Количество 76
Количество 76
BDU:2025-09177
Уязвимость функции qfq_aggregate() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2025-38477
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats.
CVE-2025-38477
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats.
CVE-2025-38477
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats.
CVE-2025-38477
net/sched: sch_qfq: Fix race condition on qfq_aggregate
CVE-2025-38477
In the Linux kernel, the following vulnerability has been resolved: n ...
SUSE-SU-2025:03583-1
Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3)
SUSE-SU-2025:03576-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP7)
SUSE-SU-2025:03568-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6)
SUSE-SU-2025:03562-1
Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP5)
SUSE-SU-2025:03552-1
Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP4)
SUSE-SU-2025:03550-1
Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP4)
SUSE-SU-2025:03497-1
Security update for the Linux Kernel (Live Patch 69 for SLE 12 SP5)
SUSE-SU-2025:03485-1
Security update for the Linux Kernel (Live Patch 70 for SLE 12 SP5)
SUSE-SU-2025:03479-1
Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP7)
SUSE-SU-2025:03473-1
Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP6)
GHSA-79vc-v8qm-8x53
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats.
SUSE-SU-2025:03572-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7)
SUSE-SU-2025:03567-1
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6)
SUSE-SU-2025:03561-1
Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP5)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2025-09177 Уязвимость функции qfq_aggregate() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7 | 0% Низкий | 4 месяца назад | |
CVE-2025-38477 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats. | 0% Низкий | 4 месяца назад | ||
CVE-2025-38477 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats. | CVSS3: 7.3 | 0% Низкий | 4 месяца назад | |
CVE-2025-38477 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats. | 0% Низкий | 4 месяца назад | ||
CVE-2025-38477 net/sched: sch_qfq: Fix race condition on qfq_aggregate | CVSS3: 7.8 | 0% Низкий | 2 месяца назад | |
CVE-2025-38477 In the Linux kernel, the following vulnerability has been resolved: n ... | 0% Низкий | 4 месяца назад | ||
SUSE-SU-2025:03583-1 Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3) | 0% Низкий | около 1 месяца назад | ||
SUSE-SU-2025:03576-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP7) | 0% Низкий | около 1 месяца назад | ||
SUSE-SU-2025:03568-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6) | 0% Низкий | около 1 месяца назад | ||
SUSE-SU-2025:03562-1 Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP5) | 0% Низкий | около 1 месяца назад | ||
SUSE-SU-2025:03552-1 Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP4) | 0% Низкий | около 1 месяца назад | ||
SUSE-SU-2025:03550-1 Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP4) | 0% Низкий | около 1 месяца назад | ||
SUSE-SU-2025:03497-1 Security update for the Linux Kernel (Live Patch 69 for SLE 12 SP5) | 0% Низкий | около 1 месяца назад | ||
SUSE-SU-2025:03485-1 Security update for the Linux Kernel (Live Patch 70 for SLE 12 SP5) | 0% Низкий | около 1 месяца назад | ||
SUSE-SU-2025:03479-1 Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP7) | 0% Низкий | около 1 месяца назад | ||
SUSE-SU-2025:03473-1 Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP6) | 0% Низкий | около 1 месяца назад | ||
GHSA-79vc-v8qm-8x53 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats. | 0% Низкий | 4 месяца назад | ||
SUSE-SU-2025:03572-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7) | около 1 месяца назад | |||
SUSE-SU-2025:03567-1 Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6) | около 1 месяца назад | |||
SUSE-SU-2025:03561-1 Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP5) | около 1 месяца назад |
Уязвимостей на страницу