Количество 17
Количество 17
BDU:2025-15669
Уязвимость компонента slub.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2025-39902
In the Linux kernel, the following vulnerability has been resolved: mm/slub: avoid accessing metadata when pointer is invalid in object_err() object_err() reports details of an object for further debugging, such as the freelist pointer, redzone, etc. However, if the pointer is invalid, attempting to access object metadata can lead to a crash since it does not point to a valid object. One known path to the crash is when alloc_consistency_checks() determines the pointer to the allocated object is invalid because of a freelist corruption, and calls object_err() to report it. The debug code should report and handle the corruption gracefully and not crash in the process. In case the pointer is NULL or check_valid_pointer() returns false for the pointer, only print the pointer value and skip accessing metadata.
CVE-2025-39902
In the Linux kernel, the following vulnerability has been resolved: mm/slub: avoid accessing metadata when pointer is invalid in object_err() object_err() reports details of an object for further debugging, such as the freelist pointer, redzone, etc. However, if the pointer is invalid, attempting to access object metadata can lead to a crash since it does not point to a valid object. One known path to the crash is when alloc_consistency_checks() determines the pointer to the allocated object is invalid because of a freelist corruption, and calls object_err() to report it. The debug code should report and handle the corruption gracefully and not crash in the process. In case the pointer is NULL or check_valid_pointer() returns false for the pointer, only print the pointer value and skip accessing metadata.
CVE-2025-39902
mm/slub: avoid accessing metadata when pointer is invalid in object_err()
CVE-2025-39902
In the Linux kernel, the following vulnerability has been resolved: m ...
GHSA-27rc-rcpv-8mr7
In the Linux kernel, the following vulnerability has been resolved: mm/slub: avoid accessing metadata when pointer is invalid in object_err() object_err() reports details of an object for further debugging, such as the freelist pointer, redzone, etc. However, if the pointer is invalid, attempting to access object metadata can lead to a crash since it does not point to a valid object. One known path to the crash is when alloc_consistency_checks() determines the pointer to the allocated object is invalid because of a freelist corruption, and calls object_err() to report it. The debug code should report and handle the corruption gracefully and not crash in the process. In case the pointer is NULL or check_valid_pointer() returns false for the pointer, only print the pointer value and skip accessing metadata.
ELSA-2025-25755
ELSA-2025-25755: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-25757
ELSA-2025-25757: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-25754
ELSA-2025-25754: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2025:4128-1
Security update for the Linux Kernel
SUSE-SU-2025:4301-1
Security update for the Linux Kernel
SUSE-SU-2025:4140-1
Security update for the Linux Kernel
SUSE-SU-2025:4141-1
Security update for the Linux Kernel
SUSE-SU-2025:4132-1
Security update for the Linux Kernel
SUSE-SU-2025:4057-1
Security update for the Linux Kernel
openSUSE-SU-2025:20081-1
Security update for the Linux Kernel
openSUSE-SU-2025-20011-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2025-15669 Уязвимость компонента slub.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | 4 месяца назад | |
CVE-2025-39902 In the Linux kernel, the following vulnerability has been resolved: mm/slub: avoid accessing metadata when pointer is invalid in object_err() object_err() reports details of an object for further debugging, such as the freelist pointer, redzone, etc. However, if the pointer is invalid, attempting to access object metadata can lead to a crash since it does not point to a valid object. One known path to the crash is when alloc_consistency_checks() determines the pointer to the allocated object is invalid because of a freelist corruption, and calls object_err() to report it. The debug code should report and handle the corruption gracefully and not crash in the process. In case the pointer is NULL or check_valid_pointer() returns false for the pointer, only print the pointer value and skip accessing metadata. | 0% Низкий | 3 месяца назад | ||
CVE-2025-39902 In the Linux kernel, the following vulnerability has been resolved: mm/slub: avoid accessing metadata when pointer is invalid in object_err() object_err() reports details of an object for further debugging, such as the freelist pointer, redzone, etc. However, if the pointer is invalid, attempting to access object metadata can lead to a crash since it does not point to a valid object. One known path to the crash is when alloc_consistency_checks() determines the pointer to the allocated object is invalid because of a freelist corruption, and calls object_err() to report it. The debug code should report and handle the corruption gracefully and not crash in the process. In case the pointer is NULL or check_valid_pointer() returns false for the pointer, only print the pointer value and skip accessing metadata. | 0% Низкий | 3 месяца назад | ||
CVE-2025-39902 mm/slub: avoid accessing metadata when pointer is invalid in object_err() | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-39902 In the Linux kernel, the following vulnerability has been resolved: m ... | 0% Низкий | 3 месяца назад | ||
GHSA-27rc-rcpv-8mr7 In the Linux kernel, the following vulnerability has been resolved: mm/slub: avoid accessing metadata when pointer is invalid in object_err() object_err() reports details of an object for further debugging, such as the freelist pointer, redzone, etc. However, if the pointer is invalid, attempting to access object metadata can lead to a crash since it does not point to a valid object. One known path to the crash is when alloc_consistency_checks() determines the pointer to the allocated object is invalid because of a freelist corruption, and calls object_err() to report it. The debug code should report and handle the corruption gracefully and not crash in the process. In case the pointer is NULL or check_valid_pointer() returns false for the pointer, only print the pointer value and skip accessing metadata. | 0% Низкий | 3 месяца назад | ||
ELSA-2025-25755 ELSA-2025-25755: Unbreakable Enterprise kernel security update (IMPORTANT) | около 2 месяцев назад | |||
ELSA-2025-25757 ELSA-2025-25757: Unbreakable Enterprise kernel security update (IMPORTANT) | около 2 месяцев назад | |||
ELSA-2025-25754 ELSA-2025-25754: Unbreakable Enterprise kernel security update (IMPORTANT) | около 2 месяцев назад | |||
SUSE-SU-2025:4128-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4301-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4140-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4141-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4132-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4057-1 Security update for the Linux Kernel | около 2 месяцев назад | |||
openSUSE-SU-2025:20081-1 Security update for the Linux Kernel | около 1 месяца назад | |||
openSUSE-SU-2025-20011-1 Security update for the Linux Kernel | около 2 месяцев назад |
Уязвимостей на страницу