause problems as the untrusted application\ncan send bad requests to root_pd or static PDs. Add changes to reject\nattach to privileged PDs if the request is being made using non-secure\nfastrpc device node." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:12.148Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/5e305b5986dc52122a9368a1461f0c13e1de3fd6" }, { "url": "https://git.kernel.org/stable/c/ea13bd807f1cef1af375d999980a9b9794c789b6" }, { "url": "https://git.kernel.org/stable/c/c69fd8afacebfdf2f8a1ee1ea7e0723786529874" }, { "url": "https://git.kernel.org/stable/c/bab2f5e8fd5d2f759db26b78d9db57412888f187" }, { "url": "https://git.kernel.org/stable/c/2eb973ee4770a26d9b5e292b58ad29822d321c7f" } ], "title": "misc: fastrpc: Restrict untrusted app to attach to privileged PD", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41024", "datePublished": "2024-07-29T14:31:41.257Z", "dateReserved": "2024-07-12T12:17:45.615Z", "dateUpdated": "2024-11-05T09:35:12.148Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42141
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
Bluetooth: ISO: Check socket flag instead of hcon
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.592Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/045669710464a21c67e690ef14698fd71857cb11" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/33fabef489169c6db87843ef23351ed0d5e51ad8" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/596b6f081336e77764ca35cfeab66d0fcdbe544e" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42141", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:53.613577Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:35.470Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/bluetooth/iso.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "045669710464", "status": "affected", "version": "fbdc4bc47268", "versionType": "git" }, { "lessThan": "33fabef48916", "status": "affected", "version": "fbdc4bc47268", "versionType": "git" }, { "lessThan": "596b6f081336", "status": "affected", "version": "fbdc4bc47268", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/bluetooth/iso.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.6" }, { "lessThan": "6.6", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Check socket flag instead of hcon\n\nThis fixes the following Smatch static checker warning:\n\nnet/bluetooth/iso.c:1364 iso_sock_recvmsg()\nerror: we previously assumed \u0027pi-\u003econn-\u003ehcon\u0027 could be null (line 1359)\n\nnet/bluetooth/iso.c\n1347 static int iso_sock_recvmsg(struct socket *sock, struct msghdr *msg,\n1348 size_t len, int flags)\n1349 {\n1350 struct sock *sk = sock-\u003esk;\n1351 struct iso_pinfo *pi = iso_pi(sk);\n1352\n1353 BT_DBG(\"sk %p\", sk);\n1354\n1355 if (test_and_clear_bit(BT_SK_DEFER_SETUP,\n \u0026bt_sk(sk)-\u003eflags)) {\n1356 lock_sock(sk);\n1357 switch (sk-\u003esk_state) {\n1358 case BT_CONNECT2:\n1359 if (pi-\u003econn-\u003ehcon \u0026\u0026\n ^^^^^^^^^^^^^^ If -\u003ehcon is NULL\n\n1360 test_bit(HCI_CONN_PA_SYNC,\n \u0026pi-\u003econn-\u003ehcon-\u003eflags)) {\n1361 iso_conn_big_sync(sk);\n1362 sk-\u003esk_state = BT_LISTEN;\n1363 } else {\n--\u003e 1364 iso_conn_defer_accept(pi-\u003econn-\u003ehcon);\n ^^^^^^^^^^^^^^\n then we\u0027re toast\n\n1365 sk-\u003esk_state = BT_CONFIG;\n1366 }\n1367 release_sock(sk);\n1368 return 0;\n1369 case BT_CONNECTED:\n1370 if (test_bit(BT_SK_PA_SYNC," } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:11.451Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/045669710464a21c67e690ef14698fd71857cb11" }, { "url": "https://git.kernel.org/stable/c/33fabef489169c6db87843ef23351ed0d5e51ad8" }, { "url": "https://git.kernel.org/stable/c/596b6f081336e77764ca35cfeab66d0fcdbe544e" } ], "title": "Bluetooth: ISO: Check socket flag instead of hcon", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42141", "datePublished": "2024-07-30T07:46:35.174Z", "dateReserved": "2024-07-29T15:50:41.189Z", "dateUpdated": "2024-11-05T09:38:11.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41075
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
cachefiles: add consistency check for copen/cread
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.518Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3b744884c0431b5a62c92900e64bfd0ed61e8e2a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/36d845ccd7bf527110a65fe953886a176c209539" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8aaa6c5dd2940ab934d6cd296175f43dbb32b34a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a26dc49df37e996876f50a0210039b2d211fdd6f" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41075", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:24.232426Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:00.106Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/cachefiles/ondemand.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "3b744884c043", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "36d845ccd7bf", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "8aaa6c5dd294", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "a26dc49df37e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/cachefiles/ondemand.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: add consistency check for copen/cread\n\nThis prevents malicious processes from completing random copen/cread\nrequests and crashing the system. Added checks are listed below:\n\n * Generic, copen can only complete open requests, and cread can only\n complete read requests.\n * For copen, ondemand_id must not be 0, because this indicates that the\n request has not been read by the daemon.\n * For cread, the object corresponding to fd and req should be the same." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:13.917Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/3b744884c0431b5a62c92900e64bfd0ed61e8e2a" }, { "url": "https://git.kernel.org/stable/c/36d845ccd7bf527110a65fe953886a176c209539" }, { "url": "https://git.kernel.org/stable/c/8aaa6c5dd2940ab934d6cd296175f43dbb32b34a" }, { "url": "https://git.kernel.org/stable/c/a26dc49df37e996876f50a0210039b2d211fdd6f" } ], "title": "cachefiles: add consistency check for copen/cread", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41075", "datePublished": "2024-07-29T14:57:34.891Z", "dateReserved": "2024-07-12T12:17:45.632Z", "dateUpdated": "2024-11-05T09:36:13.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42109
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
netfilter: nf_tables: unconditionally flush pending work before notifier
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.956Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3325628cb36b7f216c5716e7b5124d9dc81199e4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4c06c13317b9a08decedcd7aaf706691e336277c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/55a40406aac555defe9bdd0adec9508116ce7cb1" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/09e650c3a3a7d804430260510534ccbf71c75b2e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9f6958ba2e902f9820c594869bd710ba74b7c4c0" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42109", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:36.218121Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:06.893Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/netfilter/nf_tables_api.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "3325628cb36b", "status": "affected", "version": "f22954f8c58f", "versionType": "git" }, { "lessThan": "4c06c13317b9", "status": "affected", "version": "41841b585e53", "versionType": "git" }, { "lessThan": "55a40406aac5", "status": "affected", "version": "2c9f0293280e", "versionType": "git" }, { "lessThan": "09e650c3a3a7", "status": "affected", "version": "2c9f0293280e", "versionType": "git" }, { "lessThan": "9f6958ba2e90", "status": "affected", "version": "2c9f0293280e", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/netfilter/nf_tables_api.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.5" }, { "lessThan": "6.5", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: unconditionally flush pending work before notifier\n\nsyzbot reports:\n\nKASAN: slab-uaf in nft_ctx_update include/net/netfilter/nf_tables.h:1831\nKASAN: slab-uaf in nft_commit_release net/netfilter/nf_tables_api.c:9530\nKASAN: slab-uaf int nf_tables_trans_destroy_work+0x152b/0x1750 net/netfilter/nf_tables_api.c:9597\nRead of size 2 at addr ffff88802b0051c4 by task kworker/1:1/45\n[..]\nWorkqueue: events nf_tables_trans_destroy_work\nCall Trace:\n nft_ctx_update include/net/netfilter/nf_tables.h:1831 [inline]\n nft_commit_release net/netfilter/nf_tables_api.c:9530 [inline]\n nf_tables_trans_destroy_work+0x152b/0x1750 net/netfilter/nf_tables_api.c:9597\n\nProblem is that the notifier does a conditional flush, but its possible\nthat the table-to-be-removed is still referenced by transactions being\nprocessed by the worker, so we need to flush unconditionally.\n\nWe could make the flush_work depend on whether we found a table to delete\nin nf-next to avoid the flush for most cases.\n\nAFAICS this problem is only exposed in nf-next, with\ncommit e169285f8c56 (\"netfilter: nf_tables: do not store nft_ctx in transaction objects\"),\nwith this commit applied there is an unconditional fetch of\ntable-\u003efamily which is whats triggering the above splat." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:35.327Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/3325628cb36b7f216c5716e7b5124d9dc81199e4" }, { "url": "https://git.kernel.org/stable/c/4c06c13317b9a08decedcd7aaf706691e336277c" }, { "url": "https://git.kernel.org/stable/c/55a40406aac555defe9bdd0adec9508116ce7cb1" }, { "url": "https://git.kernel.org/stable/c/09e650c3a3a7d804430260510534ccbf71c75b2e" }, { "url": "https://git.kernel.org/stable/c/9f6958ba2e902f9820c594869bd710ba74b7c4c0" } ], "title": "netfilter: nf_tables: unconditionally flush pending work before notifier", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42109", "datePublished": "2024-07-30T07:46:04.194Z", "dateReserved": "2024-07-29T15:50:41.176Z", "dateUpdated": "2024-11-05T09:37:35.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41047
Vulnerability from cvelistv5
Published
2024-07-29 14:32
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
i40e: Fix XDP program unloading while removing the driver
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.353Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b399a68054dfb36eed121846ef5fcddba40b7740" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4bc336b2345f1485438c0eb7246d9c8a8d09f8ff" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5266302cb2c74d8ab0e9a69d5752fffaea70496e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0075b8c94d76830c7b6f018f6e4eeb0bf6465fdc" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/01fc5142ae6b06b61ed51a624f2732d6525d8ea3" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41047", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:54.054477Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:02.173Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/intel/i40e/i40e_main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "b399a68054df", "status": "affected", "version": "b82364abc54b", "versionType": "git" }, { "lessThan": "4bc336b2345f", "status": "affected", "version": "6533e558c650", "versionType": "git" }, { "lessThan": "5266302cb2c7", "status": "affected", "version": "6533e558c650", "versionType": "git" }, { "lessThan": "0075b8c94d76", "status": "affected", "version": "6533e558c650", "versionType": "git" }, { "lessThan": "01fc5142ae6b", "status": "affected", "version": "6533e558c650", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/intel/i40e/i40e_main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.17" }, { "lessThan": "5.17", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix XDP program unloading while removing the driver\n\nThe commit 6533e558c650 (\"i40e: Fix reset path while removing\nthe driver\") introduced a new PF state \"__I40E_IN_REMOVE\" to block\nmodifying the XDP program while the driver is being removed.\nUnfortunately, such a change is useful only if the \".ndo_bpf()\"\ncallback was called out of the rmmod context because unloading the\nexisting XDP program is also a part of driver removing procedure.\nIn other words, from the rmmod context the driver is expected to\nunload the XDP program without reporting any errors. Otherwise,\nthe kernel warning with callstack is printed out to dmesg.\n\nExample failing scenario:\n 1. Load the i40e driver.\n 2. Load the XDP program.\n 3. Unload the i40e driver (using \"rmmod\" command).\n\nThe example kernel warning log:\n\n[ +0.004646] WARNING: CPU: 94 PID: 10395 at net/core/dev.c:9290 unregister_netdevice_many_notify+0x7a9/0x870\n[...]\n[ +0.010959] RIP: 0010:unregister_netdevice_many_notify+0x7a9/0x870\n[...]\n[ +0.002726] Call Trace:\n[ +0.002457] \u003cTASK\u003e\n[ +0.002119] ? __warn+0x80/0x120\n[ +0.003245] ? unregister_netdevice_many_notify+0x7a9/0x870\n[ +0.005586] ? report_bug+0x164/0x190\n[ +0.003678] ? handle_bug+0x3c/0x80\n[ +0.003503] ? exc_invalid_op+0x17/0x70\n[ +0.003846] ? asm_exc_invalid_op+0x1a/0x20\n[ +0.004200] ? unregister_netdevice_many_notify+0x7a9/0x870\n[ +0.005579] ? unregister_netdevice_many_notify+0x3cc/0x870\n[ +0.005586] unregister_netdevice_queue+0xf7/0x140\n[ +0.004806] unregister_netdev+0x1c/0x30\n[ +0.003933] i40e_vsi_release+0x87/0x2f0 [i40e]\n[ +0.004604] i40e_remove+0x1a1/0x420 [i40e]\n[ +0.004220] pci_device_remove+0x3f/0xb0\n[ +0.003943] device_release_driver_internal+0x19f/0x200\n[ +0.005243] driver_detach+0x48/0x90\n[ +0.003586] bus_remove_driver+0x6d/0xf0\n[ +0.003939] pci_unregister_driver+0x2e/0xb0\n[ +0.004278] i40e_exit_module+0x10/0x5f0 [i40e]\n[ +0.004570] __do_sys_delete_module.isra.0+0x197/0x310\n[ +0.005153] do_syscall_64+0x85/0x170\n[ +0.003684] ? syscall_exit_to_user_mode+0x69/0x220\n[ +0.004886] ? do_syscall_64+0x95/0x170\n[ +0.003851] ? exc_page_fault+0x7e/0x180\n[ +0.003932] entry_SYSCALL_64_after_hwframe+0x71/0x79\n[ +0.005064] RIP: 0033:0x7f59dc9347cb\n[ +0.003648] Code: 73 01 c3 48 8b 0d 65 16 0c 00 f7 d8 64 89 01 48 83\nc8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 b0 00 00 00 0f\n05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 35 16 0c 00 f7 d8 64 89 01 48\n[ +0.018753] RSP: 002b:00007ffffac99048 EFLAGS: 00000206 ORIG_RAX: 00000000000000b0\n[ +0.007577] RAX: ffffffffffffffda RBX: 0000559b9bb2f6e0 RCX: 00007f59dc9347cb\n[ +0.007140] RDX: 0000000000000000 RSI: 0000000000000800 RDI: 0000559b9bb2f748\n[ +0.007146] RBP: 00007ffffac99070 R08: 1999999999999999 R09: 0000000000000000\n[ +0.007133] R10: 00007f59dc9a5ac0 R11: 0000000000000206 R12: 0000000000000000\n[ +0.007141] R13: 00007ffffac992d8 R14: 0000559b9bb2f6e0 R15: 0000000000000000\n[ +0.007151] \u003c/TASK\u003e\n[ +0.002204] ---[ end trace 0000000000000000 ]---\n\nFix this by checking if the XDP program is being loaded or unloaded.\nThen, block only loading a new program while \"__I40E_IN_REMOVE\" is set.\nAlso, move testing \"__I40E_IN_REMOVE\" flag to the beginning of XDP_SETUP\ncallback to avoid unnecessary operations and checks." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:38.083Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/b399a68054dfb36eed121846ef5fcddba40b7740" }, { "url": "https://git.kernel.org/stable/c/4bc336b2345f1485438c0eb7246d9c8a8d09f8ff" }, { "url": "https://git.kernel.org/stable/c/5266302cb2c74d8ab0e9a69d5752fffaea70496e" }, { "url": "https://git.kernel.org/stable/c/0075b8c94d76830c7b6f018f6e4eeb0bf6465fdc" }, { "url": "https://git.kernel.org/stable/c/01fc5142ae6b06b61ed51a624f2732d6525d8ea3" } ], "title": "i40e: Fix XDP program unloading while removing the driver", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41047", "datePublished": "2024-07-29T14:32:04.402Z", "dateReserved": "2024-07-12T12:17:45.625Z", "dateUpdated": "2024-11-05T09:35:38.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42067
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.321Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/08f6c05feb1db21653e98ca84ea04ca032d014c7" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9fef36cad60d4226f9d06953cd56d1d2f9119730" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/044da7ae7afd4ef60806d73654a2e6a79aa4ed7a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e60adf513275c3a38e5cb67f7fd12387e43a3ff5" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42067", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:56.137791Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:58.173Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "arch/arm/net/bpf_jit_32.c", "arch/loongarch/net/bpf_jit.c", "arch/mips/net/bpf_jit_comp.c", "arch/parisc/net/bpf_jit_core.c", "arch/s390/net/bpf_jit_comp.c", "arch/sparc/net/bpf_jit_comp_64.c", "arch/x86/net/bpf_jit_comp32.c", "include/linux/filter.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "08f6c05feb1d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "9fef36cad60d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "044da7ae7afd", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "e60adf513275", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "arch/arm/net/bpf_jit_32.c", "arch/loongarch/net/bpf_jit.c", "arch/mips/net/bpf_jit_comp.c", "arch/parisc/net/bpf_jit_core.c", "arch/s390/net/bpf_jit_comp.c", "arch/sparc/net/bpf_jit_comp_64.c", "arch/x86/net/bpf_jit_comp32.c", "include/linux/filter.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.38", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro()\n\nset_memory_rox() can fail, leaving memory unprotected.\n\nCheck return and bail out when bpf_jit_binary_lock_ro() returns\nan error." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:45.735Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/08f6c05feb1db21653e98ca84ea04ca032d014c7" }, { "url": "https://git.kernel.org/stable/c/9fef36cad60d4226f9d06953cd56d1d2f9119730" }, { "url": "https://git.kernel.org/stable/c/044da7ae7afd4ef60806d73654a2e6a79aa4ed7a" }, { "url": "https://git.kernel.org/stable/c/e60adf513275c3a38e5cb67f7fd12387e43a3ff5" } ], "title": "bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro()", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42067", "datePublished": "2024-07-29T15:52:31.825Z", "dateReserved": "2024-07-29T15:50:41.168Z", "dateUpdated": "2024-11-05T09:36:45.735Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42127
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
drm/lima: fix shared irq handling on driver remove
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0d60c43df59ef01c08dc7b0c45495178f9d05a13" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/25d0d9b83d855cbc5d5aa5ae3cd79d55ea0c84a8" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/17fe8b75aaf0bb1bdc31368963446b421c22d0af" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0a487e977cb8897ae4c51ecd34bbaa2b005266c9" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/04d531b9a1875846d4f89953b469ad463aa7a770" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b5daf9217a50636a969bc1965f827878aeb09ffe" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a6683c690bbfd1f371510cb051e8fa49507f3f5e" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42127", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:38.392074Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:04.418Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/lima/lima_gp.c", "drivers/gpu/drm/lima/lima_mmu.c", "drivers/gpu/drm/lima/lima_pp.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "0d60c43df59e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "25d0d9b83d85", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "17fe8b75aaf0", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "0a487e977cb8", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "04d531b9a187", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "b5daf9217a50", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "a6683c690bbf", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/lima/lima_gp.c", "drivers/gpu/drm/lima/lima_mmu.c", "drivers/gpu/drm/lima/lima_pp.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/lima: fix shared irq handling on driver remove\n\nlima uses a shared interrupt, so the interrupt handlers must be prepared\nto be called at any time. At driver removal time, the clocks are\ndisabled early and the interrupts stay registered until the very end of\nthe remove process due to the devm usage.\nThis is potentially a bug as the interrupts access device registers\nwhich assumes clocks are enabled. A crash can be triggered by removing\nthe driver in a kernel with CONFIG_DEBUG_SHIRQ enabled.\nThis patch frees the interrupts at each lima device finishing callback\nso that the handlers are already unregistered by the time we fully\ndisable clocks." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:55.783Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/0d60c43df59ef01c08dc7b0c45495178f9d05a13" }, { "url": "https://git.kernel.org/stable/c/25d0d9b83d855cbc5d5aa5ae3cd79d55ea0c84a8" }, { "url": "https://git.kernel.org/stable/c/17fe8b75aaf0bb1bdc31368963446b421c22d0af" }, { "url": "https://git.kernel.org/stable/c/0a487e977cb8897ae4c51ecd34bbaa2b005266c9" }, { "url": "https://git.kernel.org/stable/c/04d531b9a1875846d4f89953b469ad463aa7a770" }, { "url": "https://git.kernel.org/stable/c/b5daf9217a50636a969bc1965f827878aeb09ffe" }, { "url": "https://git.kernel.org/stable/c/a6683c690bbfd1f371510cb051e8fa49507f3f5e" } ], "title": "drm/lima: fix shared irq handling on driver remove", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42127", "datePublished": "2024-07-30T07:46:24.070Z", "dateReserved": "2024-07-29T15:50:41.184Z", "dateUpdated": "2024-11-05T09:37:55.783Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42136
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
cdrom: rearrange last_media_change check to avoid unintentional overflow
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0c97527e916054acc4a46ffb02842988acb2e92b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3ee21e14c8c329168a0b66bab00ecd18f5d0dee3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e809bc112712da8f7e15822674c6562da6cdf24c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/efb905aeb44b0e99c0e6b07865b1885ae0471ebf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42136", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:09.572102Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:35.937Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/cdrom/cdrom.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "0c97527e9160", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "3ee21e14c8c3", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "e809bc112712", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "efb905aeb44b", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/cdrom/cdrom.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncdrom: rearrange last_media_change check to avoid unintentional overflow\n\nWhen running syzkaller with the newly reintroduced signed integer wrap\nsanitizer we encounter this splat:\n\n[ 366.015950] UBSAN: signed-integer-overflow in ../drivers/cdrom/cdrom.c:2361:33\n[ 366.021089] -9223372036854775808 - 346321 cannot be represented in type \u0027__s64\u0027 (aka \u0027long long\u0027)\n[ 366.025894] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO\n[ 366.027502] CPU: 5 PID: 28472 Comm: syz-executor.7 Not tainted 6.8.0-rc2-00035-gb3ef86b5a957 #1\n[ 366.027512] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 366.027518] Call Trace:\n[ 366.027523] \u003cTASK\u003e\n[ 366.027533] dump_stack_lvl+0x93/0xd0\n[ 366.027899] handle_overflow+0x171/0x1b0\n[ 366.038787] ata1.00: invalid multi_count 32 ignored\n[ 366.043924] cdrom_ioctl+0x2c3f/0x2d10\n[ 366.063932] ? __pm_runtime_resume+0xe6/0x130\n[ 366.071923] sr_block_ioctl+0x15d/0x1d0\n[ 366.074624] ? __pfx_sr_block_ioctl+0x10/0x10\n[ 366.077642] blkdev_ioctl+0x419/0x500\n[ 366.080231] ? __pfx_blkdev_ioctl+0x10/0x10\n...\n\nHistorically, the signed integer overflow sanitizer did not work in the\nkernel due to its interaction with `-fwrapv` but this has since been\nchanged [1] in the newest version of Clang. It was re-enabled in the\nkernel with Commit 557f8c582a9ba8ab (\"ubsan: Reintroduce signed overflow\nsanitizer\").\n\nLet\u0027s rearrange the check to not perform any arithmetic, thus not\ntripping the sanitizer." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:05.978Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/0c97527e916054acc4a46ffb02842988acb2e92b" }, { "url": "https://git.kernel.org/stable/c/3ee21e14c8c329168a0b66bab00ecd18f5d0dee3" }, { "url": "https://git.kernel.org/stable/c/e809bc112712da8f7e15822674c6562da6cdf24c" }, { "url": "https://git.kernel.org/stable/c/efb905aeb44b0e99c0e6b07865b1885ae0471ebf" } ], "title": "cdrom: rearrange last_media_change check to avoid unintentional overflow", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42136", "datePublished": "2024-07-30T07:46:30.975Z", "dateReserved": "2024-07-29T15:50:41.187Z", "dateUpdated": "2024-11-05T09:38:05.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42225
Vulnerability from cvelistv5
Published
2024-07-30 07:47
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
wifi: mt76: replace skb_put with skb_put_zero
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.565Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/dc7f14d00d0c4c21898f3504607f4a31079065a2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/22ea2a7f0b64d323625950414a4496520fb33657" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ff6b26be13032c5fbd6b6a0b24358f8eaac4f3af" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/64f86337ccfe77fe3be5a9356b0dabde23fbb074" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7f819a2f4fbc510e088b49c79addcf1734503578" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42225", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:14:38.019669Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:33.317Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/wireless/mediatek/mt76/mt76_connac_mcu.c", "drivers/net/wireless/mediatek/mt76/mt7915/mcu.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "dc7f14d00d0c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "22ea2a7f0b64", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "ff6b26be1303", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "64f86337ccfe", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "7f819a2f4fbc", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/wireless/mediatek/mt76/mt76_connac_mcu.c", "drivers/net/wireless/mediatek/mt76/mt7915/mcu.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: replace skb_put with skb_put_zero\n\nAvoid potentially reusing uninitialized data" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:37.163Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/dc7f14d00d0c4c21898f3504607f4a31079065a2" }, { "url": "https://git.kernel.org/stable/c/22ea2a7f0b64d323625950414a4496520fb33657" }, { "url": "https://git.kernel.org/stable/c/ff6b26be13032c5fbd6b6a0b24358f8eaac4f3af" }, { "url": "https://git.kernel.org/stable/c/64f86337ccfe77fe3be5a9356b0dabde23fbb074" }, { "url": "https://git.kernel.org/stable/c/7f819a2f4fbc510e088b49c79addcf1734503578" } ], "title": "wifi: mt76: replace skb_put with skb_put_zero", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42225", "datePublished": "2024-07-30T07:47:06.397Z", "dateReserved": "2024-07-30T07:40:12.250Z", "dateUpdated": "2024-11-05T09:38:37.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41038
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.155Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6619aa48a011364e9f29083cc76368e6acfe5b11" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/76ea8e13aaefdfda6e5601323d6ea5340359dcfa" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/014239b9971d79421a0ba652579e1ca1b7b57b6d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2163aff6bebbb752edf73f79700f5e2095f3559e" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41038", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:23:23.396612Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:03.220Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/firmware/cirrus/cs_dsp.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "6619aa48a011", "status": "affected", "version": "f6bc909e7673", "versionType": "git" }, { "lessThan": "76ea8e13aaef", "status": "affected", "version": "f6bc909e7673", "versionType": "git" }, { "lessThan": "014239b9971d", "status": "affected", "version": "f6bc909e7673", "versionType": "git" }, { "lessThan": "2163aff6bebb", "status": "affected", "version": "f6bc909e7673", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/firmware/cirrus/cs_dsp.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.16" }, { "lessThan": "5.16", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers\n\nCheck that all fields of a V2 algorithm header fit into the available\nfirmware data buffer.\n\nThe wmfw V2 format introduced variable-length strings in the algorithm\nblock header. This means the overall header length is variable, and the\nposition of most fields varies depending on the length of the string\nfields. Each field must be checked to ensure that it does not overflow\nthe firmware data buffer.\n\nAs this ia bugfix patch, the fixes avoid making any significant change to\nthe existing code. This makes it easier to review and less likely to\nintroduce new bugs." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:27.925Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/6619aa48a011364e9f29083cc76368e6acfe5b11" }, { "url": "https://git.kernel.org/stable/c/76ea8e13aaefdfda6e5601323d6ea5340359dcfa" }, { "url": "https://git.kernel.org/stable/c/014239b9971d79421a0ba652579e1ca1b7b57b6d" }, { "url": "https://git.kernel.org/stable/c/2163aff6bebbb752edf73f79700f5e2095f3559e" } ], "title": "firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41038", "datePublished": "2024-07-29T14:31:52.415Z", "dateReserved": "2024-07-12T12:17:45.620Z", "dateUpdated": "2024-11-05T09:35:27.925Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41029
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
nvmem: core: limit cell sysfs permissions to main attribute ones
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.091Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/aa066afaaac32caf2160d58d4e3010ee04421c62" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6bef98bafd82903a8d461463f9594f19f1fd6a85" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41029", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:23:59.034888Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:04.140Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/nvmem/core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "aa066afaaac3", "status": "affected", "version": "0331c611949f", "versionType": "git" }, { "lessThan": "6bef98bafd82", "status": "affected", "version": "0331c611949f", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/nvmem/core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.8" }, { "lessThan": "6.8", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmem: core: limit cell sysfs permissions to main attribute ones\n\nThe cell sysfs attribute should not provide more access to the nvmem\ndata than the main attribute itself.\nFor example if nvme_config::root_only was set, the cell attribute\nwould still provide read access to everybody.\n\nMask out permissions not available on the main attribute." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:17.626Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/aa066afaaac32caf2160d58d4e3010ee04421c62" }, { "url": "https://git.kernel.org/stable/c/6bef98bafd82903a8d461463f9594f19f1fd6a85" } ], "title": "nvmem: core: limit cell sysfs permissions to main attribute ones", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41029", "datePublished": "2024-07-29T14:31:45.465Z", "dateReserved": "2024-07-12T12:17:45.618Z", "dateUpdated": "2024-11-05T09:35:17.626Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42153
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a349e5ab4dc9954746e836cd10b407ce48f9b2f6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/effe0500afda017a86c94482b1e36bc37586c9af" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2849a1b747cf37aa5b684527104d3a53f1e296d2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3503372d0bf7b324ec0bd6b90606703991426176" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3d32327f5cfc087ee3922a3bcdcc29880dcdb50f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/92e494a7568b60ae80d57fc0deafcaf3a4029ab3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/27cd3873fa76ebeb9f948baae40cb9a6d8692289" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f63b94be6942ba82c55343e196bd09b53227618e" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42153", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:18.348339Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:34.334Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/i2c/busses/i2c-pnx.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "a349e5ab4dc9", "status": "affected", "version": "41561f28e76a", "versionType": "git" }, { "lessThan": "effe0500afda", "status": "affected", "version": "41561f28e76a", "versionType": "git" }, { "lessThan": "2849a1b747cf", "status": "affected", "version": "41561f28e76a", "versionType": "git" }, { "lessThan": "3503372d0bf7", "status": "affected", "version": "41561f28e76a", "versionType": "git" }, { "lessThan": "3d32327f5cfc", "status": "affected", "version": "41561f28e76a", "versionType": "git" }, { "lessThan": "92e494a7568b", "status": "affected", "version": "41561f28e76a", "versionType": "git" }, { "lessThan": "27cd3873fa76", "status": "affected", "version": "41561f28e76a", "versionType": "git" }, { "lessThan": "f63b94be6942", "status": "affected", "version": "41561f28e76a", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/i2c/busses/i2c-pnx.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "2.6.20" }, { "lessThan": "2.6.20", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.318", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.280", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr\n\nWhen del_timer_sync() is called in an interrupt context it throws a warning\nbecause of potential deadlock. The timer is used only to exit from\nwait_for_completion() after a timeout so replacing the call with\nwait_for_completion_timeout() allows to remove the problematic timer and\nits related functions altogether." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:23.672Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/a349e5ab4dc9954746e836cd10b407ce48f9b2f6" }, { "url": "https://git.kernel.org/stable/c/effe0500afda017a86c94482b1e36bc37586c9af" }, { "url": "https://git.kernel.org/stable/c/2849a1b747cf37aa5b684527104d3a53f1e296d2" }, { "url": "https://git.kernel.org/stable/c/3503372d0bf7b324ec0bd6b90606703991426176" }, { "url": "https://git.kernel.org/stable/c/3d32327f5cfc087ee3922a3bcdcc29880dcdb50f" }, { "url": "https://git.kernel.org/stable/c/92e494a7568b60ae80d57fc0deafcaf3a4029ab3" }, { "url": "https://git.kernel.org/stable/c/27cd3873fa76ebeb9f948baae40cb9a6d8692289" }, { "url": "https://git.kernel.org/stable/c/f63b94be6942ba82c55343e196bd09b53227618e" } ], "title": "i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42153", "datePublished": "2024-07-30T07:46:45.724Z", "dateReserved": "2024-07-29T15:50:41.193Z", "dateUpdated": "2024-11-05T09:38:23.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41032
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
mm: vmalloc: check if a hash-index is in cpu_possible_mask
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.073Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/28acd531c9a365dac01b32e6bc54aed8c1429bcb" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/47f9b6e49b422392fb0e348a65eb925103ba1882" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a34acf30b19bc4ee3ba2f1082756ea2604c19138" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41032", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:23:43.996353Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:03.799Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "mm/vmalloc.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "28acd531c9a3", "status": "affected", "version": "062eacf57ad9", "versionType": "git" }, { "lessThan": "47f9b6e49b42", "status": "affected", "version": "062eacf57ad9", "versionType": "git" }, { "lessThan": "a34acf30b19b", "status": "affected", "version": "062eacf57ad9", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "mm/vmalloc.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.4" }, { "lessThan": "6.4", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: vmalloc: check if a hash-index is in cpu_possible_mask\n\nThe problem is that there are systems where cpu_possible_mask has gaps\nbetween set CPUs, for example SPARC. In this scenario addr_to_vb_xa()\nhash function can return an index which accesses to not-possible and not\nsetup CPU area using per_cpu() macro. This results in an oops on SPARC.\n\nA per-cpu vmap_block_queue is also used as hash table, incorrectly\nassuming the cpu_possible_mask has no gaps. Fix it by adjusting an index\nto a next possible CPU." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:20.898Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/28acd531c9a365dac01b32e6bc54aed8c1429bcb" }, { "url": "https://git.kernel.org/stable/c/47f9b6e49b422392fb0e348a65eb925103ba1882" }, { "url": "https://git.kernel.org/stable/c/a34acf30b19bc4ee3ba2f1082756ea2604c19138" } ], "title": "mm: vmalloc: check if a hash-index is in cpu_possible_mask", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41032", "datePublished": "2024-07-29T14:31:47.600Z", "dateReserved": "2024-07-12T12:17:45.619Z", "dateUpdated": "2024-11-05T09:35:20.898Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41028
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
platform/x86: toshiba_acpi: Fix array out-of-bounds access
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.186Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e030aa6c972641cb069086a8c7a0f747653e472a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/639868f1cb87b683cf830353bbee0c4078202313" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0d71da43d6b7916d36cf1953d793da80433c50bf" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b6e02c6b0377d4339986e07aeb696c632cd392aa" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41028", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:24:02.601705Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:04.253Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/platform/x86/toshiba_acpi.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "e030aa6c9726", "status": "affected", "version": "3cb1f40dfdc3", "versionType": "git" }, { "lessThan": "639868f1cb87", "status": "affected", "version": "3cb1f40dfdc3", "versionType": "git" }, { "lessThan": "0d71da43d6b7", "status": "affected", "version": "3cb1f40dfdc3", "versionType": "git" }, { "lessThan": "b6e02c6b0377", "status": "affected", "version": "3cb1f40dfdc3", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/platform/x86/toshiba_acpi.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.1" }, { "lessThan": "6.1", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: toshiba_acpi: Fix array out-of-bounds access\n\nIn order to use toshiba_dmi_quirks[] together with the standard DMI\nmatching functions, it must be terminated by a empty entry.\n\nSince this entry is missing, an array out-of-bounds access occurs\nevery time the quirk list is processed.\n\nFix this by adding the terminating empty entry." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:16.520Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/e030aa6c972641cb069086a8c7a0f747653e472a" }, { "url": "https://git.kernel.org/stable/c/639868f1cb87b683cf830353bbee0c4078202313" }, { "url": "https://git.kernel.org/stable/c/0d71da43d6b7916d36cf1953d793da80433c50bf" }, { "url": "https://git.kernel.org/stable/c/b6e02c6b0377d4339986e07aeb696c632cd392aa" } ], "title": "platform/x86: toshiba_acpi: Fix array out-of-bounds access", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41028", "datePublished": "2024-07-29T14:31:44.704Z", "dateReserved": "2024-07-12T12:17:45.617Z", "dateUpdated": "2024-11-05T09:35:16.520Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41077
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
null_blk: fix validation of block size
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.417Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9625afe1dd4a158a14bb50f81af9e2dac634c0b1" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9b873bdaae64bddade9d8c6df23c8a31948d47d0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2772ed2fc075eef7df3789906fc9dae01e4e132e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/08f03186b96e25e3154916a2e70732557c770ea7" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f92409a9da02f27d05d713bff5f865e386cef9b3" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c462ecd659b5fce731f1d592285832fd6ad54053" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41077", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:17.956039Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:59.836Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/block/null_blk/main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "9625afe1dd4a", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "9b873bdaae64", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "2772ed2fc075", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "08f03186b96e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "f92409a9da02", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "c462ecd659b5", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/block/null_blk/main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.223", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.164", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnull_blk: fix validation of block size\n\nBlock size should be between 512 and PAGE_SIZE and be a power of 2. The current\ncheck does not validate this, so update the check.\n\nWithout this patch, null_blk would Oops due to a null pointer deref when\nloaded with bs=1536 [1].\n\n\n[axboe: remove unnecessary braces and != 0 check]" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:16.220Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/9625afe1dd4a158a14bb50f81af9e2dac634c0b1" }, { "url": "https://git.kernel.org/stable/c/9b873bdaae64bddade9d8c6df23c8a31948d47d0" }, { "url": "https://git.kernel.org/stable/c/2772ed2fc075eef7df3789906fc9dae01e4e132e" }, { "url": "https://git.kernel.org/stable/c/08f03186b96e25e3154916a2e70732557c770ea7" }, { "url": "https://git.kernel.org/stable/c/f92409a9da02f27d05d713bff5f865e386cef9b3" }, { "url": "https://git.kernel.org/stable/c/c462ecd659b5fce731f1d592285832fd6ad54053" } ], "title": "null_blk: fix validation of block size", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41077", "datePublished": "2024-07-29T14:57:36.680Z", "dateReserved": "2024-07-12T12:17:45.632Z", "dateUpdated": "2024-11-05T09:36:16.220Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41027
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
Fix userfaultfd_api to return EINVAL as expected
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/519547760f16eae7803d2658d9524bc5ba7a20a7" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/14875fd5f9bcf60ac5518c63bfb676ade44aa7c6" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/cd94cac4069a763ab5206be2c64c9a8beae590ba" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8111f902b7c95d75fc80c7e577f5045886c6b384" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1723f04caacb32cadc4e063725d836a0c4450694" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41027", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:24:05.908996Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:04.366Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/userfaultfd.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "519547760f16", "status": "affected", "version": "e06f1e1dd499", "versionType": "git" }, { "lessThan": "14875fd5f9bc", "status": "affected", "version": "e06f1e1dd499", "versionType": "git" }, { "lessThan": "cd94cac4069a", "status": "affected", "version": "e06f1e1dd499", "versionType": "git" }, { "lessThan": "8111f902b7c9", "status": "affected", "version": "e06f1e1dd499", "versionType": "git" }, { "lessThan": "1723f04caacb", "status": "affected", "version": "e06f1e1dd499", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/userfaultfd.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.7" }, { "lessThan": "5.7", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nFix userfaultfd_api to return EINVAL as expected\n\nCurrently if we request a feature that is not set in the Kernel config we\nfail silently and return all the available features. However, the man\npage indicates we should return an EINVAL.\n\nWe need to fix this issue since we can end up with a Kernel warning should\na program request the feature UFFD_FEATURE_WP_UNPOPULATED on a kernel with\nthe config not set with this feature.\n\n [ 200.812896] WARNING: CPU: 91 PID: 13634 at mm/memory.c:1660 zap_pte_range+0x43d/0x660\n [ 200.820738] Modules linked in:\n [ 200.869387] CPU: 91 PID: 13634 Comm: userfaultfd Kdump: loaded Not tainted 6.9.0-rc5+ #8\n [ 200.877477] Hardware name: Dell Inc. PowerEdge R6525/0N7YGH, BIOS 2.7.3 03/30/2022\n [ 200.885052] RIP: 0010:zap_pte_range+0x43d/0x660" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:15.428Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/519547760f16eae7803d2658d9524bc5ba7a20a7" }, { "url": "https://git.kernel.org/stable/c/14875fd5f9bcf60ac5518c63bfb676ade44aa7c6" }, { "url": "https://git.kernel.org/stable/c/cd94cac4069a763ab5206be2c64c9a8beae590ba" }, { "url": "https://git.kernel.org/stable/c/8111f902b7c95d75fc80c7e577f5045886c6b384" }, { "url": "https://git.kernel.org/stable/c/1723f04caacb32cadc4e063725d836a0c4450694" } ], "title": "Fix userfaultfd_api to return EINVAL as expected", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41027", "datePublished": "2024-07-29T14:31:43.859Z", "dateReserved": "2024-07-12T12:17:45.617Z", "dateUpdated": "2024-11-05T09:35:15.428Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41040
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
net/sched: Fix UAF when resolving a clash
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b81a523d54ea689414f67c9fb81a5b917a41ed55" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2b4d68df3f57ea746c430941ba9c03d7d8b5a23f" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4e71b10a100861fb27d9c5755dfd68f615629fae" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/799a34901b634008db4a7ece3900e2b971d4c932" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ef472cc6693b16b202a916482df72f35d94bd69e" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/26488172b0292bed837b95a006a3f3431d1898c3" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41040", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:23:16.958477Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:02.954Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/sched/act_ct.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "b81a523d54ea", "status": "affected", "version": "f07c54831477", "versionType": "git" }, { "lessThan": "2b4d68df3f57", "status": "affected", "version": "0cc254e5aa37", "versionType": "git" }, { "lessThan": "4e71b10a1008", "status": "affected", "version": "0cc254e5aa37", "versionType": "git" }, { "lessThan": "799a34901b63", "status": "affected", "version": "0cc254e5aa37", "versionType": "git" }, { "lessThan": "ef472cc6693b", "status": "affected", "version": "0cc254e5aa37", "versionType": "git" }, { "lessThan": "26488172b029", "status": "affected", "version": "0cc254e5aa37", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/sched/act_ct.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.13" }, { "lessThan": "5.13", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Fix UAF when resolving a clash\n\nKASAN reports the following UAF:\n\n BUG: KASAN: slab-use-after-free in tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct]\n Read of size 1 at addr ffff888c07603600 by task handler130/6469\n\n Call Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x48/0x70\n print_address_description.constprop.0+0x33/0x3d0\n print_report+0xc0/0x2b0\n kasan_report+0xd0/0x120\n __asan_load1+0x6c/0x80\n tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct]\n tcf_ct_act+0x886/0x1350 [act_ct]\n tcf_action_exec+0xf8/0x1f0\n fl_classify+0x355/0x360 [cls_flower]\n __tcf_classify+0x1fd/0x330\n tcf_classify+0x21c/0x3c0\n sch_handle_ingress.constprop.0+0x2c5/0x500\n __netif_receive_skb_core.constprop.0+0xb25/0x1510\n __netif_receive_skb_list_core+0x220/0x4c0\n netif_receive_skb_list_internal+0x446/0x620\n napi_complete_done+0x157/0x3d0\n gro_cell_poll+0xcf/0x100\n __napi_poll+0x65/0x310\n net_rx_action+0x30c/0x5c0\n __do_softirq+0x14f/0x491\n __irq_exit_rcu+0x82/0xc0\n irq_exit_rcu+0xe/0x20\n common_interrupt+0xa1/0xb0\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n asm_common_interrupt+0x27/0x40\n\n Allocated by task 6469:\n kasan_save_stack+0x38/0x70\n kasan_set_track+0x25/0x40\n kasan_save_alloc_info+0x1e/0x40\n __kasan_krealloc+0x133/0x190\n krealloc+0xaa/0x130\n nf_ct_ext_add+0xed/0x230 [nf_conntrack]\n tcf_ct_act+0x1095/0x1350 [act_ct]\n tcf_action_exec+0xf8/0x1f0\n fl_classify+0x355/0x360 [cls_flower]\n __tcf_classify+0x1fd/0x330\n tcf_classify+0x21c/0x3c0\n sch_handle_ingress.constprop.0+0x2c5/0x500\n __netif_receive_skb_core.constprop.0+0xb25/0x1510\n __netif_receive_skb_list_core+0x220/0x4c0\n netif_receive_skb_list_internal+0x446/0x620\n napi_complete_done+0x157/0x3d0\n gro_cell_poll+0xcf/0x100\n __napi_poll+0x65/0x310\n net_rx_action+0x30c/0x5c0\n __do_softirq+0x14f/0x491\n\n Freed by task 6469:\n kasan_save_stack+0x38/0x70\n kasan_set_track+0x25/0x40\n kasan_save_free_info+0x2b/0x60\n ____kasan_slab_free+0x180/0x1f0\n __kasan_slab_free+0x12/0x30\n slab_free_freelist_hook+0xd2/0x1a0\n __kmem_cache_free+0x1a2/0x2f0\n kfree+0x78/0x120\n nf_conntrack_free+0x74/0x130 [nf_conntrack]\n nf_ct_destroy+0xb2/0x140 [nf_conntrack]\n __nf_ct_resolve_clash+0x529/0x5d0 [nf_conntrack]\n nf_ct_resolve_clash+0xf6/0x490 [nf_conntrack]\n __nf_conntrack_confirm+0x2c6/0x770 [nf_conntrack]\n tcf_ct_act+0x12ad/0x1350 [act_ct]\n tcf_action_exec+0xf8/0x1f0\n fl_classify+0x355/0x360 [cls_flower]\n __tcf_classify+0x1fd/0x330\n tcf_classify+0x21c/0x3c0\n sch_handle_ingress.constprop.0+0x2c5/0x500\n __netif_receive_skb_core.constprop.0+0xb25/0x1510\n __netif_receive_skb_list_core+0x220/0x4c0\n netif_receive_skb_list_internal+0x446/0x620\n napi_complete_done+0x157/0x3d0\n gro_cell_poll+0xcf/0x100\n __napi_poll+0x65/0x310\n net_rx_action+0x30c/0x5c0\n __do_softirq+0x14f/0x491\n\nThe ct may be dropped if a clash has been resolved but is still passed to\nthe tcf_ct_flow_table_process_conn function for further usage. This issue\ncan be fixed by retrieving ct from skb again after confirming conntrack." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:30.145Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/b81a523d54ea689414f67c9fb81a5b917a41ed55" }, { "url": "https://git.kernel.org/stable/c/2b4d68df3f57ea746c430941ba9c03d7d8b5a23f" }, { "url": "https://git.kernel.org/stable/c/4e71b10a100861fb27d9c5755dfd68f615629fae" }, { "url": "https://git.kernel.org/stable/c/799a34901b634008db4a7ece3900e2b971d4c932" }, { "url": "https://git.kernel.org/stable/c/ef472cc6693b16b202a916482df72f35d94bd69e" }, { "url": "https://git.kernel.org/stable/c/26488172b0292bed837b95a006a3f3431d1898c3" } ], "title": "net/sched: Fix UAF when resolving a clash", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41040", "datePublished": "2024-07-29T14:31:53.853Z", "dateReserved": "2024-07-12T12:17:45.621Z", "dateUpdated": "2024-11-05T09:35:30.145Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42118
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
drm/amd/display: Do not return negative stream id for array
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.598Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a76fa9c4f0fc0aa6f517da3fa7d7c23e8a32c7d0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3ac31c9a707dd1c7c890b95333182f955e9dcb57" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42118", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:07.089426Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:05.637Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/core/dc_resource.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "a76fa9c4f0fc", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "3ac31c9a707d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/core/dc_resource.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Do not return negative stream id for array\n\n[WHY]\nresource_stream_to_stream_idx returns an array index and it return -1\nwhen not found; however, -1 is not a valid array index number.\n\n[HOW]\nWhen this happens, call ASSERT(), and return a zero instead.\n\nThis fixes an OVERRUN and an NEGATIVE_RETURNS issues reported by Coverity." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:45.684Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/a76fa9c4f0fc0aa6f517da3fa7d7c23e8a32c7d0" }, { "url": "https://git.kernel.org/stable/c/3ac31c9a707dd1c7c890b95333182f955e9dcb57" } ], "title": "drm/amd/display: Do not return negative stream id for array", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42118", "datePublished": "2024-07-30T07:46:10.486Z", "dateReserved": "2024-07-29T15:50:41.178Z", "dateUpdated": "2024-11-05T09:37:45.684Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41021
Vulnerability from cvelistv5
Published
2024-07-29 13:34
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
s390/mm: Fix VM_FAULT_HWPOISON handling in do_exception()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.086Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9e13767ccefdc4f8aa92514b592b60f6b54882ff" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a3aefb871222a9880602d1a44a558177b4143e3b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/df39038cd89525d465c2c8827eb64116873f141a" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41021", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:24:25.420989Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:05.114Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "arch/s390/mm/fault.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "73a9260b7366", "status": "affected", "version": "af19487f00f3", "versionType": "git" }, { "lessThan": "9e13767ccefd", "status": "affected", "version": "af19487f00f3", "versionType": "git" }, { "lessThan": "a3aefb871222", "status": "affected", "version": "af19487f00f3", "versionType": "git" }, { "lessThan": "df39038cd895", "status": "affected", "version": "af19487f00f3", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "arch/s390/mm/fault.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.6" }, { "lessThan": "6.6", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.44", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.12", "versionType": "semver" }, { "lessThanOrEqual": "6.10.*", "status": "unaffected", "version": "6.10.2", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.11", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix VM_FAULT_HWPOISON handling in do_exception()\n\nThere is no support for HWPOISON, MEMORY_FAILURE, or ARCH_HAS_COPY_MC on\ns390. Therefore we do not expect to see VM_FAULT_HWPOISON in\ndo_exception().\n\nHowever, since commit af19487f00f3 (\"mm: make PTE_MARKER_SWAPIN_ERROR more\ngeneral\"), it is possible to see VM_FAULT_HWPOISON in combination with\nPTE_MARKER_POISONED, even on architectures that do not support HWPOISON\notherwise. In this case, we will end up on the BUG() in do_exception().\n\nFix this by treating VM_FAULT_HWPOISON the same as VM_FAULT_SIGBUS, similar\nto x86 when MEMORY_FAILURE is not configured. Also print unexpected fault\nflags, for easier debugging.\n\nNote that VM_FAULT_HWPOISON_LARGE is not expected, because s390 cannot\nsupport swap entries on other levels than PTE level." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:08.602Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/73a9260b7366d2906ec011e100319359fe2277d0" }, { "url": "https://git.kernel.org/stable/c/9e13767ccefdc4f8aa92514b592b60f6b54882ff" }, { "url": "https://git.kernel.org/stable/c/a3aefb871222a9880602d1a44a558177b4143e3b" }, { "url": "https://git.kernel.org/stable/c/df39038cd89525d465c2c8827eb64116873f141a" } ], "title": "s390/mm: Fix VM_FAULT_HWPOISON handling in do_exception()", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41021", "datePublished": "2024-07-29T13:34:22.636Z", "dateReserved": "2024-07-12T12:17:45.613Z", "dateUpdated": "2024-11-05T09:35:08.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41025
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
misc: fastrpc: Fix memory leak in audio daemon attach operation
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.182Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8b8b82dcf393ceaca8c88939338fd4c30b5b11b2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/dbf4c31c9b039fd9734da156036492a2a7f78f64" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ad0bd973a033003ca578c42a760d1dc77aeea15e" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41025", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:24:12.469695Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:04.602Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/misc/fastrpc.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "8b8b82dcf393", "status": "affected", "version": "0871561055e6", "versionType": "git" }, { "lessThan": "dbf4c31c9b03", "status": "affected", "version": "0871561055e6", "versionType": "git" }, { "lessThan": "ad0bd973a033", "status": "affected", "version": "0871561055e6", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/misc/fastrpc.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.2" }, { "lessThan": "6.2", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: Fix memory leak in audio daemon attach operation\n\nAudio PD daemon send the name as part of the init IOCTL call. This\nname needs to be copied to kernel for which memory is allocated.\nThis memory is never freed which might result in memory leak. Free\nthe memory when it is not needed." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:13.232Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/8b8b82dcf393ceaca8c88939338fd4c30b5b11b2" }, { "url": "https://git.kernel.org/stable/c/dbf4c31c9b039fd9734da156036492a2a7f78f64" }, { "url": "https://git.kernel.org/stable/c/ad0bd973a033003ca578c42a760d1dc77aeea15e" } ], "title": "misc: fastrpc: Fix memory leak in audio daemon attach operation", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41025", "datePublished": "2024-07-29T14:31:42.275Z", "dateReserved": "2024-07-12T12:17:45.615Z", "dateUpdated": "2024-11-05T09:35:13.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41055
Vulnerability from cvelistv5
Published
2024-07-29 14:32
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
mm: prevent derefencing NULL ptr in pfn_section_valid()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0100aeb8a12d51950418e685f879cc80cb8e5982" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/bc17f2377818dca643a74499c3f5333500c90503" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/941e816185661bf2b44b488565d09444ae316509" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/797323d1cf92d09b7a017cfec576d9babf99cde7" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/adccdf702b4ea913ded5ff512239e382d7473b63" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/82f0b6f041fad768c28b4ad05a683065412c226e" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41055", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:28.194623Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:01.312Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "include/linux/mmzone.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "0100aeb8a12d", "status": "affected", "version": "90ad17575d26", "versionType": "git" }, { "lessThan": "bc17f2377818", "status": "affected", "version": "b448de2459b6", "versionType": "git" }, { "lessThan": "941e81618566", "status": "affected", "version": "68ed9e333240", "versionType": "git" }, { "lessThan": "797323d1cf92", "status": "affected", "version": "70064241f222", "versionType": "git" }, { "lessThan": "adccdf702b4e", "status": "affected", "version": "5ec8e8ea8b77", "versionType": "git" }, { "lessThan": "82f0b6f041fa", "status": "affected", "version": "5ec8e8ea8b77", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "include/linux/mmzone.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.8" }, { "lessThan": "6.8", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.222", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.163", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: prevent derefencing NULL ptr in pfn_section_valid()\n\nCommit 5ec8e8ea8b77 (\"mm/sparsemem: fix race in accessing\nmemory_section-\u003eusage\") changed pfn_section_valid() to add a READ_ONCE()\ncall around \"ms-\u003eusage\" to fix a race with section_deactivate() where\nms-\u003eusage can be cleared. The READ_ONCE() call, by itself, is not enough\nto prevent NULL pointer dereference. We need to check its value before\ndereferencing it." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:47.992Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/0100aeb8a12d51950418e685f879cc80cb8e5982" }, { "url": "https://git.kernel.org/stable/c/bc17f2377818dca643a74499c3f5333500c90503" }, { "url": "https://git.kernel.org/stable/c/941e816185661bf2b44b488565d09444ae316509" }, { "url": "https://git.kernel.org/stable/c/797323d1cf92d09b7a017cfec576d9babf99cde7" }, { "url": "https://git.kernel.org/stable/c/adccdf702b4ea913ded5ff512239e382d7473b63" }, { "url": "https://git.kernel.org/stable/c/82f0b6f041fad768c28b4ad05a683065412c226e" } ], "title": "mm: prevent derefencing NULL ptr in pfn_section_valid()", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41055", "datePublished": "2024-07-29T14:32:10.672Z", "dateReserved": "2024-07-12T12:17:45.627Z", "dateUpdated": "2024-11-05T09:35:47.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42082
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
xdp: Remove WARN() from __xdp_reg_mem_model()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.586Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1095b8efbb13a6a5fa583ed373ee1ccab29da2d0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1d3e3b3aa2cbe9bc7db9a7f8673a9fa6d2990d54" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4e0c539ee265d5c6e7fa7d229cd4aa7bc01816e2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/14e51ea78b4ccacb7acb1346b9241bb790a2054c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f92298b0467fd77edc4c1a2c3e48833e69840ec4" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7e9f79428372c6eab92271390851be34ab26bfb4" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42082", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:06.855038Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:07.377Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/core/xdp.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "1095b8efbb13", "status": "affected", "version": "8d5d88527587", "versionType": "git" }, { "lessThan": "1d3e3b3aa2cb", "status": "affected", "version": "8d5d88527587", "versionType": "git" }, { "lessThan": "4e0c539ee265", "status": "affected", "version": "8d5d88527587", "versionType": "git" }, { "lessThan": "14e51ea78b4c", "status": "affected", "version": "8d5d88527587", "versionType": "git" }, { "lessThan": "f92298b0467f", "status": "affected", "version": "8d5d88527587", "versionType": "git" }, { "lessThan": "7e9f79428372", "status": "affected", "version": "8d5d88527587", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/core/xdp.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.18" }, { "lessThan": "4.18", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nxdp: Remove WARN() from __xdp_reg_mem_model()\n\nsyzkaller reports a warning in __xdp_reg_mem_model().\n\nThe warning occurs only if __mem_id_init_hash_table() returns an error. It\nreturns the error in two cases:\n\n 1. memory allocation fails;\n 2. rhashtable_init() fails when some fields of rhashtable_params\n struct are not initialized properly.\n\nThe second case cannot happen since there is a static const rhashtable_params\nstruct with valid fields. So, warning is only triggered when there is a\nproblem with memory allocation.\n\nThus, there is no sense in using WARN() to handle this error and it can be\nsafely removed.\n\nWARNING: CPU: 0 PID: 5065 at net/core/xdp.c:299 __xdp_reg_mem_model+0x2d9/0x650 net/core/xdp.c:299\n\nCPU: 0 PID: 5065 Comm: syz-executor883 Not tainted 6.8.0-syzkaller-05271-gf99c5f563c17 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nRIP: 0010:__xdp_reg_mem_model+0x2d9/0x650 net/core/xdp.c:299\n\nCall Trace:\n xdp_reg_mem_model+0x22/0x40 net/core/xdp.c:344\n xdp_test_run_setup net/bpf/test_run.c:188 [inline]\n bpf_test_run_xdp_live+0x365/0x1e90 net/bpf/test_run.c:377\n bpf_prog_test_run_xdp+0x813/0x11b0 net/bpf/test_run.c:1267\n bpf_prog_test_run+0x33a/0x3b0 kernel/bpf/syscall.c:4240\n __sys_bpf+0x48d/0x810 kernel/bpf/syscall.c:5649\n __do_sys_bpf kernel/bpf/syscall.c:5738 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5736 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5736\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nFound by Linux Verification Center (linuxtesting.org) with syzkaller." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:03.389Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/1095b8efbb13a6a5fa583ed373ee1ccab29da2d0" }, { "url": "https://git.kernel.org/stable/c/1d3e3b3aa2cbe9bc7db9a7f8673a9fa6d2990d54" }, { "url": "https://git.kernel.org/stable/c/4e0c539ee265d5c6e7fa7d229cd4aa7bc01816e2" }, { "url": "https://git.kernel.org/stable/c/14e51ea78b4ccacb7acb1346b9241bb790a2054c" }, { "url": "https://git.kernel.org/stable/c/f92298b0467fd77edc4c1a2c3e48833e69840ec4" }, { "url": "https://git.kernel.org/stable/c/7e9f79428372c6eab92271390851be34ab26bfb4" } ], "title": "xdp: Remove WARN() from __xdp_reg_mem_model()", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42082", "datePublished": "2024-07-29T15:52:43.989Z", "dateReserved": "2024-07-29T15:50:41.170Z", "dateUpdated": "2024-11-05T09:37:03.389Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42122
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-12-09 10:43
Severity ?
EPSS score ?
Summary
drm/amd/display: Add NULL pointer check for kzalloc
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.209Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/062edd612fcd300f0f79a36fca5b8b6a5e2fce70" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8e65a1b7118acf6af96449e1e66b7adbc9396912" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42122", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:16:53.977988Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:05.064Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/clk_mgr/dcn30/dcn30_clk_mgr.c", "drivers/gpu/drm/amd/display/dc/clk_mgr/dcn32/dcn32_clk_mgr.c", "drivers/gpu/drm/amd/display/dc/resource/dcn30/dcn30_resource.c", "drivers/gpu/drm/amd/display/dc/resource/dcn31/dcn31_resource.c", "drivers/gpu/drm/amd/display/dc/resource/dcn314/dcn314_resource.c", "drivers/gpu/drm/amd/display/dc/resource/dcn315/dcn315_resource.c", "drivers/gpu/drm/amd/display/dc/resource/dcn316/dcn316_resource.c", "drivers/gpu/drm/amd/display/dc/resource/dcn32/dcn32_resource.c", "drivers/gpu/drm/amd/display/dc/resource/dcn321/dcn321_resource.c", "drivers/gpu/drm/amd/display/dc/resource/dcn35/dcn35_resource.c", "drivers/gpu/drm/amd/display/dc/resource/dcn351/dcn351_resource.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "cd1e565a5b7f", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "062edd612fcd", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "8e65a1b7118a", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/clk_mgr/dcn30/dcn30_clk_mgr.c", "drivers/gpu/drm/amd/display/dc/clk_mgr/dcn32/dcn32_clk_mgr.c", "drivers/gpu/drm/amd/display/dc/resource/dcn30/dcn30_resource.c", "drivers/gpu/drm/amd/display/dc/resource/dcn31/dcn31_resource.c", "drivers/gpu/drm/amd/display/dc/resource/dcn314/dcn314_resource.c", "drivers/gpu/drm/amd/display/dc/resource/dcn315/dcn315_resource.c", "drivers/gpu/drm/amd/display/dc/resource/dcn316/dcn316_resource.c", "drivers/gpu/drm/amd/display/dc/resource/dcn32/dcn32_resource.c", "drivers/gpu/drm/amd/display/dc/resource/dcn321/dcn321_resource.c", "drivers/gpu/drm/amd/display/dc/resource/dcn35/dcn35_resource.c", "drivers/gpu/drm/amd/display/dc/resource/dcn351/dcn351_resource.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.64", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add NULL pointer check for kzalloc\n\n[Why \u0026 How]\nCheck return pointer of kzalloc before using it." } ], "providerMetadata": { "dateUpdated": "2024-12-09T10:43:31.012Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/cd1e565a5b7fa60c349ca8a16db1e61715fe8230" }, { "url": "https://git.kernel.org/stable/c/062edd612fcd300f0f79a36fca5b8b6a5e2fce70" }, { "url": "https://git.kernel.org/stable/c/8e65a1b7118acf6af96449e1e66b7adbc9396912" } ], "title": "drm/amd/display: Add NULL pointer check for kzalloc", "x_generator": { "engine": "bippy-8e903de6a542" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42122", "datePublished": "2024-07-30T07:46:13.921Z", "dateReserved": "2024-07-29T15:50:41.179Z", "dateUpdated": "2024-12-09T10:43:31.012Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42231
Vulnerability from cvelistv5
Published
2024-07-30 07:47
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
btrfs: zoned: fix calc_available_free_space() for zoned mode
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.610Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8548903b1999bba02a2b894ad750ab8eb1f40307" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/64d2c847ba380e07b9072d65a50aa6469d2aa43f" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42231", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:14:20.817500Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:32.740Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/btrfs/space-info.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "8548903b1999", "status": "affected", "version": "cb6cbab79055", "versionType": "git" }, { "lessThan": "64d2c847ba38", "status": "affected", "version": "cb6cbab79055", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/btrfs/space-info.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.7" }, { "lessThan": "6.7", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: zoned: fix calc_available_free_space() for zoned mode\n\ncalc_available_free_space() returns the total size of metadata (or\nsystem) block groups, which can be allocated from unallocated disk\nspace. The logic is wrong on zoned mode in two places.\n\nFirst, the calculation of data_chunk_size is wrong. We always allocate\none zone as one chunk, and no partial allocation of a zone. So, we\nshould use zone_size (= data_sinfo-\u003echunk_size) as it is.\n\nSecond, the result \"avail\" may not be zone aligned. Since we always\nallocate one zone as one chunk on zoned mode, returning non-zone size\naligned bytes will result in less pressure on the async metadata reclaim\nprocess.\n\nThis is serious for the nearly full state with a large zone size device.\nAllowing over-commit too much will result in less async reclaim work and\nend up in ENOSPC. We can align down to the zone size to avoid that." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:42.709Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/8548903b1999bba02a2b894ad750ab8eb1f40307" }, { "url": "https://git.kernel.org/stable/c/64d2c847ba380e07b9072d65a50aa6469d2aa43f" } ], "title": "btrfs: zoned: fix calc_available_free_space() for zoned mode", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42231", "datePublished": "2024-07-30T07:47:11.409Z", "dateReserved": "2024-07-30T07:40:12.251Z", "dateUpdated": "2024-11-05T09:38:42.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42063
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.920Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b30f3197a6cd080052d5d4973f9a6b479fd9fff5" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3189983c26108cf0990e5c46856dc9feb9470d12" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e8742081db7d01f980c6161ae1e8a1dbc1e30979" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42063", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:09.278781Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:08.514Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "kernel/bpf/core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "b30f3197a6cd", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "d812ae6e02bd", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "3189983c2610", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "e8742081db7d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "kernel/bpf/core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode\n\nsyzbot reported uninit memory usages during map_{lookup,delete}_elem.\n\n==========\nBUG: KMSAN: uninit-value in __dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]\nBUG: KMSAN: uninit-value in dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796\n__dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]\ndev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796\n____bpf_map_lookup_elem kernel/bpf/helpers.c:42 [inline]\nbpf_map_lookup_elem+0x5c/0x80 kernel/bpf/helpers.c:38\n___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997\n__bpf_prog_run256+0xb5/0xe0 kernel/bpf/core.c:2237\n==========\n\nThe reproducer should be in the interpreter mode.\n\nThe C reproducer is trying to run the following bpf prog:\n\n 0: (18) r0 = 0x0\n 2: (18) r1 = map[id:49]\n 4: (b7) r8 = 16777216\n 5: (7b) *(u64 *)(r10 -8) = r8\n 6: (bf) r2 = r10\n 7: (07) r2 += -229\n ^^^^^^^^^^\n\n 8: (b7) r3 = 8\n 9: (b7) r4 = 0\n 10: (85) call dev_map_lookup_elem#1543472\n 11: (95) exit\n\nIt is due to the \"void *key\" (r2) passed to the helper. bpf allows uninit\nstack memory access for bpf prog with the right privileges. This patch\nuses kmsan_unpoison_memory() to mark the stack as initialized.\n\nThis should address different syzbot reports on the uninit \"void *key\"\nargument during map_{lookup,delete}_elem." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:41.072Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/b30f3197a6cd080052d5d4973f9a6b479fd9fff5" }, { "url": "https://git.kernel.org/stable/c/d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf" }, { "url": "https://git.kernel.org/stable/c/3189983c26108cf0990e5c46856dc9feb9470d12" }, { "url": "https://git.kernel.org/stable/c/e8742081db7d01f980c6161ae1e8a1dbc1e30979" } ], "title": "bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42063", "datePublished": "2024-07-29T15:52:28.533Z", "dateReserved": "2024-07-29T15:50:41.166Z", "dateUpdated": "2024-11-05T09:36:41.072Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41056
Vulnerability from cvelistv5
Published
2024-07-29 14:33
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/16d76857d6b5426f41b587d0bb925de3f25bfb21" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/392cff2f86a25a4286ff3151c7739143c61c1781" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/53a9f8cdbf35a682e9894e1a606f4640e5359185" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/680e126ec0400f6daecf0510c5bb97a55779ff03" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41056", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:25.022416Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:01.793Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/firmware/cirrus/cs_dsp.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "16d76857d6b5", "status": "affected", "version": "f6bc909e7673", "versionType": "git" }, { "lessThan": "392cff2f86a2", "status": "affected", "version": "f6bc909e7673", "versionType": "git" }, { "lessThan": "53a9f8cdbf35", "status": "affected", "version": "f6bc909e7673", "versionType": "git" }, { "lessThan": "680e126ec040", "status": "affected", "version": "f6bc909e7673", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/firmware/cirrus/cs_dsp.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.16" }, { "lessThan": "5.16", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files\n\nUse strnlen() instead of strlen() on the algorithm and coefficient name\nstring arrays in V1 wmfw files.\n\nIn V1 wmfw files the name is a NUL-terminated string in a fixed-size\narray. cs_dsp should protect against overrunning the array if the NUL\nterminator is missing." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:49.077Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/16d76857d6b5426f41b587d0bb925de3f25bfb21" }, { "url": "https://git.kernel.org/stable/c/392cff2f86a25a4286ff3151c7739143c61c1781" }, { "url": "https://git.kernel.org/stable/c/53a9f8cdbf35a682e9894e1a606f4640e5359185" }, { "url": "https://git.kernel.org/stable/c/680e126ec0400f6daecf0510c5bb97a55779ff03" } ], "title": "firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41056", "datePublished": "2024-07-29T14:33:27.453Z", "dateReserved": "2024-07-12T12:17:45.627Z", "dateUpdated": "2024-11-05T09:35:49.077Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42112
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
net: txgbe: free isb resources at the right time
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.263Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/efdc3f54299835ddef23bea651c753c4d467010b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/935124dd5883b5de68dc5a94f582480a10643dc9" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42112", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:17:26.486889Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:06.438Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/wangxun/libwx/wx_lib.c", "drivers/net/ethernet/wangxun/ngbe/ngbe_main.c", "drivers/net/ethernet/wangxun/txgbe/txgbe_main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "efdc3f542998", "status": "affected", "version": "aefd013624a1", "versionType": "git" }, { "lessThan": "935124dd5883", "status": "affected", "version": "aefd013624a1", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/wangxun/libwx/wx_lib.c", "drivers/net/ethernet/wangxun/ngbe/ngbe_main.c", "drivers/net/ethernet/wangxun/txgbe/txgbe_main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.9" }, { "lessThan": "6.9", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: txgbe: free isb resources at the right time\n\nWhen using MSI/INTx interrupt, the shared interrupts are still being\nhandled in the device remove routine, before free IRQs. So isb memory\nis still read after it is freed. Thus move wx_free_isb_resources()\nfrom txgbe_close() to txgbe_remove(). And fix the improper isb free\naction in txgbe_open() error handling path." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:38.767Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/efdc3f54299835ddef23bea651c753c4d467010b" }, { "url": "https://git.kernel.org/stable/c/935124dd5883b5de68dc5a94f582480a10643dc9" } ], "title": "net: txgbe: free isb resources at the right time", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42112", "datePublished": "2024-07-30T07:46:06.237Z", "dateReserved": "2024-07-29T15:50:41.176Z", "dateUpdated": "2024-11-05T09:37:38.767Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41030
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-12-09 14:21
Severity ?
EPSS score ?
Summary
ksmbd: discard write access to the directory open
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:39:56.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/66cf853e1c7a2407f15d9f7aaa3e47d61745e361" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9e84b1ba5c98fb5c9f869c85db1d870354613baa" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/198498b2049c0f11f7670be6974570e02b0cc035" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41030", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:23:55.968881Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:04.010Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/smb/server/smb2pdu.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "66cf853e1c7a", "status": "affected", "version": "0626e6641f6b", "versionType": "git" }, { "lessThan": "9e84b1ba5c98", "status": "affected", "version": "0626e6641f6b", "versionType": "git" }, { "lessThan": "198498b2049c", "status": "affected", "version": "0626e6641f6b", "versionType": "git" }, { "lessThan": "e2e33caa5dc2", "status": "affected", "version": "0626e6641f6b", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/smb/server/smb2pdu.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.15" }, { "lessThan": "5.15", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.100", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.41", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: discard write access to the directory open\n\nmay_open() does not allow a directory to be opened with the write access.\nHowever, some writing flags set by client result in adding write access\non server, making ksmbd incompatible with FUSE file system. Simply, let\u0027s\ndiscard the write access when opening a directory.\n\nlist_add corruption. next is NULL.\n------------[ cut here ]------------\nkernel BUG at lib/list_debug.c:26!\npc : __list_add_valid+0x88/0xbc\nlr : __list_add_valid+0x88/0xbc\nCall trace:\n__list_add_valid+0x88/0xbc\nfuse_finish_open+0x11c/0x170\nfuse_open_common+0x284/0x5e8\nfuse_dir_open+0x14/0x24\ndo_dentry_open+0x2a4/0x4e0\ndentry_open+0x50/0x80\nsmb2_open+0xbe4/0x15a4\nhandle_ksmbd_work+0x478/0x5ec\nprocess_one_work+0x1b4/0x448\nworker_thread+0x25c/0x430\nkthread+0x104/0x1d4\nret_from_fork+0x10/0x20" } ], "providerMetadata": { "dateUpdated": "2024-12-09T14:21:19.076Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/66cf853e1c7a2407f15d9f7aaa3e47d61745e361" }, { "url": "https://git.kernel.org/stable/c/9e84b1ba5c98fb5c9f869c85db1d870354613baa" }, { "url": "https://git.kernel.org/stable/c/198498b2049c0f11f7670be6974570e02b0cc035" }, { "url": "https://git.kernel.org/stable/c/e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd" } ], "title": "ksmbd: discard write access to the directory open", "x_generator": { "engine": "bippy-8e903de6a542" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41030", "datePublished": "2024-07-29T14:31:46.144Z", "dateReserved": "2024-07-12T12:17:45.618Z", "dateUpdated": "2024-12-09T14:21:19.076Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41086
Vulnerability from cvelistv5
Published
2024-07-29 15:48
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
bcachefs: Fix sb_field_downgrade validation
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.363Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/bf920ed92ef24dcd6970c88881cd4700b3acf05b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/692aa7a54b2b28d59f24b3bf8250837805484b99" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41086", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:49.092454Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:58.845Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/bcachefs/sb-downgrade.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "bf920ed92ef2", "status": "affected", "version": "84f1638795da", "versionType": "git" }, { "lessThan": "692aa7a54b2b", "status": "affected", "version": "84f1638795da", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/bcachefs/sb-downgrade.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.7" }, { "lessThan": "6.7", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbcachefs: Fix sb_field_downgrade validation\n\n- bch2_sb_downgrade_validate() wasn\u0027t checking for a downgrade entry\n extending past the end of the superblock section\n\n- for_each_downgrade_entry() is used in to_text() and needs to work on\n malformed input; it also was missing a check for a field extending\n past the end of the section" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:26.162Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/bf920ed92ef24dcd6970c88881cd4700b3acf05b" }, { "url": "https://git.kernel.org/stable/c/692aa7a54b2b28d59f24b3bf8250837805484b99" } ], "title": "bcachefs: Fix sb_field_downgrade validation", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41086", "datePublished": "2024-07-29T15:48:02.175Z", "dateReserved": "2024-07-12T12:17:45.634Z", "dateUpdated": "2024-11-05T09:36:26.162Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41069
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
ASoC: topology: Fix references to freed memory
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.449Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b188d7f3dfab10e332e3c1066e18857964a520d2" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ab5a6208b4d6872b1c6ecea1867940fc668cc76d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ccae5c6a1fab9494c86b7856faf05e296c617702" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/97ab304ecd95c0b1703ff8c8c3956dc6e2afe8e1" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41069", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:43.300028Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:01.067Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "sound/soc/soc-topology.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "b188d7f3dfab", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "ab5a6208b4d6", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "ccae5c6a1fab", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "97ab304ecd95", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "sound/soc/soc-topology.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: topology: Fix references to freed memory\n\nMost users after parsing a topology file, release memory used by it, so\nhaving pointer references directly into topology file contents is wrong.\nUse devm_kmemdup(), to allocate memory as needed." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:07.276Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/b188d7f3dfab10e332e3c1066e18857964a520d2" }, { "url": "https://git.kernel.org/stable/c/ab5a6208b4d6872b1c6ecea1867940fc668cc76d" }, { "url": "https://git.kernel.org/stable/c/ccae5c6a1fab9494c86b7856faf05e296c617702" }, { "url": "https://git.kernel.org/stable/c/97ab304ecd95c0b1703ff8c8c3956dc6e2afe8e1" } ], "title": "ASoC: topology: Fix references to freed memory", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41069", "datePublished": "2024-07-29T14:57:30.245Z", "dateReserved": "2024-07-12T12:17:45.630Z", "dateUpdated": "2024-11-05T09:36:07.276Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41080
Vulnerability from cvelistv5
Published
2024-07-29 15:04
Modified
2024-11-17 15:02
Severity ?
EPSS score ?
Summary
io_uring: fix possible deadlock in io_register_iowq_max_workers()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b571a367502c7ef94c688ef9c7f7d69a2ce3bcca" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/73254a297c2dd094abec7c9efee32455ae875bdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41080", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:08.458402Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:59.495Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "io_uring/register.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "b17397a0a5c5", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "97ed7ff58de6", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "fdacd09f2ddf", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "950ac86cff33", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "b571a367502c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "73254a297c2d", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "io_uring/register.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.230", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.173", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.118", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.62", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: fix possible deadlock in io_register_iowq_max_workers()\n\nThe io_register_iowq_max_workers() function calls io_put_sq_data(),\nwhich acquires the sqd-\u003elock without releasing the uring_lock.\nSimilar to the commit 009ad9f0c6ee (\"io_uring: drop ctx-\u003euring_lock\nbefore acquiring sqd-\u003elock\"), this can lead to a potential deadlock\nsituation.\n\nTo resolve this issue, the uring_lock is released before calling\nio_put_sq_data(), and then it is re-acquired after the function call.\n\nThis change ensures that the locks are acquired in the correct\norder, preventing the possibility of a deadlock." } ], "providerMetadata": { "dateUpdated": "2024-11-17T15:02:41.583Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/b17397a0a5c56e111f61cb5b77d162664dc00de9" }, { "url": "https://git.kernel.org/stable/c/97ed7ff58de66c544692b3c2b988f3f594348de0" }, { "url": "https://git.kernel.org/stable/c/fdacd09f2ddf7a00787291f08ee48c0421e5b709" }, { "url": "https://git.kernel.org/stable/c/950ac86cff338ab56e2eaf611f4936ee34893b63" }, { "url": "https://git.kernel.org/stable/c/b571a367502c7ef94c688ef9c7f7d69a2ce3bcca" }, { "url": "https://git.kernel.org/stable/c/73254a297c2dd094abec7c9efee32455ae875bdf" } ], "title": "io_uring: fix possible deadlock in io_register_iowq_max_workers()", "x_generator": { "engine": "bippy-8e903de6a542" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41080", "datePublished": "2024-07-29T15:04:17.642Z", "dateReserved": "2024-07-12T12:17:45.633Z", "dateUpdated": "2024-11-17T15:02:41.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41057
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.624Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/8de253177112a47c9af157d23ae934779188b4e1" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9e67589a4a7b7e5660b524d1d5fe61242bcbcc11" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ef81340401e8a371d6b17f69e76d861920972cfe" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5d8f805789072ea7fd39504694b7bd17e5f751c4" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41057", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:22:21.821093Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:32:57.641Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/cachefiles/cache.c", "fs/cachefiles/volume.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "8de253177112", "status": "affected", "version": "fe2140e2f57f", "versionType": "git" }, { "lessThan": "9e67589a4a7b", "status": "affected", "version": "fe2140e2f57f", "versionType": "git" }, { "lessThan": "ef81340401e8", "status": "affected", "version": "fe2140e2f57f", "versionType": "git" }, { "lessThan": "5d8f80578907", "status": "affected", "version": "fe2140e2f57f", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/cachefiles/cache.c", "fs/cachefiles/volume.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.17" }, { "lessThan": "5.17", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie()\n\nWe got the following issue in our fault injection stress test:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in cachefiles_withdraw_cookie+0x4d9/0x600\nRead of size 8 at addr ffff888118efc000 by task kworker/u78:0/109\n\nCPU: 13 PID: 109 Comm: kworker/u78:0 Not tainted 6.8.0-dirty #566\nCall Trace:\n \u003cTASK\u003e\n kasan_report+0x93/0xc0\n cachefiles_withdraw_cookie+0x4d9/0x600\n fscache_cookie_state_machine+0x5c8/0x1230\n fscache_cookie_worker+0x91/0x1c0\n process_one_work+0x7fa/0x1800\n [...]\n\nAllocated by task 117:\n kmalloc_trace+0x1b3/0x3c0\n cachefiles_acquire_volume+0xf3/0x9c0\n fscache_create_volume_work+0x97/0x150\n process_one_work+0x7fa/0x1800\n [...]\n\nFreed by task 120301:\n kfree+0xf1/0x2c0\n cachefiles_withdraw_cache+0x3fa/0x920\n cachefiles_put_unbind_pincount+0x1f6/0x250\n cachefiles_daemon_release+0x13b/0x290\n __fput+0x204/0xa00\n task_work_run+0x139/0x230\n do_exit+0x87a/0x29b0\n [...]\n==================================================================\n\nFollowing is the process that triggers the issue:\n\n p1 | p2\n------------------------------------------------------------\n fscache_begin_lookup\n fscache_begin_volume_access\n fscache_cache_is_live(fscache_cache)\ncachefiles_daemon_release\n cachefiles_put_unbind_pincount\n cachefiles_daemon_unbind\n cachefiles_withdraw_cache\n fscache_withdraw_cache\n fscache_set_cache_state(cache, FSCACHE_CACHE_IS_WITHDRAWN);\n cachefiles_withdraw_objects(cache)\n fscache_wait_for_objects(fscache)\n atomic_read(\u0026fscache_cache-\u003eobject_count) == 0\n fscache_perform_lookup\n cachefiles_lookup_cookie\n cachefiles_alloc_object\n refcount_set(\u0026object-\u003eref, 1);\n object-\u003evolume = volume\n fscache_count_object(vcookie-\u003ecache);\n atomic_inc(\u0026fscache_cache-\u003eobject_count)\n cachefiles_withdraw_volumes\n cachefiles_withdraw_volume\n fscache_withdraw_volume\n __cachefiles_free_volume\n kfree(cachefiles_volume)\n fscache_cookie_state_machine\n cachefiles_withdraw_cookie\n cache = object-\u003evolume-\u003ecache;\n // cachefiles_volume UAF !!!\n\nAfter setting FSCACHE_CACHE_IS_WITHDRAWN, wait for all the cookie lookups\nto complete first, and then wait for fscache_cache-\u003eobject_count == 0 to\navoid the cookie exiting after the volume has been freed and triggering\nthe above issue. Therefore call fscache_withdraw_volume() before calling\ncachefiles_withdraw_objects().\n\nThis way, after setting FSCACHE_CACHE_IS_WITHDRAWN, only the following two\ncases will occur:\n1) fscache_begin_lookup fails in fscache_begin_volume_access().\n2) fscache_withdraw_volume() will ensure that fscache_count_object() has\n been executed before calling fscache_wait_for_objects()." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:50.144Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/8de253177112a47c9af157d23ae934779188b4e1" }, { "url": "https://git.kernel.org/stable/c/9e67589a4a7b7e5660b524d1d5fe61242bcbcc11" }, { "url": "https://git.kernel.org/stable/c/ef81340401e8a371d6b17f69e76d861920972cfe" }, { "url": "https://git.kernel.org/stable/c/5d8f805789072ea7fd39504694b7bd17e5f751c4" } ], "title": "cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie()", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41057", "datePublished": "2024-07-29T14:57:19.938Z", "dateReserved": "2024-07-12T12:17:45.627Z", "dateUpdated": "2024-11-05T09:35:50.144Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41096
Vulnerability from cvelistv5
Published
2024-07-29 15:48
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
PCI/MSI: Fix UAF in msi_capability_init
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.351Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ff1121d2214b794dc1772081f27bdd90721a84bc" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/45fc8d20e0768ab0a0ad054081d0f68aa3c83976" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9eee5330656bf92f51cb1f09b2dc9f8cf975b3d1" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41096", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:22.209715Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:09.074Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/pci/msi/msi.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "0ae40b2d0a5d", "status": "affected", "version": "bf6e054e0e3f", "versionType": "git" }, { "lessThan": "ff1121d2214b", "status": "affected", "version": "bf6e054e0e3f", "versionType": "git" }, { "lessThan": "45fc8d20e076", "status": "affected", "version": "bf6e054e0e3f", "versionType": "git" }, { "lessThan": "9eee5330656b", "status": "affected", "version": "bf6e054e0e3f", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/pci/msi/msi.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.17" }, { "lessThan": "5.17", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.109", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/MSI: Fix UAF in msi_capability_init\n\nKFENCE reports the following UAF:\n\n BUG: KFENCE: use-after-free read in __pci_enable_msi_range+0x2c0/0x488\n\n Use-after-free read at 0x0000000024629571 (in kfence-#12):\n __pci_enable_msi_range+0x2c0/0x488\n pci_alloc_irq_vectors_affinity+0xec/0x14c\n pci_alloc_irq_vectors+0x18/0x28\n\n kfence-#12: 0x0000000008614900-0x00000000e06c228d, size=104, cache=kmalloc-128\n\n allocated by task 81 on cpu 7 at 10.808142s:\n __kmem_cache_alloc_node+0x1f0/0x2bc\n kmalloc_trace+0x44/0x138\n msi_alloc_desc+0x3c/0x9c\n msi_domain_insert_msi_desc+0x30/0x78\n msi_setup_msi_desc+0x13c/0x184\n __pci_enable_msi_range+0x258/0x488\n pci_alloc_irq_vectors_affinity+0xec/0x14c\n pci_alloc_irq_vectors+0x18/0x28\n\n freed by task 81 on cpu 7 at 10.811436s:\n msi_domain_free_descs+0xd4/0x10c\n msi_domain_free_locked.part.0+0xc0/0x1d8\n msi_domain_alloc_irqs_all_locked+0xb4/0xbc\n pci_msi_setup_msi_irqs+0x30/0x4c\n __pci_enable_msi_range+0x2a8/0x488\n pci_alloc_irq_vectors_affinity+0xec/0x14c\n pci_alloc_irq_vectors+0x18/0x28\n\nDescriptor allocation done in:\n__pci_enable_msi_range\n msi_capability_init\n msi_setup_msi_desc\n msi_insert_msi_desc\n msi_domain_insert_msi_desc\n msi_alloc_desc\n ...\n\nFreed in case of failure in __msi_domain_alloc_locked()\n__pci_enable_msi_range\n msi_capability_init\n pci_msi_setup_msi_irqs\n msi_domain_alloc_irqs_all_locked\n msi_domain_alloc_locked\n __msi_domain_alloc_locked =\u003e fails\n msi_domain_free_locked\n ...\n\nThat failure propagates back to pci_msi_setup_msi_irqs() in\nmsi_capability_init() which accesses the descriptor for unmasking in the\nerror exit path.\n\nCure it by copying the descriptor and using the copy for the error exit path\nunmask operation.\n\n[ tglx: Massaged change log ]" } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:37.609Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/0ae40b2d0a5de6b045504098e365d4fdff5bbeba" }, { "url": "https://git.kernel.org/stable/c/ff1121d2214b794dc1772081f27bdd90721a84bc" }, { "url": "https://git.kernel.org/stable/c/45fc8d20e0768ab0a0ad054081d0f68aa3c83976" }, { "url": "https://git.kernel.org/stable/c/9eee5330656bf92f51cb1f09b2dc9f8cf975b3d1" } ], "title": "PCI/MSI: Fix UAF in msi_capability_init", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41096", "datePublished": "2024-07-29T15:48:09.247Z", "dateReserved": "2024-07-12T12:17:45.637Z", "dateUpdated": "2024-11-05T09:36:37.609Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42155
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-12-02 08:32
Severity ?
EPSS score ?
Summary
s390/pkey: Wipe copies of protected- and secure-keys
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.564Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c746f7ced4ad88ee48d0b6c92710e4674403185b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/f2ebdadd85af4f4d0cae1e5d009c70eccc78c207" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42155", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:15:11.881394Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:08.077Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/s390/crypto/pkey_api.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "c746f7ced4ad", "status": "affected", "version": "e80d4af0a320", "versionType": "git" }, { "lessThan": "f2ebdadd85af", "status": "affected", "version": "e80d4af0a320", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/s390/crypto/pkey_api.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.11" }, { "lessThan": "4.11", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/pkey: Wipe copies of protected- and secure-keys\n\nAlthough the clear-key of neither protected- nor secure-keys is\naccessible, this key material should only be visible to the calling\nprocess. So wipe all copies of protected- or secure-keys from stack,\neven in case of an error." } ], "providerMetadata": { "dateUpdated": "2024-12-02T08:32:35.396Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/c746f7ced4ad88ee48d0b6c92710e4674403185b" }, { "url": "https://git.kernel.org/stable/c/f2ebdadd85af4f4d0cae1e5d009c70eccc78c207" } ], "title": "s390/pkey: Wipe copies of protected- and secure-keys", "x_generator": { "engine": "bippy-8e903de6a542" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42155", "datePublished": "2024-07-30T07:46:57.729Z", "dateReserved": "2024-07-29T15:50:41.194Z", "dateUpdated": "2024-12-02T08:32:35.396Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42072
Vulnerability from cvelistv5
Published
2024-07-29 15:52
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
bpf: Fix may_goto with negative offset.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:31.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/175827e04f4be53f3dfb57edf12d0d49b18fd939" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2b2efe1937ca9f8815884bd4dcd5b32733025103" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42072", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:19:39.749938Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:57.942Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "kernel/bpf/verifier.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "175827e04f4b", "status": "affected", "version": "011832b97b31", "versionType": "git" }, { "lessThan": "2b2efe1937ca", "status": "affected", "version": "011832b97b31", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "kernel/bpf/verifier.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.9" }, { "lessThan": "6.9", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix may_goto with negative offset.\n\nZac\u0027s syzbot crafted a bpf prog that exposed two bugs in may_goto.\nThe 1st bug is the way may_goto is patched. When offset is negative\nit should be patched differently.\nThe 2nd bug is in the verifier:\nwhen current state may_goto_depth is equal to visited state may_goto_depth\nit means there is an actual infinite loop. It\u0027s not correct to prune\nexploration of the program at this point.\nNote, that this check doesn\u0027t limit the program to only one may_goto insn,\nsince 2nd and any further may_goto will increment may_goto_depth only\nin the queued state pushed for future exploration. The current state\nwill have may_goto_depth == 0 regardless of number of may_goto insns\nand the verifier has to explore the program until bpf_exit." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:51.418Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/175827e04f4be53f3dfb57edf12d0d49b18fd939" }, { "url": "https://git.kernel.org/stable/c/2b2efe1937ca9f8815884bd4dcd5b32733025103" } ], "title": "bpf: Fix may_goto with negative offset.", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42072", "datePublished": "2024-07-29T15:52:35.598Z", "dateReserved": "2024-07-29T15:50:41.168Z", "dateUpdated": "2024-11-05T09:36:51.418Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41070
Vulnerability from cvelistv5
Published
2024-07-29 14:57
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/be847bb20c809de8ac124431b556f244400b0491" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4cdf6926f443c84f680213c7aafbe6f91a5fcbc0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b26c8c85463ef27a522d24fcd05651f0bb039e47" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/5f856023971f97fff74cfaf21b48ec320147b50a" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/82c7a4cf14aa866f8f7f09e662b02eddc49ee0bf" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9975f93c760a32453d7639cf6fcf3f73b4e71ffe" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a986fa57fd81a1430e00b3c6cf8a325d6f894a63" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41070", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:21:40.187466Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:00.946Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "arch/powerpc/kvm/book3s_64_vio.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "be847bb20c80", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "4cdf6926f443", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "b26c8c85463e", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "5f856023971f", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "82c7a4cf14aa", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "9975f93c760a", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "a986fa57fd81", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "arch/powerpc/kvm/book3s_64_vio.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.281", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.223", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.164", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.101", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.42", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.11", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()\n\nAl reported a possible use-after-free (UAF) in kvm_spapr_tce_attach_iommu_group().\n\nIt looks up `stt` from tablefd, but then continues to use it after doing\nfdput() on the returned fd. After the fdput() the tablefd is free to be\nclosed by another thread. The close calls kvm_spapr_tce_release() and\nthen release_spapr_tce_table() (via call_rcu()) which frees `stt`.\n\nAlthough there are calls to rcu_read_lock() in\nkvm_spapr_tce_attach_iommu_group() they are not sufficient to prevent\nthe UAF, because `stt` is used outside the locked regions.\n\nWith an artifcial delay after the fdput() and a userspace program which\ntriggers the race, KASAN detects the UAF:\n\n BUG: KASAN: slab-use-after-free in kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]\n Read of size 4 at addr c000200027552c30 by task kvm-vfio/2505\n CPU: 54 PID: 2505 Comm: kvm-vfio Not tainted 6.10.0-rc3-next-20240612-dirty #1\n Hardware name: 8335-GTH POWER9 0x4e1202 opal:skiboot-v6.5.3-35-g1851b2a06 PowerNV\n Call Trace:\n dump_stack_lvl+0xb4/0x108 (unreliable)\n print_report+0x2b4/0x6ec\n kasan_report+0x118/0x2b0\n __asan_load4+0xb8/0xd0\n kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]\n kvm_vfio_set_attr+0x524/0xac0 [kvm]\n kvm_device_ioctl+0x144/0x240 [kvm]\n sys_ioctl+0x62c/0x1810\n system_call_exception+0x190/0x440\n system_call_vectored_common+0x15c/0x2ec\n ...\n Freed by task 0:\n ...\n kfree+0xec/0x3e0\n release_spapr_tce_table+0xd4/0x11c [kvm]\n rcu_core+0x568/0x16a0\n handle_softirqs+0x23c/0x920\n do_softirq_own_stack+0x6c/0x90\n do_softirq_own_stack+0x58/0x90\n __irq_exit_rcu+0x218/0x2d0\n irq_exit+0x30/0x80\n arch_local_irq_restore+0x128/0x230\n arch_local_irq_enable+0x1c/0x30\n cpuidle_enter_state+0x134/0x5cc\n cpuidle_enter+0x6c/0xb0\n call_cpuidle+0x7c/0x100\n do_idle+0x394/0x410\n cpu_startup_entry+0x60/0x70\n start_secondary+0x3fc/0x410\n start_secondary_prolog+0x10/0x14\n\nFix it by delaying the fdput() until `stt` is no longer in use, which\nis effectively the entire function. To keep the patch minimal add a call\nto fdput() at each of the existing return paths. Future work can convert\nthe function to goto or __cleanup style cleanup.\n\nWith the fix in place the test case no longer triggers the UAF." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:08.409Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/be847bb20c809de8ac124431b556f244400b0491" }, { "url": "https://git.kernel.org/stable/c/4cdf6926f443c84f680213c7aafbe6f91a5fcbc0" }, { "url": "https://git.kernel.org/stable/c/b26c8c85463ef27a522d24fcd05651f0bb039e47" }, { "url": "https://git.kernel.org/stable/c/5f856023971f97fff74cfaf21b48ec320147b50a" }, { "url": "https://git.kernel.org/stable/c/82c7a4cf14aa866f8f7f09e662b02eddc49ee0bf" }, { "url": "https://git.kernel.org/stable/c/9975f93c760a32453d7639cf6fcf3f73b4e71ffe" }, { "url": "https://git.kernel.org/stable/c/a986fa57fd81a1430e00b3c6cf8a325d6f894a63" } ], "title": "KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41070", "datePublished": "2024-07-29T14:57:30.952Z", "dateReserved": "2024-07-12T12:17:45.630Z", "dateUpdated": "2024-11-05T09:36:08.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42159
Vulnerability from cvelistv5
Published
2024-07-30 07:47
Modified
2024-11-05 09:38
Severity ?
EPSS score ?
Summary
scsi: mpi3mr: Sanitise num_phys
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.710Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b869ec89d2ee923d46608b76e54c006680c9b4df" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/586b41060113ae43032ec6c4a16d518cef5da6e0" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c8707901b53a48106d7501bdbd0350cefaefa4cf" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3668651def2c1622904e58b0280ee93121f2b10b" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42159", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:14:58.820193Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:33.767Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/scsi/mpi3mr/mpi3mr_transport.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "b869ec89d2ee", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "586b41060113", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "c8707901b53a", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" }, { "lessThan": "3668651def2c", "status": "affected", "version": "1da177e4c3f4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/scsi/mpi3mr/mpi3mr_transport.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.98", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.39", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Sanitise num_phys\n\nInformation is stored in mr_sas_port-\u003ephy_mask, values larger then size of\nthis field shouldn\u0027t be allowed." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:38:30.609Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/b869ec89d2ee923d46608b76e54c006680c9b4df" }, { "url": "https://git.kernel.org/stable/c/586b41060113ae43032ec6c4a16d518cef5da6e0" }, { "url": "https://git.kernel.org/stable/c/c8707901b53a48106d7501bdbd0350cefaefa4cf" }, { "url": "https://git.kernel.org/stable/c/3668651def2c1622904e58b0280ee93121f2b10b" } ], "title": "scsi: mpi3mr: Sanitise num_phys", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42159", "datePublished": "2024-07-30T07:47:01.276Z", "dateReserved": "2024-07-29T15:50:41.195Z", "dateUpdated": "2024-11-05T09:38:30.609Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41085
Vulnerability from cvelistv5
Published
2024-07-29 15:48
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
cxl/mem: Fix no cxl_nvd during pmem region auto-assembling
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.323Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1d064e4fbebcf5b18dc10c1f3973487eb163b600" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/84ec985944ef34a34a1605b93ce401aa8737af96" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41085", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:52.180696Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:58.962Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/cxl/core/pmem.c", "drivers/cxl/core/region.c", "drivers/cxl/cxl.h", "drivers/cxl/mem.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "1d064e4fbebc", "status": "affected", "version": "f17b558d6663", "versionType": "git" }, { "lessThan": "84ec985944ef", "status": "affected", "version": "f17b558d6663", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/cxl/core/pmem.c", "drivers/cxl/core/region.c", "drivers/cxl/cxl.h", "drivers/cxl/mem.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.2" }, { "lessThan": "6.2", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncxl/mem: Fix no cxl_nvd during pmem region auto-assembling\n\nWhen CXL subsystem is auto-assembling a pmem region during cxl\nendpoint port probing, always hit below calltrace.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000078\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n RIP: 0010:cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]\n Call Trace:\n \u003cTASK\u003e\n ? __die+0x24/0x70\n ? page_fault_oops+0x82/0x160\n ? do_user_addr_fault+0x65/0x6b0\n ? exc_page_fault+0x7d/0x170\n ? asm_exc_page_fault+0x26/0x30\n ? cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]\n ? cxl_pmem_region_probe+0x1ac/0x360 [cxl_pmem]\n cxl_bus_probe+0x1b/0x60 [cxl_core]\n really_probe+0x173/0x410\n ? __pfx___device_attach_driver+0x10/0x10\n __driver_probe_device+0x80/0x170\n driver_probe_device+0x1e/0x90\n __device_attach_driver+0x90/0x120\n bus_for_each_drv+0x84/0xe0\n __device_attach+0xbc/0x1f0\n bus_probe_device+0x90/0xa0\n device_add+0x51c/0x710\n devm_cxl_add_pmem_region+0x1b5/0x380 [cxl_core]\n cxl_bus_probe+0x1b/0x60 [cxl_core]\n\nThe cxl_nvd of the memdev needs to be available during the pmem region\nprobe. Currently the cxl_nvd is registered after the endpoint port probe.\nThe endpoint probe, in the case of autoassembly of regions, can cause a\npmem region probe requiring the not yet available cxl_nvd. Adjust the\nsequence so this dependency is met.\n\nThis requires adding a port parameter to cxl_find_nvdimm_bridge() that\ncan be used to query the ancestor root port. The endpoint port is not\nyet available, but will share a common ancestor with its parent, so\nstart the query from there instead." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:25.061Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/1d064e4fbebcf5b18dc10c1f3973487eb163b600" }, { "url": "https://git.kernel.org/stable/c/84ec985944ef34a34a1605b93ce401aa8737af96" } ], "title": "cxl/mem: Fix no cxl_nvd during pmem region auto-assembling", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41085", "datePublished": "2024-07-29T15:48:01.267Z", "dateReserved": "2024-07-12T12:17:45.634Z", "dateUpdated": "2024-11-05T09:36:25.061Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42092
Vulnerability from cvelistv5
Published
2024-07-29 17:35
Modified
2024-11-05 09:37
Severity ?
EPSS score ?
Summary
gpio: davinci: Validate the obtained number of IRQs
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.053Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a8d78984fdc105bc1a38b73e98d32b1bc4222684" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/cd75721984337c38a12aeca33ba301d31ca4b3fd" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e44a83bf15c4db053ac6dfe96a23af184c9136d9" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/70b48899f3f23f98a52c5b1060aefbdc7ba7957b" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/89d7008af4945808677662a630643b5ea89c6e8d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2d83492259ad746b655f196cd5d1be4b3d0a3782" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/c542e51306d5f1eba3af84daa005826223382470" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/7aa9b96e9a73e4ec1771492d0527bd5fc5ef9164" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-42092", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:18:34.561678Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:00.849Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpio/gpio-davinci.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "a8d78984fdc1", "status": "affected", "version": "eb3744a2dd01", "versionType": "git" }, { "lessThan": "cd7572198433", "status": "affected", "version": "eb3744a2dd01", "versionType": "git" }, { "lessThan": "e44a83bf15c4", "status": "affected", "version": "eb3744a2dd01", "versionType": "git" }, { "lessThan": "70b48899f3f2", "status": "affected", "version": "eb3744a2dd01", "versionType": "git" }, { "lessThan": "89d7008af494", "status": "affected", "version": "eb3744a2dd01", "versionType": "git" }, { "lessThan": "2d83492259ad", "status": "affected", "version": "eb3744a2dd01", "versionType": "git" }, { "lessThan": "c542e51306d5", "status": "affected", "version": "eb3744a2dd01", "versionType": "git" }, { "lessThan": "7aa9b96e9a73", "status": "affected", "version": "eb3744a2dd01", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpio/gpio-davinci.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.19" }, { "lessThan": "4.19", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.317", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.279", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.221", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.162", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.97", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: davinci: Validate the obtained number of IRQs\n\nValue of pdata-\u003egpio_unbanked is taken from Device Tree. In case of broken\nDT due to any error this value can be any. Without this value validation\nthere can be out of chips-\u003eirqs array boundaries access in\ndavinci_gpio_probe().\n\nValidate the obtained nirq value so that it won\u0027t exceed the maximum\nnumber of IRQs per bank.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:37:15.189Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/a8d78984fdc105bc1a38b73e98d32b1bc4222684" }, { "url": "https://git.kernel.org/stable/c/cd75721984337c38a12aeca33ba301d31ca4b3fd" }, { "url": "https://git.kernel.org/stable/c/e44a83bf15c4db053ac6dfe96a23af184c9136d9" }, { "url": "https://git.kernel.org/stable/c/70b48899f3f23f98a52c5b1060aefbdc7ba7957b" }, { "url": "https://git.kernel.org/stable/c/89d7008af4945808677662a630643b5ea89c6e8d" }, { "url": "https://git.kernel.org/stable/c/2d83492259ad746b655f196cd5d1be4b3d0a3782" }, { "url": "https://git.kernel.org/stable/c/c542e51306d5f1eba3af84daa005826223382470" }, { "url": "https://git.kernel.org/stable/c/7aa9b96e9a73e4ec1771492d0527bd5fc5ef9164" } ], "title": "gpio: davinci: Validate the obtained number of IRQs", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42092", "datePublished": "2024-07-29T17:35:01.209Z", "dateReserved": "2024-07-29T15:50:41.172Z", "dateUpdated": "2024-11-05T09:37:15.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41084
Vulnerability from cvelistv5
Published
2024-07-29 15:48
Modified
2024-11-05 09:36
Severity ?
EPSS score ?
Summary
cxl/region: Avoid null pointer dereference in region lookup
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.020Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a9e099e29e925f8b31cfe53e8a786b9796f8e453" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b8a40a6dbfb0150c1081384caa9bbe28ce5d5060" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/285f2a08841432fc3e498b1cd00cce5216cdf189" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41084", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:20:55.485513Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:33:59.089Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/cxl/core/region.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "a9e099e29e92", "status": "affected", "version": "0a105ab28a4d", "versionType": "git" }, { "lessThan": "b8a40a6dbfb0", "status": "affected", "version": "0a105ab28a4d", "versionType": "git" }, { "lessThan": "285f2a088414", "status": "affected", "version": "0a105ab28a4d", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/cxl/core/region.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.4" }, { "lessThan": "6.4", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.37", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncxl/region: Avoid null pointer dereference in region lookup\n\ncxl_dpa_to_region() looks up a region based on a memdev and DPA.\nIt wrongly assumes an endpoint found mapping the DPA is also of\na fully assembled region. When not true it leads to a null pointer\ndereference looking up the region name.\n\nThis appears during testing of region lookup after a failure to\nassemble a BIOS defined region or if the lookup raced with the\nassembly of the BIOS defined region.\n\nFailure to clean up BIOS defined regions that fail assembly is an\nissue in itself and a fix to that problem will alleviate some of\nthe impact. It will not alleviate the race condition so let\u0027s harden\nthis path.\n\nThe behavior change is that the kernel oops due to a null pointer\ndereference is replaced with a dev_dbg() message noting that an\nendpoint was mapped.\n\nAdditional comments are added so that future users of this function\ncan more clearly understand what it provides." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:36:23.939Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/a9e099e29e925f8b31cfe53e8a786b9796f8e453" }, { "url": "https://git.kernel.org/stable/c/b8a40a6dbfb0150c1081384caa9bbe28ce5d5060" }, { "url": "https://git.kernel.org/stable/c/285f2a08841432fc3e498b1cd00cce5216cdf189" } ], "title": "cxl/region: Avoid null pointer dereference in region lookup", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41084", "datePublished": "2024-07-29T15:48:00.323Z", "dateReserved": "2024-07-12T12:17:45.633Z", "dateUpdated": "2024-11-05T09:36:23.939Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41043
Vulnerability from cvelistv5
Published
2024-07-29 14:32
Modified
2024-11-05 09:35
Severity ?
EPSS score ?
Summary
netfilter: nfnetlink_queue: drop bogus WARN_ON
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:51.657Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/86858da8335db48bde9be02abd7156a69d622e86" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/631a4b3ddc7831b20442c59c28b0476d0704c9af" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-41043", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:23:07.077556Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:02.708Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/netfilter/nfnetlink_queue.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "86858da8335d", "status": "affected", "version": "3f8019688894", "versionType": "git" }, { "lessThan": "631a4b3ddc78", "status": "affected", "version": "3f8019688894", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/netfilter/nfnetlink_queue.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.9" }, { "lessThan": "6.9", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nfnetlink_queue: drop bogus WARN_ON\n\nHappens when rules get flushed/deleted while packet is out, so remove\nthis WARN_ON.\n\nThis WARN exists in one form or another since v4.14, no need to backport\nthis to older releases, hence use a more recent fixes tag." } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:35:33.644Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/86858da8335db48bde9be02abd7156a69d622e86" }, { "url": "https://git.kernel.org/stable/c/631a4b3ddc7831b20442c59c28b0476d0704c9af" } ], "title": "netfilter: nfnetlink_queue: drop bogus WARN_ON", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-41043", "datePublished": "2024-07-29T14:32:01.294Z", "dateReserved": "2024-07-12T12:17:45.624Z", "dateUpdated": "2024-11-05T09:35:33.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.