Количество 46
Количество 46
CVE-2025-40248
vsock: Ignore signal/timeout on connect() if already established
CVE-2025-40248
In the Linux kernel, the following vulnerability has been resolved: v ...
GHSA-p7jc-87rf-j283
In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free in tipc_mon_reinit_self(). syzbot reported use-after-free of tipc_net(net)->monitors[] in tipc_mon_reinit_self(). [0] The array is protected by RTNL, but tipc_mon_reinit_self() iterates over it without RTNL. tipc_mon_reinit_self() is called from tipc_net_finalize(), which is always under RTNL except for tipc_net_finalize_work(). Let's hold RTNL in tipc_net_finalize_work(). [0]: BUG: KASAN: slab-use-after-free in __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] BUG: KASAN: slab-use-after-free in _raw_spin_lock_irqsave+0xa7/0xf0 kernel/locking/spinlock.c:162 Read of size 1 at addr ffff88805eae1030 by task kworker/0:7/5989 CPU: 0 UID: 0 PID: 5989 Comm: kworker/0:7 Not tainted syzkaller #0 PREEMPT_{RT,(full)} Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 Workqueue: events tipc_net_finalize_work Call Trace: <TASK> dump_stac...
GHSA-j4rg-4m7w-4hr3
In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on...
ELSA-2026-50060
ELSA-2026-50060: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-20719
ELSA-2025-20719: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2026-1581
ELSA-2026-1581: kernel security update (IMPORTANT)
ELSA-2026-50113
ELSA-2026-50113: Unbreakable Enterprise kernel security update (IMPORTANT)
RLSA-2026:1142
Important: kernel security update
ELSA-2026-1142
ELSA-2026-1142: kernel security update (IMPORTANT)
RLSA-2026:1143
Important: kernel security update
ELSA-2026-1143
ELSA-2026-1143: kernel security update (IMPORTANT)
openSUSE-SU-2026:20145-1
Security update for the Linux Kernel
ELSA-2025-28048
ELSA-2025-28048: Unbreakable Enterprise kernel security update (IMPORTANT)
RLSA-2026:1690
Important: kernel security update
ELSA-2026-1690
ELSA-2026-1690: kernel security update (IMPORTANT)
SUSE-SU-2026:0315-1
Security update for the Linux Kernel
SUSE-SU-2026:0281-1
Security update for the Linux Kernel
SUSE-SU-2026:0278-1
Security update for the Linux Kernel
ELSA-2025-25757
ELSA-2025-25757: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-40248 vsock: Ignore signal/timeout on connect() if already established | CVSS3: 6.3 | 0% Низкий | 4 месяца назад | |
CVE-2025-40248 In the Linux kernel, the following vulnerability has been resolved: v ... | 0% Низкий | 4 месяца назад | ||
GHSA-p7jc-87rf-j283 In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free in tipc_mon_reinit_self(). syzbot reported use-after-free of tipc_net(net)->monitors[] in tipc_mon_reinit_self(). [0] The array is protected by RTNL, but tipc_mon_reinit_self() iterates over it without RTNL. tipc_mon_reinit_self() is called from tipc_net_finalize(), which is always under RTNL except for tipc_net_finalize_work(). Let's hold RTNL in tipc_net_finalize_work(). [0]: BUG: KASAN: slab-use-after-free in __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] BUG: KASAN: slab-use-after-free in _raw_spin_lock_irqsave+0xa7/0xf0 kernel/locking/spinlock.c:162 Read of size 1 at addr ffff88805eae1030 by task kworker/0:7/5989 CPU: 0 UID: 0 PID: 5989 Comm: kworker/0:7 Not tainted syzkaller #0 PREEMPT_{RT,(full)} Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 Workqueue: events tipc_net_finalize_work Call Trace: <TASK> dump_stac... | 0% Низкий | 4 месяца назад | ||
GHSA-j4rg-4m7w-4hr3 In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on... | 0% Низкий | 4 месяца назад | ||
ELSA-2026-50060 ELSA-2026-50060: Unbreakable Enterprise kernel security update (IMPORTANT) | 2 месяца назад | |||
ELSA-2025-20719 ELSA-2025-20719: Unbreakable Enterprise kernel security update (IMPORTANT) | 5 месяцев назад | |||
ELSA-2026-1581 ELSA-2026-1581: kernel security update (IMPORTANT) | 23 дня назад | |||
ELSA-2026-50113 ELSA-2026-50113: Unbreakable Enterprise kernel security update (IMPORTANT) | около 1 месяца назад | |||
RLSA-2026:1142 Important: kernel security update | около 2 месяцев назад | |||
ELSA-2026-1142 ELSA-2026-1142: kernel security update (IMPORTANT) | около 2 месяцев назад | |||
RLSA-2026:1143 Important: kernel security update | около 2 месяцев назад | |||
ELSA-2026-1143 ELSA-2026-1143: kernel security update (IMPORTANT) | около 2 месяцев назад | |||
openSUSE-SU-2026:20145-1 Security update for the Linux Kernel | около 2 месяцев назад | |||
ELSA-2025-28048 ELSA-2025-28048: Unbreakable Enterprise kernel security update (IMPORTANT) | 3 месяца назад | |||
RLSA-2026:1690 Important: kernel security update | около 2 месяцев назад | |||
ELSA-2026-1690 ELSA-2026-1690: kernel security update (IMPORTANT) | около 2 месяцев назад | |||
SUSE-SU-2026:0315-1 Security update for the Linux Kernel | около 2 месяцев назад | |||
SUSE-SU-2026:0281-1 Security update for the Linux Kernel | 2 месяца назад | |||
SUSE-SU-2026:0278-1 Security update for the Linux Kernel | 2 месяца назад | |||
ELSA-2025-25757 ELSA-2025-25757: Unbreakable Enterprise kernel security update (IMPORTANT) | 5 месяцев назад |
Уязвимостей на страницу