The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade SLES:15.6
dlm-kmp-default
to version 6.4.0-150600.23.73.1 or higher.
Note: Versions mentioned in the description apply only to the upstream dlm-kmp-default
package and not the dlm-kmp-default
package as distributed by SLES
.
See How to fix?
for SLES:15.6
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
comedi: Make insn_rw_emulate_bits() do insn->n samples
The insn_rw_emulate_bits()
function is used as a default handler for
INSN_READ
instructions for subdevices that have a handler for
INSN_BITS
but not for INSN_READ
. Similarly, it is used as a default
handler for INSN_WRITE
instructions for subdevices that have a handler
for INSN_BITS
but not for INSN_WRITE
. It works by emulating the
INSN_READ
or INSN_WRITE
instruction handling with a constructed
INSN_BITS
instruction. However, INSN_READ
and INSN_WRITE
instructions are supposed to be able read or write multiple samples,
indicated by the insn->n
value, but insn_rw_emulate_bits()
currently
only handles a single sample. For INSN_READ
, the comedi core will
copy insn->n
samples back to user-space. (That triggered KASAN
kernel-infoleak errors when insn->n
was greater than 1, but that is
being fixed more generally elsewhere in the comedi core.)
Make insn_rw_emulate_bits()
either handle insn->n
samples, or return
an error, to conform to the general expectation for INSN_READ
and
INSN_WRITE
handlers.