Количество 21
Количество 21
CVE-2022-50490
In the Linux kernel, the following vulnerability has been resolved: bpf: Propagate error from htab_lock_bucket() to userspace In __htab_map_lookup_and_delete_batch() if htab_lock_bucket() returns -EBUSY, it will go to next bucket. Going to next bucket may not only skip the elements in current bucket silently, but also incur out-of-bound memory access or expose kernel memory to userspace if current bucket_cnt is greater than bucket_size or zero. Fixing it by stopping batch operation and returning -EBUSY when htab_lock_bucket() fails, and the application can retry or skip the busy batch as needed.
CVE-2022-50490
In the Linux kernel, the following vulnerability has been resolved: bpf: Propagate error from htab_lock_bucket() to userspace In __htab_map_lookup_and_delete_batch() if htab_lock_bucket() returns -EBUSY, it will go to next bucket. Going to next bucket may not only skip the elements in current bucket silently, but also incur out-of-bound memory access or expose kernel memory to userspace if current bucket_cnt is greater than bucket_size or zero. Fixing it by stopping batch operation and returning -EBUSY when htab_lock_bucket() fails, and the application can retry or skip the busy batch as needed.
CVE-2022-50490
In the Linux kernel, the following vulnerability has been resolved: b ...
GHSA-49r4-jvjj-q7x6
In the Linux kernel, the following vulnerability has been resolved: bpf: Propagate error from htab_lock_bucket() to userspace In __htab_map_lookup_and_delete_batch() if htab_lock_bucket() returns -EBUSY, it will go to next bucket. Going to next bucket may not only skip the elements in current bucket silently, but also incur out-of-bound memory access or expose kernel memory to userspace if current bucket_cnt is greater than bucket_size or zero. Fixing it by stopping batch operation and returning -EBUSY when htab_lock_bucket() fails, and the application can retry or skip the busy batch as needed.
SUSE-SU-2026:0185-1
Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:0188-1
Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0187-1
Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0176-1
Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:0206-1
Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0186-1
Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0184-1
Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0180-1
Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0246-1
Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0191-1
Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:0173-1
Security update for the Linux Kernel (Live Patch 21 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0168-1
Security update for the Linux Kernel (Live Patch 40 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:0163-1
Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:0174-1
Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:0166-1
Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2025:4111-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-50490 In the Linux kernel, the following vulnerability has been resolved: bpf: Propagate error from htab_lock_bucket() to userspace In __htab_map_lookup_and_delete_batch() if htab_lock_bucket() returns -EBUSY, it will go to next bucket. Going to next bucket may not only skip the elements in current bucket silently, but also incur out-of-bound memory access or expose kernel memory to userspace if current bucket_cnt is greater than bucket_size or zero. Fixing it by stopping batch operation and returning -EBUSY when htab_lock_bucket() fails, and the application can retry or skip the busy batch as needed. | CVSS3: 7.1 | 0% Низкий | 4 месяца назад | |
CVE-2022-50490 In the Linux kernel, the following vulnerability has been resolved: bpf: Propagate error from htab_lock_bucket() to userspace In __htab_map_lookup_and_delete_batch() if htab_lock_bucket() returns -EBUSY, it will go to next bucket. Going to next bucket may not only skip the elements in current bucket silently, but also incur out-of-bound memory access or expose kernel memory to userspace if current bucket_cnt is greater than bucket_size or zero. Fixing it by stopping batch operation and returning -EBUSY when htab_lock_bucket() fails, and the application can retry or skip the busy batch as needed. | CVSS3: 7.1 | 0% Низкий | 4 месяца назад | |
CVE-2022-50490 In the Linux kernel, the following vulnerability has been resolved: b ... | CVSS3: 7.1 | 0% Низкий | 4 месяца назад | |
GHSA-49r4-jvjj-q7x6 In the Linux kernel, the following vulnerability has been resolved: bpf: Propagate error from htab_lock_bucket() to userspace In __htab_map_lookup_and_delete_batch() if htab_lock_bucket() returns -EBUSY, it will go to next bucket. Going to next bucket may not only skip the elements in current bucket silently, but also incur out-of-bound memory access or expose kernel memory to userspace if current bucket_cnt is greater than bucket_size or zero. Fixing it by stopping batch operation and returning -EBUSY when htab_lock_bucket() fails, and the application can retry or skip the busy batch as needed. | CVSS3: 7.1 | 0% Низкий | 4 месяца назад | |
SUSE-SU-2026:0185-1 Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4) | 20 дней назад | |||
SUSE-SU-2026:0188-1 Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) | 20 дней назад | |||
SUSE-SU-2026:0187-1 Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) | 20 дней назад | |||
SUSE-SU-2026:0176-1 Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4) | 21 день назад | |||
SUSE-SU-2026:0206-1 Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5) | 19 дней назад | |||
SUSE-SU-2026:0186-1 Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5) | 20 дней назад | |||
SUSE-SU-2026:0184-1 Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 20 дней назад | |||
SUSE-SU-2026:0180-1 Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5) | 20 дней назад | |||
SUSE-SU-2026:0246-1 Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP5) | 18 дней назад | |||
SUSE-SU-2026:0191-1 Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4) | 20 дней назад | |||
SUSE-SU-2026:0173-1 Security update for the Linux Kernel (Live Patch 21 for SUSE Linux Enterprise 15 SP5) | 21 день назад | |||
SUSE-SU-2026:0168-1 Security update for the Linux Kernel (Live Patch 40 for SUSE Linux Enterprise 15 SP4) | 21 день назад | |||
SUSE-SU-2026:0163-1 Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4) | 21 день назад | |||
SUSE-SU-2026:0174-1 Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4) | 21 день назад | |||
SUSE-SU-2026:0166-1 Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4) | 21 день назад | |||
SUSE-SU-2025:4111-1 Security update for the Linux Kernel | 3 месяца назад |
Уязвимостей на страницу