Логотип exploitDog
bind:"CVE-2022-50087" OR bind:"CVE-2025-22026" OR bind:"CVE-2025-37797" OR bind:"CVE-2025-38718"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-50087" OR bind:"CVE-2025-22026" OR bind:"CVE-2025-37797" OR bind:"CVE-2025-38718"

Количество 86

Количество 86

ubuntu логотип

CVE-2025-37797

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied.

EPSS: Низкий
redhat логотип

CVE-2025-37797

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-37797

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied.

EPSS: Низкий
msrc логотип

CVE-2025-37797

4 месяца назад

net_sched: hfsc: Fix a UAF vulnerability in class handling

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2025-37797

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: n ...

EPSS: Низкий
github логотип

GHSA-p9gg-wgfj-48p7

2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: sctp: linearize cloned gso packets in sctp_rcv A cloned head skb still shares these frag skbs in fraglist with the original head skb. It's not safe to access these frag skbs. syzbot reported two use-of-uninitialized-memory bugs caused by this: BUG: KMSAN: uninit-value in sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211 sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211 sctp_assoc_bh_rcv+0x1a7/0xc50 net/sctp/associola.c:998 sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88 sctp_backlog_rcv+0x397/0xdb0 net/sctp/input.c:331 sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1122 __release_sock+0x1da/0x330 net/core/sock.c:3106 release_sock+0x6b/0x250 net/core/sock.c:3660 sctp_wait_for_connect+0x487/0x820 net/sctp/socket.c:9360 sctp_sendmsg_to_asoc+0x1ec1/0x1f00 net/sctp/socket.c:1885 sctp_sendmsg+0x32b9/0x4a80 net/sctp/socket.c:2031 inet_sendmsg+0x25a/0x280 net/ipv4/af_inet.c:851 sock_...

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02537-1

3 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02707-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 59 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02671-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP5)

EPSS: Низкий
github логотип

GHSA-hvr4-ppmm-c7fp

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied.

EPSS: Низкий
fstec логотип

BDU:2025-12087

7 месяцев назад

Уязвимость компонента sch_hfsc.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2025-16880

около 1 месяца назад

ELSA-2025-16880: kernel security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02710-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02704-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02693-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02689-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02687-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02676-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02637-1

3 месяца назад

Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02619-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-37797

In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied.

0%
Низкий
6 месяцев назад
redhat логотип
CVE-2025-37797

In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied.

CVSS3: 7
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-37797

In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied.

0%
Низкий
6 месяцев назад
msrc логотип
CVE-2025-37797

net_sched: hfsc: Fix a UAF vulnerability in class handling

CVSS3: 7
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-37797

In the Linux kernel, the following vulnerability has been resolved: n ...

0%
Низкий
6 месяцев назад
github логотип
GHSA-p9gg-wgfj-48p7

In the Linux kernel, the following vulnerability has been resolved: sctp: linearize cloned gso packets in sctp_rcv A cloned head skb still shares these frag skbs in fraglist with the original head skb. It's not safe to access these frag skbs. syzbot reported two use-of-uninitialized-memory bugs caused by this: BUG: KMSAN: uninit-value in sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211 sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211 sctp_assoc_bh_rcv+0x1a7/0xc50 net/sctp/associola.c:998 sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88 sctp_backlog_rcv+0x397/0xdb0 net/sctp/input.c:331 sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1122 __release_sock+0x1da/0x330 net/core/sock.c:3106 release_sock+0x6b/0x250 net/core/sock.c:3660 sctp_wait_for_connect+0x487/0x820 net/sctp/socket.c:9360 sctp_sendmsg_to_asoc+0x1ec1/0x1f00 net/sctp/socket.c:1885 sctp_sendmsg+0x32b9/0x4a80 net/sctp/socket.c:2031 inet_sendmsg+0x25a/0x280 net/ipv4/af_inet.c:851 sock_...

0%
Низкий
2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02537-1

Security update for the Linux Kernel

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02707-1

Security update for the Linux Kernel (Live Patch 59 for SLE 15 SP3)

0%
Низкий
3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02671-1

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP5)

0%
Низкий
3 месяца назад
github логотип
GHSA-hvr4-ppmm-c7fp

In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied.

0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-12087

Уязвимость компонента sch_hfsc.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.8
0%
Низкий
7 месяцев назад
oracle-oval логотип
ELSA-2025-16880

ELSA-2025-16880: kernel security update (MODERATE)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02710-1

Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02704-1

Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02693-1

Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP6)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02689-1

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02687-1

Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02676-1

Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP5)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02637-1

Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP6)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02619-1

Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3)

3 месяца назад

Уязвимостей на страницу