Количество 40
Количество 40
ELSA-2025-13602
ELSA-2025-13602: kernel security update (MODERATE)
ELSA-2025-13598
ELSA-2025-13598: kernel security update (MODERATE)

CVE-2025-38292
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix invalid access to memory In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean is_continuation is part of rxcb. Currently, after freeing the skb, the rxcb->is_continuation accessed again which is wrong since the memory is already freed. This might lead use-after-free error. Hence, fix by locally defining bool is_continuation from rxcb, so that after freeing skb, is_continuation can be used. Compile tested only.

CVE-2025-38292
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix invalid access to memory In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean is_continuation is part of rxcb. Currently, after freeing the skb, the rxcb->is_continuation accessed again which is wrong since the memory is already freed. This might lead use-after-free error. Hence, fix by locally defining bool is_continuation from rxcb, so that after freeing skb, is_continuation can be used. Compile tested only.

CVE-2025-38292
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix invalid access to memory In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean is_continuation is part of rxcb. Currently, after freeing the skb, the rxcb->is_continuation accessed again which is wrong since the memory is already freed. This might lead use-after-free error. Hence, fix by locally defining bool is_continuation from rxcb, so that after freeing skb, is_continuation can be used. Compile tested only.
CVE-2025-38292
In the Linux kernel, the following vulnerability has been resolved: w ...

CVE-2025-38079
In the Linux kernel, the following vulnerability has been resolved: crypto: algif_hash - fix double free in hash_accept If accept(2) is called on socket type algif_hash with MSG_MORE flag set and crypto_ahash_import fails, sk2 is freed. However, it is also freed in af_alg_release, leading to slab-use-after-free error.

CVE-2025-38079
In the Linux kernel, the following vulnerability has been resolved: crypto: algif_hash - fix double free in hash_accept If accept(2) is called on socket type algif_hash with MSG_MORE flag set and crypto_ahash_import fails, sk2 is freed. However, it is also freed in af_alg_release, leading to slab-use-after-free error.

CVE-2025-38079
In the Linux kernel, the following vulnerability has been resolved: crypto: algif_hash - fix double free in hash_accept If accept(2) is called on socket type algif_hash with MSG_MORE flag set and crypto_ahash_import fails, sk2 is freed. However, it is also freed in af_alg_release, leading to slab-use-after-free error.

CVE-2025-38079
CVE-2025-38079
In the Linux kernel, the following vulnerability has been resolved: c ...
GHSA-mhmh-rgmh-rf63
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix invalid access to memory In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean is_continuation is part of rxcb. Currently, after freeing the skb, the rxcb->is_continuation accessed again which is wrong since the memory is already freed. This might lead use-after-free error. Hence, fix by locally defining bool is_continuation from rxcb, so that after freeing skb, is_continuation can be used. Compile tested only.

BDU:2025-08632
Уязвимость функции ath12k_dp_rx_msdu_coalesce() модуля drivers/net/wireless/ath/ath12k/dp_rx.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
GHSA-r6vx-mj26-9m2q
In the Linux kernel, the following vulnerability has been resolved: crypto: algif_hash - fix double free in hash_accept If accept(2) is called on socket type algif_hash with MSG_MORE flag set and crypto_ahash_import fails, sk2 is freed. However, it is also freed in af_alg_release, leading to slab-use-after-free error.

SUSE-SU-2025:02854-1
Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5)

SUSE-SU-2025:02830-1
Security update for the Linux Kernel (Live Patch 65 for SLE 12 SP5)

SUSE-SU-2025:02827-1
Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5)

SUSE-SU-2025:02820-1
Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP6)

SUSE-SU-2025:02857-1
Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3)

SUSE-SU-2025:02834-1
Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP4)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2025-13602 ELSA-2025-13602: kernel security update (MODERATE) | 8 дней назад | |||
ELSA-2025-13598 ELSA-2025-13598: kernel security update (MODERATE) | 6 дней назад | |||
![]() | CVE-2025-38292 In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix invalid access to memory In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean is_continuation is part of rxcb. Currently, after freeing the skb, the rxcb->is_continuation accessed again which is wrong since the memory is already freed. This might lead use-after-free error. Hence, fix by locally defining bool is_continuation from rxcb, so that after freeing skb, is_continuation can be used. Compile tested only. | 0% Низкий | около 1 месяца назад | |
![]() | CVE-2025-38292 In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix invalid access to memory In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean is_continuation is part of rxcb. Currently, after freeing the skb, the rxcb->is_continuation accessed again which is wrong since the memory is already freed. This might lead use-after-free error. Hence, fix by locally defining bool is_continuation from rxcb, so that after freeing skb, is_continuation can be used. Compile tested only. | CVSS3: 7.3 | 0% Низкий | около 1 месяца назад |
![]() | CVE-2025-38292 In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix invalid access to memory In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean is_continuation is part of rxcb. Currently, after freeing the skb, the rxcb->is_continuation accessed again which is wrong since the memory is already freed. This might lead use-after-free error. Hence, fix by locally defining bool is_continuation from rxcb, so that after freeing skb, is_continuation can be used. Compile tested only. | 0% Низкий | около 1 месяца назад | |
CVE-2025-38292 In the Linux kernel, the following vulnerability has been resolved: w ... | 0% Низкий | около 1 месяца назад | ||
![]() | CVE-2025-38079 In the Linux kernel, the following vulnerability has been resolved: crypto: algif_hash - fix double free in hash_accept If accept(2) is called on socket type algif_hash with MSG_MORE flag set and crypto_ahash_import fails, sk2 is freed. However, it is also freed in af_alg_release, leading to slab-use-after-free error. | 0% Низкий | 2 месяца назад | |
![]() | CVE-2025-38079 In the Linux kernel, the following vulnerability has been resolved: crypto: algif_hash - fix double free in hash_accept If accept(2) is called on socket type algif_hash with MSG_MORE flag set and crypto_ahash_import fails, sk2 is freed. However, it is also freed in af_alg_release, leading to slab-use-after-free error. | CVSS3: 7 | 0% Низкий | 2 месяца назад |
![]() | CVE-2025-38079 In the Linux kernel, the following vulnerability has been resolved: crypto: algif_hash - fix double free in hash_accept If accept(2) is called on socket type algif_hash with MSG_MORE flag set and crypto_ahash_import fails, sk2 is freed. However, it is also freed in af_alg_release, leading to slab-use-after-free error. | 0% Низкий | 2 месяца назад | |
![]() | 0% Низкий | 14 дней назад | ||
CVE-2025-38079 In the Linux kernel, the following vulnerability has been resolved: c ... | 0% Низкий | 2 месяца назад | ||
GHSA-mhmh-rgmh-rf63 In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix invalid access to memory In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean is_continuation is part of rxcb. Currently, after freeing the skb, the rxcb->is_continuation accessed again which is wrong since the memory is already freed. This might lead use-after-free error. Hence, fix by locally defining bool is_continuation from rxcb, so that after freeing skb, is_continuation can be used. Compile tested only. | 0% Низкий | около 1 месяца назад | ||
![]() | BDU:2025-08632 Уязвимость функции ath12k_dp_rx_msdu_coalesce() модуля drivers/net/wireless/ath/ath12k/dp_rx.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.3 | 0% Низкий | 5 месяцев назад |
GHSA-r6vx-mj26-9m2q In the Linux kernel, the following vulnerability has been resolved: crypto: algif_hash - fix double free in hash_accept If accept(2) is called on socket type algif_hash with MSG_MORE flag set and crypto_ahash_import fails, sk2 is freed. However, it is also freed in af_alg_release, leading to slab-use-after-free error. | 0% Низкий | 2 месяца назад | ||
![]() | SUSE-SU-2025:02854-1 Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5) | 2 дня назад | ||
![]() | SUSE-SU-2025:02830-1 Security update for the Linux Kernel (Live Patch 65 for SLE 12 SP5) | 4 дня назад | ||
![]() | SUSE-SU-2025:02827-1 Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5) | 5 дней назад | ||
![]() | SUSE-SU-2025:02820-1 Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP6) | 5 дней назад | ||
![]() | SUSE-SU-2025:02857-1 Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3) | 2 дня назад | ||
![]() | SUSE-SU-2025:02834-1 Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP4) | 4 дня назад |
Уязвимостей на страницу