Количество 21
Количество 21
CVE-2025-21759
In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called without RTNL or RCU being held. Extend RCU protection so that we can safely fetch the net pointer and avoid a potential UAF. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection.
CVE-2025-21759
In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called without RTNL or RCU being held. Extend RCU protection so that we can safely fetch the net pointer and avoid a potential UAF. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection.
CVE-2025-21759
In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called without RTNL or RCU being held. Extend RCU protection so that we can safely fetch the net pointer and avoid a potential UAF. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection.
CVE-2025-21759
ipv6: mcast: extend RCU protection in igmp6_send()
CVE-2025-21759
In the Linux kernel, the following vulnerability has been resolved: i ...
GHSA-pvj3-f5v8-hgxh
In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called without RTNL or RCU being held. Extend RCU protection so that we can safely fetch the net pointer and avoid a potential UAF. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection.
BDU:2025-04522
Уязвимость функции igmp6_send() модуля net/ipv6/mcast.c реализации протокола IPv6 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
RLSA-2025:10371
Important: kernel security update
ELSA-2025-10371
ELSA-2025-10371: kernel security update (IMPORTANT)
ELSA-2025-10379
ELSA-2025-10379: kernel security update (IMPORTANT)
RLSA-2025:13589
Moderate: kernel security update
ELSA-2025-13589
ELSA-2025-13589: kernel security update (MODERATE)
SUSE-SU-2025:1177-1
Security update for the Linux Kernel
SUSE-SU-2025:1180-1
Security update for the Linux Kernel
SUSE-SU-2025:1178-1
Security update for the Linux Kernel
SUSE-SU-2025:1293-1
Security update for the Linux Kernel
SUSE-SU-2025:01951-1
Security update for the Linux Kernel
SUSE-SU-2025:01967-1
Security update for the Linux Kernel
SUSE-SU-2025:01919-1
Security update for the Linux Kernel
ELSA-2025-20530
ELSA-2025-20530: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-21759 In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called without RTNL or RCU being held. Extend RCU protection so that we can safely fetch the net pointer and avoid a potential UAF. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection. | CVSS3: 7.8 | 0% Низкий | 8 месяцев назад | |
CVE-2025-21759 In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called without RTNL or RCU being held. Extend RCU protection so that we can safely fetch the net pointer and avoid a potential UAF. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection. | CVSS3: 6.6 | 0% Низкий | 8 месяцев назад | |
CVE-2025-21759 In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called without RTNL or RCU being held. Extend RCU protection so that we can safely fetch the net pointer and avoid a potential UAF. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection. | CVSS3: 7.8 | 0% Низкий | 8 месяцев назад | |
CVE-2025-21759 ipv6: mcast: extend RCU protection in igmp6_send() | CVSS3: 7.8 | 0% Низкий | 7 месяцев назад | |
CVE-2025-21759 In the Linux kernel, the following vulnerability has been resolved: i ... | CVSS3: 7.8 | 0% Низкий | 8 месяцев назад | |
GHSA-pvj3-f5v8-hgxh In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called without RTNL or RCU being held. Extend RCU protection so that we can safely fetch the net pointer and avoid a potential UAF. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection. | CVSS3: 7.8 | 0% Низкий | 8 месяцев назад | |
BDU:2025-04522 Уязвимость функции igmp6_send() модуля net/ipv6/mcast.c реализации протокола IPv6 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7.8 | 0% Низкий | 9 месяцев назад | |
RLSA-2025:10371 Important: kernel security update | около 1 месяца назад | |||
ELSA-2025-10371 ELSA-2025-10371: kernel security update (IMPORTANT) | 4 месяца назад | |||
ELSA-2025-10379 ELSA-2025-10379: kernel security update (IMPORTANT) | 4 месяца назад | |||
RLSA-2025:13589 Moderate: kernel security update | около 2 месяцев назад | |||
ELSA-2025-13589 ELSA-2025-13589: kernel security update (MODERATE) | 3 месяца назад | |||
SUSE-SU-2025:1177-1 Security update for the Linux Kernel | 7 месяцев назад | |||
SUSE-SU-2025:1180-1 Security update for the Linux Kernel | 7 месяцев назад | |||
SUSE-SU-2025:1178-1 Security update for the Linux Kernel | 7 месяцев назад | |||
SUSE-SU-2025:1293-1 Security update for the Linux Kernel | 7 месяцев назад | |||
SUSE-SU-2025:01951-1 Security update for the Linux Kernel | 5 месяцев назад | |||
SUSE-SU-2025:01967-1 Security update for the Linux Kernel | 5 месяцев назад | |||
SUSE-SU-2025:01919-1 Security update for the Linux Kernel | 5 месяцев назад | |||
ELSA-2025-20530 ELSA-2025-20530: Unbreakable Enterprise kernel security update (IMPORTANT) | 3 месяца назад |
Уязвимостей на страницу