Количество 24
Количество 24
GHSA-r37x-wmxh-7hvh
In the Linux kernel, the following vulnerability has been resolved: fs/proc: fix uaf in proc_readdir_de() Pde is erased from subdir rbtree through rb_erase(), but not set the node to EMPTY, which may result in uaf access. We should use RB_CLEAR_NODE() set the erased node to EMPTY, then pde_subdir_next() will return NULL to avoid uaf access. We found an uaf issue while using stress-ng testing, need to run testcase getdent and tun in the same time. The steps of the issue is as follows: 1) use getdent to traverse dir /proc/pid/net/dev_snmp6/, and current pde is tun3; 2) in the [time windows] unregister netdevice tun3 and tun2, and erase them from rbtree. erase tun3 first, and then erase tun2. the pde(tun2) will be released to slab; 3) continue to getdent process, then pde_subdir_next() will return pde(tun2) which is released, it will case uaf access. CPU 0 | CPU 1 ------------------------------------------------------------...
CVE-2025-40271
In the Linux kernel, the following vulnerability has been resolved: fs/proc: fix uaf in proc_readdir_de() Pde is erased from subdir rbtree through rb_erase(), but not set the node to EMPTY, which may result in uaf access. We should use RB_CLEAR_NODE() set the erased node to EMPTY, then pde_subdir_next() will return NULL to avoid uaf access. We found an uaf issue while using stress-ng testing, need to run testcase getdent and tun in the same time. The steps of the issue is as follows: 1) use getdent to traverse dir /proc/pid/net/dev_snmp6/, and current pde is tun3; 2) in the [time windows] unregister netdevice tun3 and tun2, and erase them from rbtree. erase tun3 first, and then erase tun2. the pde(tun2) will be released to slab; 3) continue to getdent process, then pde_subdir_next() will return pde(tun2) which is released, it will case uaf access. CPU 0 | CPU 1 ------------------------------------------------------------------------- trave...
CVE-2025-40271
In the Linux kernel, the following vulnerability has been resolved: fs/proc: fix uaf in proc_readdir_de() Pde is erased from subdir rbtree through rb_erase(), but not set the node to EMPTY, which may result in uaf access. We should use RB_CLEAR_NODE() set the erased node to EMPTY, then pde_subdir_next() will return NULL to avoid uaf access. We found an uaf issue while using stress-ng testing, need to run testcase getdent and tun in the same time. The steps of the issue is as follows: 1) use getdent to traverse dir /proc/pid/net/dev_snmp6/, and current pde is tun3; 2) in the [time windows] unregister netdevice tun3 and tun2, and erase them from rbtree. erase tun3 first, and then erase tun2. the pde(tun2) will be released to slab; 3) continue to getdent process, then pde_subdir_next() will return pde(tun2) which is released, it will case uaf access. CPU 0 | CPU 1 ------------------------------------------------------------------------- trave...
CVE-2025-40271
In the Linux kernel, the following vulnerability has been resolved: fs/proc: fix uaf in proc_readdir_de() Pde is erased from subdir rbtree through rb_erase(), but not set the node to EMPTY, which may result in uaf access. We should use RB_CLEAR_NODE() set the erased node to EMPTY, then pde_subdir_next() will return NULL to avoid uaf access. We found an uaf issue while using stress-ng testing, need to run testcase getdent and tun in the same time. The steps of the issue is as follows: 1) use getdent to traverse dir /proc/pid/net/dev_snmp6/, and current pde is tun3; 2) in the [time windows] unregister netdevice tun3 and tun2, and erase them from rbtree. erase tun3 first, and then erase tun2. the pde(tun2) will be released to slab; 3) continue to getdent process, then pde_subdir_next() will return pde(tun2) which is released, it will case uaf access. CPU 0 | CPU 1 ---------------------------------------------------------------
CVE-2025-40271
In the Linux kernel, the following vulnerability has been resolved: f ...
ELSA-2026-50005
ELSA-2026-50005: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-28068
ELSA-2025-28068: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-28066
ELSA-2025-28066: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-28067
ELSA-2025-28067: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2026-50007
ELSA-2026-50007: Unbreakable Enterprise kernel security update (IMPORTANT)
RLSA-2026:1662
Moderate: kernel security update
ELSA-2026-1662
ELSA-2026-1662: kernel security update (MODERATE)
RLSA-2026:2212
Moderate: kernel security update
ELSA-2026-2212
ELSA-2026-2212: kernel security update (MODERATE)
RLSA-2026:1690
Important: kernel security update
ELSA-2026-1690
ELSA-2026-1690: kernel security update (IMPORTANT)
ELSA-2026-50100
ELSA-2026-50100: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2026-50113
ELSA-2026-50113: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2026-50006
ELSA-2026-50006: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2026:0473-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-r37x-wmxh-7hvh In the Linux kernel, the following vulnerability has been resolved: fs/proc: fix uaf in proc_readdir_de() Pde is erased from subdir rbtree through rb_erase(), but not set the node to EMPTY, which may result in uaf access. We should use RB_CLEAR_NODE() set the erased node to EMPTY, then pde_subdir_next() will return NULL to avoid uaf access. We found an uaf issue while using stress-ng testing, need to run testcase getdent and tun in the same time. The steps of the issue is as follows: 1) use getdent to traverse dir /proc/pid/net/dev_snmp6/, and current pde is tun3; 2) in the [time windows] unregister netdevice tun3 and tun2, and erase them from rbtree. erase tun3 first, and then erase tun2. the pde(tun2) will be released to slab; 3) continue to getdent process, then pde_subdir_next() will return pde(tun2) which is released, it will case uaf access. CPU 0 | CPU 1 ------------------------------------------------------------... | 0% Низкий | 4 месяца назад | ||
CVE-2025-40271 In the Linux kernel, the following vulnerability has been resolved: fs/proc: fix uaf in proc_readdir_de() Pde is erased from subdir rbtree through rb_erase(), but not set the node to EMPTY, which may result in uaf access. We should use RB_CLEAR_NODE() set the erased node to EMPTY, then pde_subdir_next() will return NULL to avoid uaf access. We found an uaf issue while using stress-ng testing, need to run testcase getdent and tun in the same time. The steps of the issue is as follows: 1) use getdent to traverse dir /proc/pid/net/dev_snmp6/, and current pde is tun3; 2) in the [time windows] unregister netdevice tun3 and tun2, and erase them from rbtree. erase tun3 first, and then erase tun2. the pde(tun2) will be released to slab; 3) continue to getdent process, then pde_subdir_next() will return pde(tun2) which is released, it will case uaf access. CPU 0 | CPU 1 ------------------------------------------------------------------------- trave... | 0% Низкий | 4 месяца назад | ||
CVE-2025-40271 In the Linux kernel, the following vulnerability has been resolved: fs/proc: fix uaf in proc_readdir_de() Pde is erased from subdir rbtree through rb_erase(), but not set the node to EMPTY, which may result in uaf access. We should use RB_CLEAR_NODE() set the erased node to EMPTY, then pde_subdir_next() will return NULL to avoid uaf access. We found an uaf issue while using stress-ng testing, need to run testcase getdent and tun in the same time. The steps of the issue is as follows: 1) use getdent to traverse dir /proc/pid/net/dev_snmp6/, and current pde is tun3; 2) in the [time windows] unregister netdevice tun3 and tun2, and erase them from rbtree. erase tun3 first, and then erase tun2. the pde(tun2) will be released to slab; 3) continue to getdent process, then pde_subdir_next() will return pde(tun2) which is released, it will case uaf access. CPU 0 | CPU 1 ------------------------------------------------------------------------- trave... | CVSS3: 7 | 0% Низкий | 4 месяца назад | |
CVE-2025-40271 In the Linux kernel, the following vulnerability has been resolved: fs/proc: fix uaf in proc_readdir_de() Pde is erased from subdir rbtree through rb_erase(), but not set the node to EMPTY, which may result in uaf access. We should use RB_CLEAR_NODE() set the erased node to EMPTY, then pde_subdir_next() will return NULL to avoid uaf access. We found an uaf issue while using stress-ng testing, need to run testcase getdent and tun in the same time. The steps of the issue is as follows: 1) use getdent to traverse dir /proc/pid/net/dev_snmp6/, and current pde is tun3; 2) in the [time windows] unregister netdevice tun3 and tun2, and erase them from rbtree. erase tun3 first, and then erase tun2. the pde(tun2) will be released to slab; 3) continue to getdent process, then pde_subdir_next() will return pde(tun2) which is released, it will case uaf access. CPU 0 | CPU 1 --------------------------------------------------------------- | 0% Низкий | 4 месяца назад | ||
CVE-2025-40271 In the Linux kernel, the following vulnerability has been resolved: f ... | 0% Низкий | 4 месяца назад | ||
ELSA-2026-50005 ELSA-2026-50005: Unbreakable Enterprise kernel security update (IMPORTANT) | 2 месяца назад | |||
ELSA-2025-28068 ELSA-2025-28068: Unbreakable Enterprise kernel security update (IMPORTANT) | 3 месяца назад | |||
ELSA-2025-28066 ELSA-2025-28066: Unbreakable Enterprise kernel security update (IMPORTANT) | 3 месяца назад | |||
ELSA-2025-28067 ELSA-2025-28067: Unbreakable Enterprise kernel security update (IMPORTANT) | 3 месяца назад | |||
ELSA-2026-50007 ELSA-2026-50007: Unbreakable Enterprise kernel security update (IMPORTANT) | 2 месяца назад | |||
RLSA-2026:1662 Moderate: kernel security update | около 1 месяца назад | |||
ELSA-2026-1662 ELSA-2026-1662: kernel security update (MODERATE) | около 2 месяцев назад | |||
RLSA-2026:2212 Moderate: kernel security update | около 1 месяца назад | |||
ELSA-2026-2212 ELSA-2026-2212: kernel security update (MODERATE) | около 2 месяцев назад | |||
RLSA-2026:1690 Important: kernel security update | около 2 месяцев назад | |||
ELSA-2026-1690 ELSA-2026-1690: kernel security update (IMPORTANT) | около 2 месяцев назад | |||
ELSA-2026-50100 ELSA-2026-50100: Unbreakable Enterprise kernel security update (IMPORTANT) | около 2 месяцев назад | |||
ELSA-2026-50113 ELSA-2026-50113: Unbreakable Enterprise kernel security update (IMPORTANT) | около 1 месяца назад | |||
ELSA-2026-50006 ELSA-2026-50006: Unbreakable Enterprise kernel security update (IMPORTANT) | 2 месяца назад | |||
SUSE-SU-2026:0473-1 Security update for the Linux Kernel | около 1 месяца назад |
Уязвимостей на страницу