Количество 33
Количество 33

BDU:2024-07468
Уязвимость компонента netfilter ядра операционной системы Linux, связанная с использованием памяти после освобождения, позволяющая нарушению оказывать влияние на конфиденциальность, целостность и доступность

CVE-2022-48911
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_queue: fix possible use-after-free Eric Dumazet says: The sock_hold() side seems suspect, because there is no guarantee that sk_refcnt is not already 0. On failure, we cannot queue the packet and need to indicate an error. The packet will be dropped by the caller. v2: split skb prefetch hunk into separate change

CVE-2022-48911
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_queue: fix possible use-after-free Eric Dumazet says: The sock_hold() side seems suspect, because there is no guarantee that sk_refcnt is not already 0. On failure, we cannot queue the packet and need to indicate an error. The packet will be dropped by the caller. v2: split skb prefetch hunk into separate change

CVE-2022-48911
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_queue: fix possible use-after-free Eric Dumazet says: The sock_hold() side seems suspect, because there is no guarantee that sk_refcnt is not already 0. On failure, we cannot queue the packet and need to indicate an error. The packet will be dropped by the caller. v2: split skb prefetch hunk into separate change
CVE-2022-48911
In the Linux kernel, the following vulnerability has been resolved: n ...
GHSA-7vcc-f42v-gv2x
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_queue: fix possible use-after-free Eric Dumazet says: The sock_hold() side seems suspect, because there is no guarantee that sk_refcnt is not already 0. On failure, we cannot queue the packet and need to indicate an error. The packet will be dropped by the caller. v2: split skb prefetch hunk into separate change

SUSE-SU-2025:0927-1
Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5)

SUSE-SU-2025:0916-1
Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3)

SUSE-SU-2025:0897-1
Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3)

SUSE-SU-2025:0944-1
Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3)

SUSE-SU-2025:0904-1
Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5)

SUSE-SU-2025:0893-1
Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5)

SUSE-SU-2025:0950-1
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5)

SUSE-SU-2025:0942-1
Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3)

SUSE-SU-2025:0920-1
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

SUSE-SU-2025:0917-1
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5)

SUSE-SU-2025:0908-1
Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5)

SUSE-SU-2025:0906-1
Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5)

SUSE-SU-2025:0903-1
Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

SUSE-SU-2025:0892-1
Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2024-07468 Уязвимость компонента netfilter ядра операционной системы Linux, связанная с использованием памяти после освобождения, позволяющая нарушению оказывать влияние на конфиденциальность, целостность и доступность | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2022-48911 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_queue: fix possible use-after-free Eric Dumazet says: The sock_hold() side seems suspect, because there is no guarantee that sk_refcnt is not already 0. On failure, we cannot queue the packet and need to indicate an error. The packet will be dropped by the caller. v2: split skb prefetch hunk into separate change | CVSS3: 5.5 | 0% Низкий | 10 месяцев назад |
![]() | CVE-2022-48911 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_queue: fix possible use-after-free Eric Dumazet says: The sock_hold() side seems suspect, because there is no guarantee that sk_refcnt is not already 0. On failure, we cannot queue the packet and need to indicate an error. The packet will be dropped by the caller. v2: split skb prefetch hunk into separate change | CVSS3: 7 | 0% Низкий | 10 месяцев назад |
![]() | CVE-2022-48911 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_queue: fix possible use-after-free Eric Dumazet says: The sock_hold() side seems suspect, because there is no guarantee that sk_refcnt is not already 0. On failure, we cannot queue the packet and need to indicate an error. The packet will be dropped by the caller. v2: split skb prefetch hunk into separate change | CVSS3: 5.5 | 0% Низкий | 10 месяцев назад |
CVE-2022-48911 In the Linux kernel, the following vulnerability has been resolved: n ... | CVSS3: 5.5 | 0% Низкий | 10 месяцев назад | |
GHSA-7vcc-f42v-gv2x In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_queue: fix possible use-after-free Eric Dumazet says: The sock_hold() side seems suspect, because there is no guarantee that sk_refcnt is not already 0. On failure, we cannot queue the packet and need to indicate an error. The packet will be dropped by the caller. v2: split skb prefetch hunk into separate change | CVSS3: 5.5 | 0% Низкий | 10 месяцев назад | |
![]() | SUSE-SU-2025:0927-1 Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5) | 3 месяца назад | ||
![]() | SUSE-SU-2025:0916-1 Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3) | 3 месяца назад | ||
![]() | SUSE-SU-2025:0897-1 Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3) | 3 месяца назад | ||
![]() | SUSE-SU-2025:0944-1 Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3) | 3 месяца назад | ||
![]() | SUSE-SU-2025:0904-1 Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5) | 3 месяца назад | ||
![]() | SUSE-SU-2025:0893-1 Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5) | 3 месяца назад | ||
![]() | SUSE-SU-2025:0950-1 Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5) | 3 месяца назад | ||
![]() | SUSE-SU-2025:0942-1 Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3) | 3 месяца назад | ||
![]() | SUSE-SU-2025:0920-1 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) | 3 месяца назад | ||
![]() | SUSE-SU-2025:0917-1 Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5) | 3 месяца назад | ||
![]() | SUSE-SU-2025:0908-1 Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5) | 3 месяца назад | ||
![]() | SUSE-SU-2025:0906-1 Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5) | 3 месяца назад | ||
![]() | SUSE-SU-2025:0903-1 Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) | 3 месяца назад | ||
![]() | SUSE-SU-2025:0892-1 Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) | 3 месяца назад |
Уязвимостей на страницу