Логотип exploitDog
bind:CVE-2025-37752
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-37752

Количество 57

Количество 57

ubuntu логотип

CVE-2025-37752

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dump_stack....

EPSS: Низкий
redhat логотип

CVE-2025-37752

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dump_stack....

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2025-37752

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dump_s

EPSS: Низкий
debian логотип

CVE-2025-37752

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: n ...

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02699-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02626-1

около 1 месяца назад

Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP6)

EPSS: Низкий
github логотип

GHSA-39cv-hx7c-vjcq

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dum...

EPSS: Низкий
fstec логотип

BDU:2025-05411

5 месяцев назад

Уязвимость компонента net_sched модуля net/sched/sch_sfq.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код

CVSS3: 4.6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02710-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02704-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02693-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02689-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02687-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02676-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02637-1

около 1 месяца назад

Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02619-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02608-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02606-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 66 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02602-1

около 1 месяца назад

Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02943-1

17 дней назад

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-37752

In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dump_stack....

0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-37752

In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dump_stack....

CVSS3: 5.5
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-37752

In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dump_s

0%
Низкий
4 месяца назад
debian логотип
CVE-2025-37752

In the Linux kernel, the following vulnerability has been resolved: n ...

0%
Низкий
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02699-1

Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6)

0%
Низкий
около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02626-1

Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP6)

0%
Низкий
около 1 месяца назад
github логотип
GHSA-39cv-hx7c-vjcq

In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dum...

0%
Низкий
4 месяца назад
fstec логотип
BDU:2025-05411

Уязвимость компонента net_sched модуля net/sched/sch_sfq.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код

CVSS3: 4.6
0%
Низкий
5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02710-1

Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02704-1

Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02693-1

Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP6)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02689-1

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02687-1

Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02676-1

Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02637-1

Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP6)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02619-1

Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02608-1

Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02606-1

Security update for the Linux Kernel (Live Patch 66 for SLE 12 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02602-1

Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02943-1

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7)

17 дней назад

Уязвимостей на страницу