Количество 46
Количество 46
CVE-2026-23209
In the Linux kernel, the following vulnerability has been resolved: m ...
SUSE-SU-2026:1041-1
Security update for the Linux Kernel
GHSA-rf63-9f5h-hhg6
In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does not fully validate negative @offset values. Use skb_header_pointer_careful() instead. GangMin Kim provided a report and a repro fooling u32_classify(): BUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0 net/sched/cls_u32.c:221
GHSA-89j4-f3cq-gm32
In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in macvlan_common_newlink() valis provided a nice repro to crash the kernel: ip link add p1 type veth peer p2 ip link set address 00:00:00:00:00:20 dev p1 ip link set up dev p1 ip link set up dev p2 ip link add mv0 link p2 type macvlan mode source ip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20 ping -c1 -I p1 1.2.3.4 He also gave a very detailed analysis: <quote valis> The issue is triggered when a new macvlan link is created with MACVLAN_MODE_SOURCE mode and MACVLAN_MACADDR_ADD (or MACVLAN_MACADDR_SET) parameter, lower device already has a macvlan port and register_netdevice() called from macvlan_common_newlink() fails (e.g. because of the invalid link name). In this case macvlan_hash_add_source is called from macvlan_change_sources() / macvlan_common_newlink(): This adds a reference to vlan to the port's vlan_source_hash using macvlan_sourc...
SUSE-SU-2026:1078-1
Security update for the Linux Kernel
SUSE-SU-2025:03314-1
Security update for the Linux Kernel
SUSE-SU-2025:03310-1
Security update for the Linux Kernel
ELSA-2026-50160
ELSA-2026-50160: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2026:0962-1
Security update for the Linux Kernel
SUSE-SU-2026:1081-1
Security update for the Linux Kernel
SUSE-SU-2025:03344-1
Security update for the Linux Kernel
ELSA-2025-20553
ELSA-2025-20553: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2025:02846-1
Security update for the Linux Kernel
ELSA-2025-20552
ELSA-2025-20552: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2025:03023-1
Security update for the Linux Kernel
SUSE-SU-2025:02996-1
Security update for the Linux Kernel
SUSE-SU-2025:02969-1
Security update for the Linux Kernel
SUSE-SU-2025:02853-1
Security update for the Linux Kernel
SUSE-SU-2025:02997-1
Security update for the Linux Kernel
SUSE-SU-2025:03011-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2026-23209 In the Linux kernel, the following vulnerability has been resolved: m ... | CVSS3: 7.8 | 0% Низкий | около 2 месяцев назад | |
SUSE-SU-2026:1041-1 Security update for the Linux Kernel | 13 дней назад | |||
GHSA-rf63-9f5h-hhg6 In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does not fully validate negative @offset values. Use skb_header_pointer_careful() instead. GangMin Kim provided a report and a repro fooling u32_classify(): BUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0 net/sched/cls_u32.c:221 | CVSS3: 7.1 | 0% Низкий | около 2 месяцев назад | |
GHSA-89j4-f3cq-gm32 In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in macvlan_common_newlink() valis provided a nice repro to crash the kernel: ip link add p1 type veth peer p2 ip link set address 00:00:00:00:00:20 dev p1 ip link set up dev p1 ip link set up dev p2 ip link add mv0 link p2 type macvlan mode source ip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20 ping -c1 -I p1 1.2.3.4 He also gave a very detailed analysis: <quote valis> The issue is triggered when a new macvlan link is created with MACVLAN_MODE_SOURCE mode and MACVLAN_MACADDR_ADD (or MACVLAN_MACADDR_SET) parameter, lower device already has a macvlan port and register_netdevice() called from macvlan_common_newlink() fails (e.g. because of the invalid link name). In this case macvlan_hash_add_source is called from macvlan_change_sources() / macvlan_common_newlink(): This adds a reference to vlan to the port's vlan_source_hash using macvlan_sourc... | CVSS3: 7.8 | 0% Низкий | около 2 месяцев назад | |
SUSE-SU-2026:1078-1 Security update for the Linux Kernel | 12 дней назад | |||
SUSE-SU-2025:03314-1 Security update for the Linux Kernel | 7 месяцев назад | |||
SUSE-SU-2025:03310-1 Security update for the Linux Kernel | 7 месяцев назад | |||
ELSA-2026-50160 ELSA-2026-50160: Unbreakable Enterprise kernel security update (IMPORTANT) | 19 дней назад | |||
SUSE-SU-2026:0962-1 Security update for the Linux Kernel | 15 дней назад | |||
SUSE-SU-2026:1081-1 Security update for the Linux Kernel | 12 дней назад | |||
SUSE-SU-2025:03344-1 Security update for the Linux Kernel | 7 месяцев назад | |||
ELSA-2025-20553 ELSA-2025-20553: Unbreakable Enterprise kernel security update (IMPORTANT) | 7 месяцев назад | |||
SUSE-SU-2025:02846-1 Security update for the Linux Kernel | 8 месяцев назад | |||
ELSA-2025-20552 ELSA-2025-20552: Unbreakable Enterprise kernel security update (IMPORTANT) | 7 месяцев назад | |||
SUSE-SU-2025:03023-1 Security update for the Linux Kernel | 7 месяцев назад | |||
SUSE-SU-2025:02996-1 Security update for the Linux Kernel | 7 месяцев назад | |||
SUSE-SU-2025:02969-1 Security update for the Linux Kernel | 8 месяцев назад | |||
SUSE-SU-2025:02853-1 Security update for the Linux Kernel | 8 месяцев назад | |||
SUSE-SU-2025:02997-1 Security update for the Linux Kernel | 7 месяцев назад | |||
SUSE-SU-2025:03011-1 Security update for the Linux Kernel | 7 месяцев назад |
Уязвимостей на страницу