Количество 52
Количество 52
GHSA-4grr-9vhg-g98w
In the Linux kernel, the following vulnerability has been resolved: arm64/sve: Discard stale CPU state when handling SVE traps The logic for handling SVE traps manipulates saved FPSIMD/SVE state incorrectly, and a race with preemption can result in a task having TIF_SVE set and TIF_FOREIGN_FPSTATE clear even though the live CPU state is stale (e.g. with SVE traps enabled). This has been observed to result in warnings from do_sve_acc() where SVE traps are not expected while TIF_SVE is set: | if (test_and_set_thread_flag(TIF_SVE)) | WARN_ON(1); /* SVE access shouldn't have trapped */ Warnings of this form have been reported intermittently, e.g. https://lore.kernel.org/linux-arm-kernel/CA+G9fYtEGe_DhY2Ms7+L7NKsLYUomGsgqpdBj+QwDLeSg=JhGg@mail.gmail.com/ https://lore.kernel.org/linux-arm-kernel/000000000000511e9a060ce5a45c@google.com/ The race can occur when the SVE trap handler is preempted before and after manipulating the saved FPSIMD/SVE state, start...

BDU:2025-03155
Уязвимость функции do_sve_acc() модуля arch/arm64/kernel/fpsimd.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
GHSA-9w8f-6h5p-xj5x
In the Linux kernel, the following vulnerability has been resolved: i40e: fix race condition by adding filter's intermediate sync state Fix a race condition in the i40e driver that leads to MAC/VLAN filters becoming corrupted and leaking. Address the issue that occurs under heavy load when multiple threads are concurrently modifying MAC/VLAN filters by setting mac and port VLAN. 1. Thread T0 allocates a filter in i40e_add_filter() within i40e_ndo_set_vf_port_vlan(). 2. Thread T1 concurrently frees the filter in __i40e_del_filter() within i40e_ndo_set_vf_mac(). 3. Subsequently, i40e_service_task() calls i40e_sync_vsi_filters(), which refers to the already freed filter memory, causing corruption. Reproduction steps: 1. Spawn multiple VFs. 2. Apply a concurrent heavy load by running parallel operations to change MAC addresses on the VFs and change port VLANs on the host. 3. Observe errors in dmesg: "Error I40E_AQ_RC_ENOSPC adding RX filters on VF XX,...

BDU:2025-04504
Уязвимость компонента i40e ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2025:0035-1
Security update for the Linux Kernel

SUSE-SU-2024:4367-1
Security update for the Linux Kernel

RLSA-2025:1068
Moderate: kernel security update
ELSA-2025-1068
ELSA-2025-1068: kernel security update (MODERATE)

RLSA-2025:0065
Important: kernel security update
ELSA-2025-0065
ELSA-2025-0065: kernel security update (IMPORTANT)

SUSE-SU-2024:4387-1
Security update for the Linux Kernel

SUSE-SU-2024:4318-1
Security update for the Linux Kernel

SUSE-SU-2024:4388-1
Security update for the Linux Kernel

SUSE-SU-2025:0203-1
Security update for the Linux Kernel

SUSE-SU-2024:4346-1
Security update for the Linux Kernel

SUSE-SU-2024:4376-1
Security update for the Linux Kernel

SUSE-SU-2024:4315-1
Security update for the Linux Kernel

SUSE-SU-2024:4313-1
Security update for the Linux Kernel

ROS-20250318-01
Множественные уязвимости kernel-lt
ELSA-2025-20095
ELSA-2025-20095: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-4grr-9vhg-g98w In the Linux kernel, the following vulnerability has been resolved: arm64/sve: Discard stale CPU state when handling SVE traps The logic for handling SVE traps manipulates saved FPSIMD/SVE state incorrectly, and a race with preemption can result in a task having TIF_SVE set and TIF_FOREIGN_FPSTATE clear even though the live CPU state is stale (e.g. with SVE traps enabled). This has been observed to result in warnings from do_sve_acc() where SVE traps are not expected while TIF_SVE is set: | if (test_and_set_thread_flag(TIF_SVE)) | WARN_ON(1); /* SVE access shouldn't have trapped */ Warnings of this form have been reported intermittently, e.g. https://lore.kernel.org/linux-arm-kernel/CA+G9fYtEGe_DhY2Ms7+L7NKsLYUomGsgqpdBj+QwDLeSg=JhGg@mail.gmail.com/ https://lore.kernel.org/linux-arm-kernel/000000000000511e9a060ce5a45c@google.com/ The race can occur when the SVE trap handler is preempted before and after manipulating the saved FPSIMD/SVE state, start... | CVSS3: 7 | 0% Низкий | 7 месяцев назад | |
![]() | BDU:2025-03155 Уязвимость функции do_sve_acc() модуля arch/arm64/kernel/fpsimd.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7 | 0% Низкий | 8 месяцев назад |
GHSA-9w8f-6h5p-xj5x In the Linux kernel, the following vulnerability has been resolved: i40e: fix race condition by adding filter's intermediate sync state Fix a race condition in the i40e driver that leads to MAC/VLAN filters becoming corrupted and leaking. Address the issue that occurs under heavy load when multiple threads are concurrently modifying MAC/VLAN filters by setting mac and port VLAN. 1. Thread T0 allocates a filter in i40e_add_filter() within i40e_ndo_set_vf_port_vlan(). 2. Thread T1 concurrently frees the filter in __i40e_del_filter() within i40e_ndo_set_vf_mac(). 3. Subsequently, i40e_service_task() calls i40e_sync_vsi_filters(), which refers to the already freed filter memory, causing corruption. Reproduction steps: 1. Spawn multiple VFs. 2. Apply a concurrent heavy load by running parallel operations to change MAC addresses on the VFs and change port VLANs on the host. 3. Observe errors in dmesg: "Error I40E_AQ_RC_ENOSPC adding RX filters on VF XX,... | CVSS3: 4.7 | 0% Низкий | 7 месяцев назад | |
![]() | BDU:2025-04504 Уязвимость компонента i40e ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | 7 месяцев назад |
![]() | SUSE-SU-2025:0035-1 Security update for the Linux Kernel | 5 месяцев назад | ||
![]() | SUSE-SU-2024:4367-1 Security update for the Linux Kernel | 6 месяцев назад | ||
![]() | RLSA-2025:1068 Moderate: kernel security update | 4 месяца назад | ||
ELSA-2025-1068 ELSA-2025-1068: kernel security update (MODERATE) | 4 месяца назад | |||
![]() | RLSA-2025:0065 Important: kernel security update | 5 месяцев назад | ||
ELSA-2025-0065 ELSA-2025-0065: kernel security update (IMPORTANT) | 5 месяцев назад | |||
![]() | SUSE-SU-2024:4387-1 Security update for the Linux Kernel | 6 месяцев назад | ||
![]() | SUSE-SU-2024:4318-1 Security update for the Linux Kernel | 6 месяцев назад | ||
![]() | SUSE-SU-2024:4388-1 Security update for the Linux Kernel | 6 месяцев назад | ||
![]() | SUSE-SU-2025:0203-1 Security update for the Linux Kernel | 5 месяцев назад | ||
![]() | SUSE-SU-2024:4346-1 Security update for the Linux Kernel | 6 месяцев назад | ||
![]() | SUSE-SU-2024:4376-1 Security update for the Linux Kernel | 6 месяцев назад | ||
![]() | SUSE-SU-2024:4315-1 Security update for the Linux Kernel | 6 месяцев назад | ||
![]() | SUSE-SU-2024:4313-1 Security update for the Linux Kernel | 6 месяцев назад | ||
![]() | ROS-20250318-01 Множественные уязвимости kernel-lt | CVSS3: 7.8 | 3 месяца назад | |
ELSA-2025-20095 ELSA-2025-20095: Unbreakable Enterprise kernel security update (IMPORTANT) | 4 месяца назад |
Уязвимостей на страницу