Количество 165
Количество 165
SUSE-SU-2025:02969-1
Security update for the Linux Kernel
SUSE-SU-2025:02853-1
Security update for the Linux Kernel
SUSE-SU-2025:02997-1
Security update for the Linux Kernel
GHSA-9v4w-r8xw-999h
In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction). Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY.
SUSE-SU-2025:03011-1
Security update for the Linux Kernel
GHSA-cc85-5h45-qhc8
In the Linux kernel, the following vulnerability has been resolved: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns What we want is to verify there is that clone won't expose something hidden by a mount we wouldn't be able to undo. "Wouldn't be able to undo" may be a result of MNT_LOCKED on a child, but it may also come from lacking admin rights in the userns of the namespace mount belongs to. clone_private_mnt() checks the former, but not the latter. There's a number of rather confusing CAP_SYS_ADMIN checks in various userns during the mount, especially with the new mount API; they serve different purposes and in case of clone_private_mnt() they usually, but not always end up covering the missing check mentioned above.
SUSE-SU-2025:4063-1
Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP6)
SUSE-SU-2025:3987-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7)
SUSE-SU-2025:3888-1
Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP7)
SUSE-SU-2025:02923-1
Security update for the Linux Kernel
SUSE-SU-2025:03204-1
Security update for the Linux Kernel
SUSE-SU-2025:4058-1
Security update for the Linux Kernel (Live Patch 71 for SUSE Linux Enterprise 12 SP5)
SUSE-SU-2025:4024-1
Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5)
SUSE-SU-2025:3983-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6)
SUSE-SU-2025:3936-1
Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6)
SUSE-SU-2025:3932-1
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6)
SUSE-SU-2025:3927-1
Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP6)
SUSE-SU-2025:3878-1
Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6)
SUSE-SU-2025:3770-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7)
SUSE-SU-2025:3720-1
Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP4)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2025:02969-1 Security update for the Linux Kernel | 3 месяца назад | |||
SUSE-SU-2025:02853-1 Security update for the Linux Kernel | 3 месяца назад | |||
SUSE-SU-2025:02997-1 Security update for the Linux Kernel | 3 месяца назад | |||
GHSA-9v4w-r8xw-999h In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction). Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY. | 0% Низкий | 3 месяца назад | ||
SUSE-SU-2025:03011-1 Security update for the Linux Kernel | 3 месяца назад | |||
GHSA-cc85-5h45-qhc8 In the Linux kernel, the following vulnerability has been resolved: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns What we want is to verify there is that clone won't expose something hidden by a mount we wouldn't be able to undo. "Wouldn't be able to undo" may be a result of MNT_LOCKED on a child, but it may also come from lacking admin rights in the userns of the namespace mount belongs to. clone_private_mnt() checks the former, but not the latter. There's a number of rather confusing CAP_SYS_ADMIN checks in various userns during the mount, especially with the new mount API; they serve different purposes and in case of clone_private_mnt() they usually, but not always end up covering the missing check mentioned above. | 0% Низкий | 3 месяца назад | ||
SUSE-SU-2025:4063-1 Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP6) | 5 дней назад | |||
SUSE-SU-2025:3987-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7) | 9 дней назад | |||
SUSE-SU-2025:3888-1 Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP7) | 17 дней назад | |||
SUSE-SU-2025:02923-1 Security update for the Linux Kernel | 3 месяца назад | |||
SUSE-SU-2025:03204-1 Security update for the Linux Kernel | 2 месяца назад | |||
SUSE-SU-2025:4058-1 Security update for the Linux Kernel (Live Patch 71 for SUSE Linux Enterprise 12 SP5) | 5 дней назад | |||
SUSE-SU-2025:4024-1 Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5) | 7 дней назад | |||
SUSE-SU-2025:3983-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6) | 10 дней назад | |||
SUSE-SU-2025:3936-1 Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) | 12 дней назад | |||
SUSE-SU-2025:3932-1 Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6) | 13 дней назад | |||
SUSE-SU-2025:3927-1 Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP6) | 13 дней назад | |||
SUSE-SU-2025:3878-1 Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6) | 17 дней назад | |||
SUSE-SU-2025:3770-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7) | 24 дня назад | |||
SUSE-SU-2025:3720-1 Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP4) | 26 дней назад |
Уязвимостей на страницу