Количество 20
Количество 20

BDU:2025-09177
Уязвимость функции qfq_aggregate() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVE-2025-38477
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats.

CVE-2025-38477
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats.

CVE-2025-38477
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats.
CVE-2025-38477
In the Linux kernel, the following vulnerability has been resolved: n ...
GHSA-79vc-v8qm-8x53
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats.

RLSA-2025:15008
Moderate: kernel security update
ELSA-2025-15008
ELSA-2025-15008: kernel security update (MODERATE)

SUSE-SU-2025:03310-1
Security update for the Linux Kernel

SUSE-SU-2025:02849-1
Security update for the Linux Kernel

SUSE-SU-2025:03344-1
Security update for the Linux Kernel

SUSE-SU-2025:02846-1
Security update for the Linux Kernel

SUSE-SU-2025:03023-1
Security update for the Linux Kernel

SUSE-SU-2025:02996-1
Security update for the Linux Kernel

SUSE-SU-2025:02969-1
Security update for the Linux Kernel

SUSE-SU-2025:02853-1
Security update for the Linux Kernel

SUSE-SU-2025:02997-1
Security update for the Linux Kernel

SUSE-SU-2025:03011-1
Security update for the Linux Kernel
ELSA-2025-20551
ELSA-2025-20551: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2025:02923-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2025-09177 Уязвимость функции qfq_aggregate() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7 | 0% Низкий | 3 месяца назад |
![]() | CVE-2025-38477 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats. | 0% Низкий | 2 месяца назад | |
![]() | CVE-2025-38477 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats. | CVSS3: 7.3 | 0% Низкий | 2 месяца назад |
![]() | CVE-2025-38477 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats. | 0% Низкий | 2 месяца назад | |
CVE-2025-38477 In the Linux kernel, the following vulnerability has been resolved: n ... | 0% Низкий | 2 месяца назад | ||
GHSA-79vc-v8qm-8x53 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats. | 0% Низкий | 2 месяца назад | ||
![]() | RLSA-2025:15008 Moderate: kernel security update | 24 дня назад | ||
ELSA-2025-15008 ELSA-2025-15008: kernel security update (MODERATE) | 30 дней назад | |||
![]() | SUSE-SU-2025:03310-1 Security update for the Linux Kernel | 9 дней назад | ||
![]() | SUSE-SU-2025:02849-1 Security update for the Linux Kernel | около 1 месяца назад | ||
![]() | SUSE-SU-2025:03344-1 Security update for the Linux Kernel | 8 дней назад | ||
![]() | SUSE-SU-2025:02846-1 Security update for the Linux Kernel | около 1 месяца назад | ||
![]() | SUSE-SU-2025:03023-1 Security update for the Linux Kernel | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02996-1 Security update for the Linux Kernel | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02969-1 Security update for the Linux Kernel | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02853-1 Security update for the Linux Kernel | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02997-1 Security update for the Linux Kernel | около 1 месяца назад | ||
![]() | SUSE-SU-2025:03011-1 Security update for the Linux Kernel | около 1 месяца назад | ||
ELSA-2025-20551 ELSA-2025-20551: Unbreakable Enterprise kernel security update (IMPORTANT) | 25 дней назад | |||
![]() | SUSE-SU-2025:02923-1 Security update for the Linux Kernel | около 1 месяца назад |
Уязвимостей на страницу