Количество 70
Количество 70
SUSE-SU-2025:4203-1
Security update for the Linux Kernel (Live Patch 50 for SUSE Linux Enterprise 15 SP3)
SUSE-SU-2025:4171-1
Security update for the Linux Kernel (Live Patch 51 for SUSE Linux Enterprise 15 SP3)
GHSA-8q99-hhgh-7gww
In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping When an invalid value is passed via quirk option, currently bytcr_rt5640 driver only shows an error message but leaves as is. This may lead to unepxected results like OOB access. This patch corrects the input mapping to the certain default value if an invalid value is passed.
BDU:2025-14951
Уязвимость модуля sound/soc/intel/boards/bytcr_rt5640.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2025-40248
In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logi...
CVE-2025-40248
In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on si
CVE-2025-40248
vsock: Ignore signal/timeout on connect() if already established
CVE-2025-40248
In the Linux kernel, the following vulnerability has been resolved: v ...
CVE-2025-40277
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.
CVE-2025-40277
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.
CVE-2025-40277
drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE
CVE-2025-40277
In the Linux kernel, the following vulnerability has been resolved: d ...
GHSA-j4rg-4m7w-4hr3
In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on...
ELSA-2026-50060
ELSA-2026-50060: Unbreakable Enterprise kernel security update (IMPORTANT)
GHSA-6jjc-g279-fq4c
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.
SUSE-SU-2026:0029-1
Security update for the Linux Kernel
SUSE-SU-2025:4530-1
Security update for the Linux Kernel
SUSE-SU-2025:4506-1
Security update for the Linux Kernel
SUSE-SU-2025:4188-1
Security update for the Linux Kernel
ELSA-2026-50061
ELSA-2026-50061: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2025:4203-1 Security update for the Linux Kernel (Live Patch 50 for SUSE Linux Enterprise 15 SP3) | 2 месяца назад | |||
SUSE-SU-2025:4171-1 Security update for the Linux Kernel (Live Patch 51 for SUSE Linux Enterprise 15 SP3) | 2 месяца назад | |||
GHSA-8q99-hhgh-7gww In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping When an invalid value is passed via quirk option, currently bytcr_rt5640 driver only shows an error message but leaves as is. This may lead to unepxected results like OOB access. This patch corrects the input mapping to the certain default value if an invalid value is passed. | 0% Низкий | 3 месяца назад | ||
BDU:2025-14951 Уязвимость модуля sound/soc/intel/boards/bytcr_rt5640.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7 | 0% Низкий | 5 месяцев назад | |
CVE-2025-40248 In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logi... | 0% Низкий | 2 месяца назад | ||
CVE-2025-40248 In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on si | 0% Низкий | 2 месяца назад | ||
CVE-2025-40248 vsock: Ignore signal/timeout on connect() if already established | CVSS3: 6.3 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-40248 In the Linux kernel, the following vulnerability has been resolved: v ... | 0% Низкий | 2 месяца назад | ||
CVE-2025-40277 In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access. | 0% Низкий | около 2 месяцев назад | ||
CVE-2025-40277 In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access. | 0% Низкий | около 2 месяцев назад | ||
CVE-2025-40277 drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE | CVSS3: 7.3 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-40277 In the Linux kernel, the following vulnerability has been resolved: d ... | 0% Низкий | около 2 месяцев назад | ||
GHSA-j4rg-4m7w-4hr3 In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on... | 0% Низкий | 2 месяца назад | ||
ELSA-2026-50060 ELSA-2026-50060: Unbreakable Enterprise kernel security update (IMPORTANT) | 20 дней назад | |||
GHSA-6jjc-g279-fq4c In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access. | 0% Низкий | около 2 месяцев назад | ||
SUSE-SU-2026:0029-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4530-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4506-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4188-1 Security update for the Linux Kernel | 2 месяца назад | |||
ELSA-2026-50061 ELSA-2026-50061: Unbreakable Enterprise kernel security update (IMPORTANT) | 17 дней назад |
Уязвимостей на страницу