Количество 54
Количество 54
GHSA-p7wh-phc3-g7xr
In the Linux kernel, the following vulnerability has been resolved: sctp: avoid NULL dereference when chunk data buffer is missing chunk->skb pointer is dereferenced in the if-block where it's supposed to be NULL only. chunk->skb can only be NULL if chunk->head_skb is not. Check for frag_list instead and do it just before replacing chunk->skb. We're sure that otherwise chunk->skb is non-NULL because of outer if() condition.
BDU:2026-02894
Уязвимость компонента net/sctp ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
RLSA-2026:0786
Important: kernel security update
GHSA-v24j-9ghx-7rf2
In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop in __ceph_open_session() can race with the client receiving a new monmap or osdmap shortly after the initial map is received. Both ceph_monc_handle_map() and handle_one_map() install a new map immediately after freeing the old one kfree(monc->monmap); monc->monmap = monmap; ceph_osdmap_destroy(osdc->osdmap); osdc->osdmap = newmap; under client->monc.mutex and client->osdc.lock respectively, but because neither is taken in have_mon_and_osd_map() it's possible for client->monc.monmap->epoch and client->osdc.osdmap->epoch arms in client->monc.monmap && client->monc.monmap->epoch && client->osdc.osdmap && client->osdc.osdmap->epoch; condition to dereference an already freed map. This happens to be reproducible with generic/395 and generic/397 with KASAN enabled: BUG: KASAN: slab-use-after-free in have_...
ELSA-2026-0786
ELSA-2026-0786: kernel security update (IMPORTANT)
RLSA-2026:0445
Moderate: kernel security update
ELSA-2026-0445
ELSA-2026-0445: kernel security update (MODERATE)
ELSA-2026-0755
ELSA-2026-0755: kernel security update (MODERATE)
RLSA-2026:0793
Important: kernel security update
ELSA-2026-0793
ELSA-2026-0793: kernel security update (IMPORTANT)
RLSA-2026:0453
Important: kernel security update
ELSA-2026-0453
ELSA-2026-0453: kernel security update (IMPORTANT)
openSUSE-SU-2026:20145-1
Security update for the Linux Kernel
ELSA-2025-28048
ELSA-2025-28048: Unbreakable Enterprise kernel security update (IMPORTANT)
openSUSE-SU-2025:20091-1
Security update for the Linux Kernel
SUSE-SU-2026:0471-1
Security update for the Linux Kernel
SUSE-SU-2025:4128-1
Security update for the Linux Kernel
SUSE-SU-2025:4301-1
Security update for the Linux Kernel
SUSE-SU-2025:4140-1
Security update for the Linux Kernel
SUSE-SU-2026:0474-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-p7wh-phc3-g7xr In the Linux kernel, the following vulnerability has been resolved: sctp: avoid NULL dereference when chunk data buffer is missing chunk->skb pointer is dereferenced in the if-block where it's supposed to be NULL only. chunk->skb can only be NULL if chunk->head_skb is not. Check for frag_list instead and do it just before replacing chunk->skb. We're sure that otherwise chunk->skb is non-NULL because of outer if() condition. | 0% Низкий | 4 месяца назад | ||
BDU:2026-02894 Уязвимость компонента net/sctp ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 0% Низкий | 5 месяцев назад | |
RLSA-2026:0786 Important: kernel security update | 0% Низкий | 2 месяца назад | ||
GHSA-v24j-9ghx-7rf2 In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop in __ceph_open_session() can race with the client receiving a new monmap or osdmap shortly after the initial map is received. Both ceph_monc_handle_map() and handle_one_map() install a new map immediately after freeing the old one kfree(monc->monmap); monc->monmap = monmap; ceph_osdmap_destroy(osdc->osdmap); osdc->osdmap = newmap; under client->monc.mutex and client->osdc.lock respectively, but because neither is taken in have_mon_and_osd_map() it's possible for client->monc.monmap->epoch and client->osdc.osdmap->epoch arms in client->monc.monmap && client->monc.monmap->epoch && client->osdc.osdmap && client->osdc.osdmap->epoch; condition to dereference an already freed map. This happens to be reproducible with generic/395 and generic/397 with KASAN enabled: BUG: KASAN: slab-use-after-free in have_... | 0% Низкий | 3 месяца назад | ||
ELSA-2026-0786 ELSA-2026-0786: kernel security update (IMPORTANT) | 2 месяца назад | |||
RLSA-2026:0445 Moderate: kernel security update | 2 месяца назад | |||
ELSA-2026-0445 ELSA-2026-0445: kernel security update (MODERATE) | 2 месяца назад | |||
ELSA-2026-0755 ELSA-2026-0755: kernel security update (MODERATE) | около 1 месяца назад | |||
RLSA-2026:0793 Important: kernel security update | 2 месяца назад | |||
ELSA-2026-0793 ELSA-2026-0793: kernel security update (IMPORTANT) | 2 месяца назад | |||
RLSA-2026:0453 Important: kernel security update | 2 месяца назад | |||
ELSA-2026-0453 ELSA-2026-0453: kernel security update (IMPORTANT) | 2 месяца назад | |||
openSUSE-SU-2026:20145-1 Security update for the Linux Kernel | около 2 месяцев назад | |||
ELSA-2025-28048 ELSA-2025-28048: Unbreakable Enterprise kernel security update (IMPORTANT) | 3 месяца назад | |||
openSUSE-SU-2025:20091-1 Security update for the Linux Kernel | 4 месяца назад | |||
SUSE-SU-2026:0471-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4128-1 Security update for the Linux Kernel | 4 месяца назад | |||
SUSE-SU-2025:4301-1 Security update for the Linux Kernel | 4 месяца назад | |||
SUSE-SU-2025:4140-1 Security update for the Linux Kernel | 4 месяца назад | |||
SUSE-SU-2026:0474-1 Security update for the Linux Kernel | около 1 месяца назад |
Уязвимостей на страницу