Количество 173
Количество 173
SUSE-SU-2025:03310-1
Security update for the Linux Kernel
SUSE-SU-2025:03023-1
Security update for the Linux Kernel
SUSE-SU-2025:02996-1
Security update for the Linux Kernel
SUSE-SU-2025:02969-1
Security update for the Linux Kernel
SUSE-SU-2025:02853-1
Security update for the Linux Kernel
SUSE-SU-2025:02997-1
Security update for the Linux Kernel
SUSE-SU-2025:03011-1
Security update for the Linux Kernel
GHSA-9v4w-r8xw-999h
In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction). Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY.
BDU:2025-15180
Уязвимость компонента vsock ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
GHSA-cc85-5h45-qhc8
In the Linux kernel, the following vulnerability has been resolved: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns What we want is to verify there is that clone won't expose something hidden by a mount we wouldn't be able to undo. "Wouldn't be able to undo" may be a result of MNT_LOCKED on a child, but it may also come from lacking admin rights in the userns of the namespace mount belongs to. clone_private_mnt() checks the former, but not the latter. There's a number of rather confusing CAP_SYS_ADMIN checks in various userns during the mount, especially with the new mount API; they serve different purposes and in case of clone_private_mnt() they usually, but not always end up covering the missing check mentioned above.
BDU:2025-15160
Уязвимость функции clone_private_mnt() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность и доступность защищамой информации
SUSE-SU-2025:4063-1
Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP6)
SUSE-SU-2025:3987-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7)
SUSE-SU-2025:3888-1
Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP7)
ELSA-2025-23279
ELSA-2025-23279: kernel security update (IMPORTANT)
SUSE-SU-2025:02923-1
Security update for the Linux Kernel
SUSE-SU-2025:03204-1
Security update for the Linux Kernel
SUSE-SU-2025:4058-1
Security update for the Linux Kernel (Live Patch 71 for SUSE Linux Enterprise 12 SP5)
SUSE-SU-2025:4024-1
Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5)
SUSE-SU-2025:3983-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2025:03310-1 Security update for the Linux Kernel | 3 месяца назад | |||
SUSE-SU-2025:03023-1 Security update for the Linux Kernel | 4 месяца назад | |||
SUSE-SU-2025:02996-1 Security update for the Linux Kernel | 4 месяца назад | |||
SUSE-SU-2025:02969-1 Security update for the Linux Kernel | 4 месяца назад | |||
SUSE-SU-2025:02853-1 Security update for the Linux Kernel | 5 месяцев назад | |||
SUSE-SU-2025:02997-1 Security update for the Linux Kernel | 4 месяца назад | |||
SUSE-SU-2025:03011-1 Security update for the Linux Kernel | 4 месяца назад | |||
GHSA-9v4w-r8xw-999h In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction). Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY. | 0% Низкий | 4 месяца назад | ||
BDU:2025-15180 Уязвимость компонента vsock ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7 | 0% Низкий | 5 месяцев назад | |
GHSA-cc85-5h45-qhc8 In the Linux kernel, the following vulnerability has been resolved: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns What we want is to verify there is that clone won't expose something hidden by a mount we wouldn't be able to undo. "Wouldn't be able to undo" may be a result of MNT_LOCKED on a child, but it may also come from lacking admin rights in the userns of the namespace mount belongs to. clone_private_mnt() checks the former, but not the latter. There's a number of rather confusing CAP_SYS_ADMIN checks in various userns during the mount, especially with the new mount API; they serve different purposes and in case of clone_private_mnt() they usually, but not always end up covering the missing check mentioned above. | 0% Низкий | 5 месяцев назад | ||
BDU:2025-15160 Уязвимость функции clone_private_mnt() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность и доступность защищамой информации | CVSS3: 8.4 | 0% Низкий | 7 месяцев назад | |
SUSE-SU-2025:4063-1 Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP6) | около 2 месяцев назад | |||
SUSE-SU-2025:3987-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7) | около 2 месяцев назад | |||
SUSE-SU-2025:3888-1 Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP7) | 2 месяца назад | |||
ELSA-2025-23279 ELSA-2025-23279: kernel security update (IMPORTANT) | 16 дней назад | |||
SUSE-SU-2025:02923-1 Security update for the Linux Kernel | 4 месяца назад | |||
SUSE-SU-2025:03204-1 Security update for the Linux Kernel | 4 месяца назад | |||
SUSE-SU-2025:4058-1 Security update for the Linux Kernel (Live Patch 71 for SUSE Linux Enterprise 12 SP5) | около 2 месяцев назад | |||
SUSE-SU-2025:4024-1 Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5) | около 2 месяцев назад | |||
SUSE-SU-2025:3983-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6) | около 2 месяцев назад |
Уязвимостей на страницу