Количество 70
Количество 70
ELSA-2025-28025
ELSA-2025-28025: Unbreakable Enterprise kernel security update (IMPORTANT)
CVE-2025-40019
In the Linux kernel, the following vulnerability has been resolved: crypto: essiv - Check ssize for decryption and in-place encryption Move the ssize check to the start in essiv_aead_crypt so that it's also checked for decryption and in-place encryption.
CVE-2025-40019
In the Linux kernel, the following vulnerability has been resolved: crypto: essiv - Check ssize for decryption and in-place encryption Move the ssize check to the start in essiv_aead_crypt so that it's also checked for decryption and in-place encryption.
CVE-2025-40019
crypto: essiv - Check ssize for decryption and in-place encryption
CVE-2025-40019
In the Linux kernel, the following vulnerability has been resolved: c ...
CVE-2025-38678
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject duplicate device on updates A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device. Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case. WARNING is hit when unregistering the hook: [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150 [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S 6.16.0+ #170 PREEMPT(full) [...] [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150
CVE-2025-38678
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject duplicate device on updates A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device. Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case. WARNING is hit when unregistering the hook: [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150 [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S 6.16.0+ #170 PREEMPT(full) [...] [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150
CVE-2025-38678
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject duplicate device on updates A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device. Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case. WARNING is hit when unregistering the hook: [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150 [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S 6.16.0+ #170 PREEMPT(full) [...] [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150
CVE-2025-38678
netfilter: nf_tables: reject duplicate device on updates
CVE-2025-38678
In the Linux kernel, the following vulnerability has been resolved: n ...
GHSA-jrm5-c55w-xm5w
In the Linux kernel, the following vulnerability has been resolved: crypto: essiv - Check ssize for decryption and in-place encryption Move the ssize check to the start in essiv_aead_crypt so that it's also checked for decryption and in-place encryption.
ELSA-2025-28026
ELSA-2025-28026: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-28024
ELSA-2025-28024: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2025:3769-1
Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP7)
SUSE-SU-2025:3741-1
Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP5)
SUSE-SU-2025:03648-1
Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP7)
GHSA-g7rm-8pw5-wvg2
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject duplicate device on updates A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device. Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case. WARNING is hit when unregistering the hook: [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150 [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S 6.16.0+ #170 PREEMPT(full) [...] [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150
BDU:2025-15551
Уязвимость функции nf_tables_updchain компонента net/netfilter/nf_tables_api.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2025-28040
ELSA-2025-28040: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2025:3770-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2025-28025 ELSA-2025-28025: Unbreakable Enterprise kernel security update (IMPORTANT) | 2 месяца назад | |||
CVE-2025-40019 In the Linux kernel, the following vulnerability has been resolved: crypto: essiv - Check ssize for decryption and in-place encryption Move the ssize check to the start in essiv_aead_crypt so that it's also checked for decryption and in-place encryption. | 0% Низкий | 3 месяца назад | ||
CVE-2025-40019 In the Linux kernel, the following vulnerability has been resolved: crypto: essiv - Check ssize for decryption and in-place encryption Move the ssize check to the start in essiv_aead_crypt so that it's also checked for decryption and in-place encryption. | 0% Низкий | 3 месяца назад | ||
CVE-2025-40019 crypto: essiv - Check ssize for decryption and in-place encryption | CVSS3: 5.5 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-40019 In the Linux kernel, the following vulnerability has been resolved: c ... | 0% Низкий | 3 месяца назад | ||
CVE-2025-38678 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject duplicate device on updates A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device. Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case. WARNING is hit when unregistering the hook: [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150 [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S 6.16.0+ #170 PREEMPT(full) [...] [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150 | CVSS3: 5.5 | 0% Низкий | 5 месяцев назад | |
CVE-2025-38678 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject duplicate device on updates A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device. Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case. WARNING is hit when unregistering the hook: [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150 [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S 6.16.0+ #170 PREEMPT(full) [...] [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150 | CVSS3: 4.4 | 0% Низкий | 5 месяцев назад | |
CVE-2025-38678 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject duplicate device on updates A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device. Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case. WARNING is hit when unregistering the hook: [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150 [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S 6.16.0+ #170 PREEMPT(full) [...] [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150 | CVSS3: 5.5 | 0% Низкий | 5 месяцев назад | |
CVE-2025-38678 netfilter: nf_tables: reject duplicate device on updates | CVSS3: 6 | 0% Низкий | 5 месяцев назад | |
CVE-2025-38678 In the Linux kernel, the following vulnerability has been resolved: n ... | CVSS3: 5.5 | 0% Низкий | 5 месяцев назад | |
GHSA-jrm5-c55w-xm5w In the Linux kernel, the following vulnerability has been resolved: crypto: essiv - Check ssize for decryption and in-place encryption Move the ssize check to the start in essiv_aead_crypt so that it's also checked for decryption and in-place encryption. | 0% Низкий | 3 месяца назад | ||
ELSA-2025-28026 ELSA-2025-28026: Unbreakable Enterprise kernel security update (IMPORTANT) | 2 месяца назад | |||
ELSA-2025-28024 ELSA-2025-28024: Unbreakable Enterprise kernel security update (IMPORTANT) | 2 месяца назад | |||
SUSE-SU-2025:3769-1 Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP7) | 0% Низкий | 3 месяца назад | ||
SUSE-SU-2025:3741-1 Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP5) | 0% Низкий | 3 месяца назад | ||
SUSE-SU-2025:03648-1 Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP7) | 0% Низкий | 4 месяца назад | ||
GHSA-g7rm-8pw5-wvg2 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject duplicate device on updates A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device. Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case. WARNING is hit when unregistering the hook: [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150 [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S 6.16.0+ #170 PREEMPT(full) [...] [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150 | CVSS3: 5.5 | 0% Низкий | 5 месяцев назад | |
BDU:2025-15551 Уязвимость функции nf_tables_updchain компонента net/netfilter/nf_tables_api.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 4.4 | 0% Низкий | 11 месяцев назад | |
ELSA-2025-28040 ELSA-2025-28040: Unbreakable Enterprise kernel security update (IMPORTANT) | около 2 месяцев назад | |||
SUSE-SU-2025:3770-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7) | 3 месяца назад |
Уязвимостей на страницу