Количество 65
Количество 65
CVE-2025-37823
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too Similarly to the previous patch, we need to safe guard hfsc_dequeue() too. But for this one, we don't have a reliable reproducer.
CVE-2025-37823
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too Similarly to the previous patch, we need to safe guard hfsc_dequeue() too. But for this one, we don't have a reliable reproducer.
CVE-2025-37823
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too Similarly to the previous patch, we need to safe guard hfsc_dequeue() too. But for this one, we don't have a reliable reproducer.
CVE-2025-37823
net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too
CVE-2025-37823
In the Linux kernel, the following vulnerability has been resolved: n ...
RLSA-2026:0786
Important: kernel security update
GHSA-v24j-9ghx-7rf2
In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop in __ceph_open_session() can race with the client receiving a new monmap or osdmap shortly after the initial map is received. Both ceph_monc_handle_map() and handle_one_map() install a new map immediately after freeing the old one kfree(monc->monmap); monc->monmap = monmap; ceph_osdmap_destroy(osdc->osdmap); osdc->osdmap = newmap; under client->monc.mutex and client->osdc.lock respectively, but because neither is taken in have_mon_and_osd_map() it's possible for client->monc.monmap->epoch and client->osdc.osdmap->epoch arms in client->monc.monmap && client->monc.monmap->epoch && client->osdc.osdmap && client->osdc.osdmap->epoch; condition to dereference an already freed map. This happens to be reproducible with generic/395 and generic/397 with KASAN enabled: BUG: KASAN: slab-use-after-free in have_...
ELSA-2026-0786
ELSA-2026-0786: kernel security update (IMPORTANT)
GHSA-gr82-7xxj-rqx8
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too Similarly to the previous patch, we need to safe guard hfsc_dequeue() too. But for this one, we don't have a reliable reproducer.
BDU:2025-12085
Уязвимость компонента sch_hfsc.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
ROS-20260202-73-0032
Уязвимость kernel-lt
RLSA-2026:0444
Important: kernel security update
ELSA-2026-0444
ELSA-2026-0444: kernel security update (IMPORTANT)
SUSE-SU-2025:4315-1
Security update for the Linux Kernel
RLSA-2026:0793
Important: kernel security update
ELSA-2026-0793
ELSA-2026-0793: kernel security update (IMPORTANT)
SUSE-SU-2025:4188-1
Security update for the Linux Kernel
RLSA-2025:15011
Important: kernel security update
RLSA-2025:15005
Moderate: kernel security update
ELSA-2025-15011
ELSA-2025-15011: kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-37823 In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too Similarly to the previous patch, we need to safe guard hfsc_dequeue() too. But for this one, we don't have a reliable reproducer. | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад | |
CVE-2025-37823 In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too Similarly to the previous patch, we need to safe guard hfsc_dequeue() too. But for this one, we don't have a reliable reproducer. | CVSS3: 7.1 | 0% Низкий | 11 месяцев назад | |
CVE-2025-37823 In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too Similarly to the previous patch, we need to safe guard hfsc_dequeue() too. But for this one, we don't have a reliable reproducer. | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад | |
CVE-2025-37823 net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too | CVSS3: 5.5 | 0% Низкий | 9 месяцев назад | |
CVE-2025-37823 In the Linux kernel, the following vulnerability has been resolved: n ... | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад | |
RLSA-2026:0786 Important: kernel security update | 0% Низкий | 2 месяца назад | ||
GHSA-v24j-9ghx-7rf2 In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop in __ceph_open_session() can race with the client receiving a new monmap or osdmap shortly after the initial map is received. Both ceph_monc_handle_map() and handle_one_map() install a new map immediately after freeing the old one kfree(monc->monmap); monc->monmap = monmap; ceph_osdmap_destroy(osdc->osdmap); osdc->osdmap = newmap; under client->monc.mutex and client->osdc.lock respectively, but because neither is taken in have_mon_and_osd_map() it's possible for client->monc.monmap->epoch and client->osdc.osdmap->epoch arms in client->monc.monmap && client->monc.monmap->epoch && client->osdc.osdmap && client->osdc.osdmap->epoch; condition to dereference an already freed map. This happens to be reproducible with generic/395 and generic/397 with KASAN enabled: BUG: KASAN: slab-use-after-free in have_... | 0% Низкий | 3 месяца назад | ||
ELSA-2026-0786 ELSA-2026-0786: kernel security update (IMPORTANT) | 2 месяца назад | |||
GHSA-gr82-7xxj-rqx8 In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too Similarly to the previous patch, we need to safe guard hfsc_dequeue() too. But for this one, we don't have a reliable reproducer. | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад | |
BDU:2025-12085 Уязвимость компонента sch_hfsc.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | 11 месяцев назад | |
ROS-20260202-73-0032 Уязвимость kernel-lt | CVSS3: 5.5 | 0% Низкий | около 2 месяцев назад | |
RLSA-2026:0444 Important: kernel security update | 2 месяца назад | |||
ELSA-2026-0444 ELSA-2026-0444: kernel security update (IMPORTANT) | 2 месяца назад | |||
SUSE-SU-2025:4315-1 Security update for the Linux Kernel | 4 месяца назад | |||
RLSA-2026:0793 Important: kernel security update | 2 месяца назад | |||
ELSA-2026-0793 ELSA-2026-0793: kernel security update (IMPORTANT) | 2 месяца назад | |||
SUSE-SU-2025:4188-1 Security update for the Linux Kernel | 4 месяца назад | |||
RLSA-2025:15011 Important: kernel security update | 6 месяцев назад | |||
RLSA-2025:15005 Moderate: kernel security update | 6 месяцев назад | |||
ELSA-2025-15011 ELSA-2025-15011: kernel security update (IMPORTANT) | 7 месяцев назад |
Уязвимостей на страницу