Количество 13
Количество 13
GHSA-gxr7-4mfg-37c7
In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.
CVE-2023-53373
In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.
CVE-2023-53373
In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.
CVE-2023-53373
In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.
CVE-2023-53373
In the Linux kernel, the following vulnerability has been resolved: c ...
ELSA-2025-18297
ELSA-2025-18297: kernel security update (MODERATE)
RLSA-2025:17760
Moderate: kernel security update
ELSA-2025-17760
ELSA-2025-17760: kernel security update (MODERATE)
ELSA-2025-21063
ELSA-2025-21063: kernel security update (MODERATE)
ELSA-2025-21112
ELSA-2025-21112: kernel security update (MODERATE)
SUSE-SU-2025:4189-1
Security update for the Linux Kernel
SUSE-SU-2025:03628-1
Security update for the Linux Kernel
SUSE-SU-2025:03615-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-gxr7-4mfg-37c7 In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free. | CVSS3: 7.8 | 0% Низкий | 3 месяца назад | |
CVE-2023-53373 In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free. | CVSS3: 7.8 | 0% Низкий | 3 месяца назад | |
CVE-2023-53373 In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free. | CVSS3: 7 | 0% Низкий | 3 месяца назад | |
CVE-2023-53373 In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free. | CVSS3: 7.8 | 0% Низкий | 3 месяца назад | |
CVE-2023-53373 In the Linux kernel, the following vulnerability has been resolved: c ... | CVSS3: 7.8 | 0% Низкий | 3 месяца назад | |
ELSA-2025-18297 ELSA-2025-18297: kernel security update (MODERATE) | 2 месяца назад | |||
RLSA-2025:17760 Moderate: kernel security update | 2 месяца назад | |||
ELSA-2025-17760 ELSA-2025-17760: kernel security update (MODERATE) | 2 месяца назад | |||
ELSA-2025-21063 ELSA-2025-21063: kernel security update (MODERATE) | 5 дней назад | |||
ELSA-2025-21112 ELSA-2025-21112: kernel security update (MODERATE) | 25 дней назад | |||
SUSE-SU-2025:4189-1 Security update for the Linux Kernel | 26 дней назад | |||
SUSE-SU-2025:03628-1 Security update for the Linux Kernel | 2 месяца назад | |||
SUSE-SU-2025:03615-1 Security update for the Linux Kernel | 2 месяца назад |
Уязвимостей на страницу