Количество 70
Количество 70
ELSA-2026-1142
ELSA-2026-1142: kernel security update (IMPORTANT)
CVE-2023-53673
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: call disconnect callback before deleting conn In hci_cs_disconnect, we do hci_conn_del even if disconnection failed. ISO, L2CAP and SCO connections refer to the hci_conn without hci_conn_get, so disconn_cfm must be called so they can clean up their conn, otherwise use-after-free occurs. ISO: ========================================================== iso_sock_connect:880: sk 00000000eabd6557 iso_connect_cis:356: 70:1a:b8:98:ff:a2 -> 28:3d:c2:4a:7e:da ... iso_conn_add:140: hcon 000000001696f1fd conn 00000000b6251073 hci_dev_put:1487: hci0 orig refcnt 17 __iso_chan_add:214: conn 00000000b6251073 iso_sock_clear_timer:117: sock 00000000eabd6557 state 3 ... hci_rx_work:4085: hci0 Event packet hci_event_packet:7601: hci0: event 0x0f hci_cmd_status_evt:4346: hci0: opcode 0x0406 hci_cs_disconnect:2760: hci0: status 0x0c hci_sent_cmd_data:3107: hci0 opcode 0x0406 hci_conn_del:1151: hci0 hcon 000000001696...
CVE-2023-53673
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: call disconnect callback before deleting conn In hci_cs_disconnect, we do hci_conn_del even if disconnection failed. ISO, L2CAP and SCO connections refer to the hci_conn without hci_conn_get, so disconn_cfm must be called so they can clean up their conn, otherwise use-after-free occurs. ISO: ========================================================== iso_sock_connect:880: sk 00000000eabd6557 iso_connect_cis:356: 70:1a:b8:98:ff:a2 -> 28:3d:c2:4a:7e:da ... iso_conn_add:140: hcon 000000001696f1fd conn 00000000b6251073 hci_dev_put:1487: hci0 orig refcnt 17 __iso_chan_add:214: conn 00000000b6251073 iso_sock_clear_timer:117: sock 00000000eabd6557 state 3 ... hci_rx_work:4085: hci0 Event packet hci_event_packet:7601: hci0: event 0x0f hci_cmd_status_evt:4346: hci0: opcode 0x0406 hci_cs_disconnect:2760: hci0: status 0x0c hci_sent_cmd_data:3107: hci0 opcode 0x0406 hci_conn_del:1151: hci0 hcon 00000000169
CVE-2023-53673
In the Linux kernel, the following vulnerability has been resolved: B ...
SUSE-SU-2025:4281-1
Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2025:4242-1
Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2025:4237-1
Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4)
GHSA-7v48-2x62-5ff3
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: call disconnect callback before deleting conn In hci_cs_disconnect, we do hci_conn_del even if disconnection failed. ISO, L2CAP and SCO connections refer to the hci_conn without hci_conn_get, so disconn_cfm must be called so they can clean up their conn, otherwise use-after-free occurs. ISO: ========================================================== iso_sock_connect:880: sk 00000000eabd6557 iso_connect_cis:356: 70:1a:b8:98:ff:a2 -> 28:3d:c2:4a:7e:da ... iso_conn_add:140: hcon 000000001696f1fd conn 00000000b6251073 hci_dev_put:1487: hci0 orig refcnt 17 __iso_chan_add:214: conn 00000000b6251073 iso_sock_clear_timer:117: sock 00000000eabd6557 state 3 ... hci_rx_work:4085: hci0 Event packet hci_event_packet:7601: hci0: event 0x0f hci_cmd_status_evt:4346: hci0: opcode 0x0406 hci_cs_disconnect:2760: hci0: status 0x0c hci_sent_cmd_data:3107: hci0 opcode 0x0406 hci_conn_del:1151: hci0 hcon 00000000...
SUSE-SU-2025:4233-1
Security update for the Linux Kernel (Live Patch 41 for SUSE Linux Enterprise 15 SP4)
CVE-2025-40154
In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping When an invalid value is passed via quirk option, currently bytcr_rt5640 driver only shows an error message but leaves as is. This may lead to unepxected results like OOB access. This patch corrects the input mapping to the certain default value if an invalid value is passed.
CVE-2025-40154
In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping When an invalid value is passed via quirk option, currently bytcr_rt5640 driver only shows an error message but leaves as is. This may lead to unepxected results like OOB access. This patch corrects the input mapping to the certain default value if an invalid value is passed.
CVE-2025-40154
In the Linux kernel, the following vulnerability has been resolved: A ...
SUSE-SU-2025:4285-1
Security update for the Linux Kernel (Live Patch 62 for SUSE Linux Enterprise 15 SP3)
SUSE-SU-2025:4239-1
Security update for the Linux Kernel (Live Patch 39 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2025:4230-1
Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2025:4227-1
Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2025:4215-1
Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2025:4213-1
Security update for the Linux Kernel (Live Patch 59 for SUSE Linux Enterprise 15 SP3)
SUSE-SU-2025:4199-1
Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2025:4172-1
Security update for the Linux Kernel (Live Patch 60 for SUSE Linux Enterprise 15 SP3)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2026-1142 ELSA-2026-1142: kernel security update (IMPORTANT) | 10 дней назад | |||
CVE-2023-53673 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: call disconnect callback before deleting conn In hci_cs_disconnect, we do hci_conn_del even if disconnection failed. ISO, L2CAP and SCO connections refer to the hci_conn without hci_conn_get, so disconn_cfm must be called so they can clean up their conn, otherwise use-after-free occurs. ISO: ========================================================== iso_sock_connect:880: sk 00000000eabd6557 iso_connect_cis:356: 70:1a:b8:98:ff:a2 -> 28:3d:c2:4a:7e:da ... iso_conn_add:140: hcon 000000001696f1fd conn 00000000b6251073 hci_dev_put:1487: hci0 orig refcnt 17 __iso_chan_add:214: conn 00000000b6251073 iso_sock_clear_timer:117: sock 00000000eabd6557 state 3 ... hci_rx_work:4085: hci0 Event packet hci_event_packet:7601: hci0: event 0x0f hci_cmd_status_evt:4346: hci0: opcode 0x0406 hci_cs_disconnect:2760: hci0: status 0x0c hci_sent_cmd_data:3107: hci0 opcode 0x0406 hci_conn_del:1151: hci0 hcon 000000001696... | 0% Низкий | 4 месяца назад | ||
CVE-2023-53673 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: call disconnect callback before deleting conn In hci_cs_disconnect, we do hci_conn_del even if disconnection failed. ISO, L2CAP and SCO connections refer to the hci_conn without hci_conn_get, so disconn_cfm must be called so they can clean up their conn, otherwise use-after-free occurs. ISO: ========================================================== iso_sock_connect:880: sk 00000000eabd6557 iso_connect_cis:356: 70:1a:b8:98:ff:a2 -> 28:3d:c2:4a:7e:da ... iso_conn_add:140: hcon 000000001696f1fd conn 00000000b6251073 hci_dev_put:1487: hci0 orig refcnt 17 __iso_chan_add:214: conn 00000000b6251073 iso_sock_clear_timer:117: sock 00000000eabd6557 state 3 ... hci_rx_work:4085: hci0 Event packet hci_event_packet:7601: hci0: event 0x0f hci_cmd_status_evt:4346: hci0: opcode 0x0406 hci_cs_disconnect:2760: hci0: status 0x0c hci_sent_cmd_data:3107: hci0 opcode 0x0406 hci_conn_del:1151: hci0 hcon 00000000169 | 0% Низкий | 4 месяца назад | ||
CVE-2023-53673 In the Linux kernel, the following vulnerability has been resolved: B ... | 0% Низкий | 4 месяца назад | ||
SUSE-SU-2025:4281-1 Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4) | 0% Низкий | 2 месяца назад | ||
SUSE-SU-2025:4242-1 Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4) | 0% Низкий | 2 месяца назад | ||
SUSE-SU-2025:4237-1 Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4) | 0% Низкий | 2 месяца назад | ||
GHSA-7v48-2x62-5ff3 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: call disconnect callback before deleting conn In hci_cs_disconnect, we do hci_conn_del even if disconnection failed. ISO, L2CAP and SCO connections refer to the hci_conn without hci_conn_get, so disconn_cfm must be called so they can clean up their conn, otherwise use-after-free occurs. ISO: ========================================================== iso_sock_connect:880: sk 00000000eabd6557 iso_connect_cis:356: 70:1a:b8:98:ff:a2 -> 28:3d:c2:4a:7e:da ... iso_conn_add:140: hcon 000000001696f1fd conn 00000000b6251073 hci_dev_put:1487: hci0 orig refcnt 17 __iso_chan_add:214: conn 00000000b6251073 iso_sock_clear_timer:117: sock 00000000eabd6557 state 3 ... hci_rx_work:4085: hci0 Event packet hci_event_packet:7601: hci0: event 0x0f hci_cmd_status_evt:4346: hci0: opcode 0x0406 hci_cs_disconnect:2760: hci0: status 0x0c hci_sent_cmd_data:3107: hci0 opcode 0x0406 hci_conn_del:1151: hci0 hcon 00000000... | CVSS3: 7.8 | 0% Низкий | 4 месяца назад | |
SUSE-SU-2025:4233-1 Security update for the Linux Kernel (Live Patch 41 for SUSE Linux Enterprise 15 SP4) | 2 месяца назад | |||
CVE-2025-40154 In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping When an invalid value is passed via quirk option, currently bytcr_rt5640 driver only shows an error message but leaves as is. This may lead to unepxected results like OOB access. This patch corrects the input mapping to the certain default value if an invalid value is passed. | 0% Низкий | 3 месяца назад | ||
CVE-2025-40154 In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping When an invalid value is passed via quirk option, currently bytcr_rt5640 driver only shows an error message but leaves as is. This may lead to unepxected results like OOB access. This patch corrects the input mapping to the certain default value if an invalid value is passed. | 0% Низкий | 3 месяца назад | ||
CVE-2025-40154 In the Linux kernel, the following vulnerability has been resolved: A ... | 0% Низкий | 3 месяца назад | ||
SUSE-SU-2025:4285-1 Security update for the Linux Kernel (Live Patch 62 for SUSE Linux Enterprise 15 SP3) | 2 месяца назад | |||
SUSE-SU-2025:4239-1 Security update for the Linux Kernel (Live Patch 39 for SUSE Linux Enterprise 15 SP4) | 2 месяца назад | |||
SUSE-SU-2025:4230-1 Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4) | 2 месяца назад | |||
SUSE-SU-2025:4227-1 Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4) | 2 месяца назад | |||
SUSE-SU-2025:4215-1 Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4) | 2 месяца назад | |||
SUSE-SU-2025:4213-1 Security update for the Linux Kernel (Live Patch 59 for SUSE Linux Enterprise 15 SP3) | 2 месяца назад | |||
SUSE-SU-2025:4199-1 Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP4) | 2 месяца назад | |||
SUSE-SU-2025:4172-1 Security update for the Linux Kernel (Live Patch 60 for SUSE Linux Enterprise 15 SP3) | 2 месяца назад |
Уязвимостей на страницу