Количество 55
Количество 55
ELSA-2025-8333
ELSA-2025-8333: kernel security update (MODERATE)

CVE-2025-21764
In the Linux kernel, the following vulnerability has been resolved: ndisc: use RCU protection in ndisc_alloc_skb() ndisc_alloc_skb() can be called without RTNL or RCU being held. Add RCU protection to avoid possible UAF.

CVE-2025-21764
In the Linux kernel, the following vulnerability has been resolved: ndisc: use RCU protection in ndisc_alloc_skb() ndisc_alloc_skb() can be called without RTNL or RCU being held. Add RCU protection to avoid possible UAF.

CVE-2025-21764
In the Linux kernel, the following vulnerability has been resolved: ndisc: use RCU protection in ndisc_alloc_skb() ndisc_alloc_skb() can be called without RTNL or RCU being held. Add RCU protection to avoid possible UAF.

CVE-2025-21764
CVE-2025-21764
In the Linux kernel, the following vulnerability has been resolved: n ...

CVE-2022-3424
A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CVE-2022-3424
A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CVE-2022-3424
A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
CVE-2022-3424
A use-after-free flaw was found in the Linux kernel\u2019s SGI GRU dri ...
GHSA-j8mq-pfgm-36r2
In the Linux kernel, the following vulnerability has been resolved: ndisc: use RCU protection in ndisc_alloc_skb() ndisc_alloc_skb() can be called without RTNL or RCU being held. Add RCU protection to avoid possible UAF.

BDU:2025-04368
Уязвимость функции ndisc_alloc_skb() модуля net/ipv6/ndisc.c реализации протокола IPv6 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

SUSE-SU-2023:0240-1
Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP1)

SUSE-SU-2023:0235-1
Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP1)

SUSE-SU-2023:0231-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP1)

SUSE-SU-2023:0227-1
Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP1)
GHSA-292m-p3v4-44h4
A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.

BDU:2023-00361
Уязвимость функций gru_set_context_option(), gru_fault() и gru_handle_user_call_os() драйвера SGI GRU ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

SUSE-SU-2023:0281-1
Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP3)

SUSE-SU-2023:0271-1
Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP5)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2025-8333 ELSA-2025-8333: kernel security update (MODERATE) | 17 дней назад | |||
![]() | CVE-2025-21764 In the Linux kernel, the following vulnerability has been resolved: ndisc: use RCU protection in ndisc_alloc_skb() ndisc_alloc_skb() can be called without RTNL or RCU being held. Add RCU protection to avoid possible UAF. | CVSS3: 7.8 | 0% Низкий | 4 месяца назад |
![]() | CVE-2025-21764 In the Linux kernel, the following vulnerability has been resolved: ndisc: use RCU protection in ndisc_alloc_skb() ndisc_alloc_skb() can be called without RTNL or RCU being held. Add RCU protection to avoid possible UAF. | CVSS3: 7 | 0% Низкий | 4 месяца назад |
![]() | CVE-2025-21764 In the Linux kernel, the following vulnerability has been resolved: ndisc: use RCU protection in ndisc_alloc_skb() ndisc_alloc_skb() can be called without RTNL or RCU being held. Add RCU protection to avoid possible UAF. | CVSS3: 7.8 | 0% Низкий | 4 месяца назад |
![]() | CVSS3: 7.8 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-21764 In the Linux kernel, the following vulnerability has been resolved: n ... | CVSS3: 7.8 | 0% Низкий | 4 месяца назад | |
![]() | CVE-2022-3424 A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system. | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-3424 A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system. | CVSS3: 7 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-3424 A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system. | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
CVE-2022-3424 A use-after-free flaw was found in the Linux kernel\u2019s SGI GRU dri ... | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
GHSA-j8mq-pfgm-36r2 In the Linux kernel, the following vulnerability has been resolved: ndisc: use RCU protection in ndisc_alloc_skb() ndisc_alloc_skb() can be called without RTNL or RCU being held. Add RCU protection to avoid possible UAF. | CVSS3: 7.8 | 0% Низкий | 4 месяца назад | |
![]() | BDU:2025-04368 Уязвимость функции ndisc_alloc_skb() модуля net/ipv6/ndisc.c реализации протокола IPv6 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7.8 | 0% Низкий | 4 месяца назад |
![]() | SUSE-SU-2023:0240-1 Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP1) | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2023:0235-1 Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP1) | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2023:0231-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP1) | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2023:0227-1 Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP1) | 0% Низкий | больше 2 лет назад | |
GHSA-292m-p3v4-44h4 A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
![]() | BDU:2023-00361 Уязвимость функций gru_set_context_option(), gru_fault() и gru_handle_user_call_os() драйвера SGI GRU ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии | CVSS3: 7 | 0% Низкий | больше 2 лет назад |
![]() | SUSE-SU-2023:0281-1 Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP3) | больше 2 лет назад | ||
![]() | SUSE-SU-2023:0271-1 Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP5) | больше 2 лет назад |
Уязвимостей на страницу