Количество 89
Количество 89
GHSA-jrgc-8xmv-4r2m
In the Linux kernel, the following vulnerability has been resolved: iommufd: Fix race during abort for file descriptors fput() doesn't actually call file_operations release() synchronously, it puts the file on a work queue and it will be released eventually. This is normally fine, except for iommufd the file and the iommufd_object are tied to gether. The file has the object as it's private_data and holds a users refcount, while the object is expected to remain alive as long as the file is. When the allocation of a new object aborts before installing the file it will fput() the file and then go on to immediately kfree() the obj. This causes a UAF once the workqueue completes the fput() and tries to decrement the users refcount. Fix this by putting the core code in charge of the file lifetime, and call __fput_sync() during abort to ensure that release() is called before kfree. __fput_sync() is a bit too tricky to open code in all the object implementations. Instead the objects te...
SUSE-SU-2025:3770-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7)
SUSE-SU-2025:3720-1
Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP4)
SUSE-SU-2025:3703-1
Security update for the Linux Kernel (Live Patch 71 for SLE 12 SP5)
SUSE-SU-2025:03662-1
Security update for the Linux Kernel (Live Patch 70 for SLE 12 SP5)
SUSE-SU-2025:03643-1
Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP7)
GHSA-79rw-jwgh-qv55
In the Linux kernel, the following vulnerability has been resolved: tls: wait for pending async decryptions if tls_strp_msg_hold fails Async decryption calls tls_strp_msg_hold to create a clone of the input skb to hold references to the memory it uses. If we fail to allocate that clone, proceeding with async decryption can lead to various issues (UAF on the skb, writing into userspace memory after the recv() call has returned). In this case, wait for all pending decryption requests.
BDU:2025-16155
Уязвимость функции tls_strp_msg_hold() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2025:3740-1
Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP5)
SUSE-SU-2025:3683-1
Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3)
SUSE-SU-2025:03672-1
Security update for the Linux Kernel (Live Patch 59 for SLE 15 SP3)
SUSE-SU-2025:03666-1
Security update for the Linux Kernel (Live Patch 60 for SLE 15 SP3)
SUSE-SU-2025:03664-1
Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3)
SUSE-SU-2025:03656-1
Security update for the Linux Kernel (Live Patch 62 for SLE 12 SP5)
SUSE-SU-2025:03653-1
Security update for the Linux Kernel (Live Patch 61 for SLE 12 SP5)
SUSE-SU-2025:03652-1
Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5)
ELSA-2025-20645
ELSA-2025-20645: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-20632
ELSA-2025-20632: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2025:3736-1
Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP5)
SUSE-SU-2025:3733-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP5)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-jrgc-8xmv-4r2m In the Linux kernel, the following vulnerability has been resolved: iommufd: Fix race during abort for file descriptors fput() doesn't actually call file_operations release() synchronously, it puts the file on a work queue and it will be released eventually. This is normally fine, except for iommufd the file and the iommufd_object are tied to gether. The file has the object as it's private_data and holds a users refcount, while the object is expected to remain alive as long as the file is. When the allocation of a new object aborts before installing the file it will fput() the file and then go on to immediately kfree() the obj. This causes a UAF once the workqueue completes the fput() and tries to decrement the users refcount. Fix this by putting the core code in charge of the file lifetime, and call __fput_sync() during abort to ensure that release() is called before kfree. __fput_sync() is a bit too tricky to open code in all the object implementations. Instead the objects te... | 0% Низкий | 4 месяца назад | ||
SUSE-SU-2025:3770-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7) | 4 месяца назад | |||
SUSE-SU-2025:3720-1 Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP4) | 4 месяца назад | |||
SUSE-SU-2025:3703-1 Security update for the Linux Kernel (Live Patch 71 for SLE 12 SP5) | 4 месяца назад | |||
SUSE-SU-2025:03662-1 Security update for the Linux Kernel (Live Patch 70 for SLE 12 SP5) | 4 месяца назад | |||
SUSE-SU-2025:03643-1 Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP7) | 4 месяца назад | |||
GHSA-79rw-jwgh-qv55 In the Linux kernel, the following vulnerability has been resolved: tls: wait for pending async decryptions if tls_strp_msg_hold fails Async decryption calls tls_strp_msg_hold to create a clone of the input skb to hold references to the memory it uses. If we fail to allocate that clone, proceeding with async decryption can lead to various issues (UAF on the skb, writing into userspace memory after the recv() call has returned). In this case, wait for all pending decryption requests. | 0% Низкий | 3 месяца назад | ||
BDU:2025-16155 Уязвимость функции tls_strp_msg_hold() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.3 | 0% Низкий | 4 месяца назад | |
SUSE-SU-2025:3740-1 Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP5) | 4 месяца назад | |||
SUSE-SU-2025:3683-1 Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3) | 4 месяца назад | |||
SUSE-SU-2025:03672-1 Security update for the Linux Kernel (Live Patch 59 for SLE 15 SP3) | 4 месяца назад | |||
SUSE-SU-2025:03666-1 Security update for the Linux Kernel (Live Patch 60 for SLE 15 SP3) | 4 месяца назад | |||
SUSE-SU-2025:03664-1 Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3) | 4 месяца назад | |||
SUSE-SU-2025:03656-1 Security update for the Linux Kernel (Live Patch 62 for SLE 12 SP5) | 4 месяца назад | |||
SUSE-SU-2025:03653-1 Security update for the Linux Kernel (Live Patch 61 for SLE 12 SP5) | 4 месяца назад | |||
SUSE-SU-2025:03652-1 Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5) | 4 месяца назад | |||
ELSA-2025-20645 ELSA-2025-20645: Unbreakable Enterprise kernel security update (IMPORTANT) | 4 месяца назад | |||
ELSA-2025-20632 ELSA-2025-20632: Unbreakable Enterprise kernel security update (IMPORTANT) | 5 месяцев назад | |||
SUSE-SU-2025:3736-1 Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP5) | 4 месяца назад | |||
SUSE-SU-2025:3733-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP5) | 4 месяца назад |
Уязвимостей на страницу