Количество 57
Количество 57

CVE-2025-37752
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dump_stack....

CVE-2025-37752
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dump_stack....

CVE-2025-37752
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dump_s
CVE-2025-37752
In the Linux kernel, the following vulnerability has been resolved: n ...

SUSE-SU-2025:02699-1
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6)

SUSE-SU-2025:02626-1
Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP6)
GHSA-39cv-hx7c-vjcq
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dum...

BDU:2025-05411
Уязвимость компонента net_sched модуля net/sched/sch_sfq.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код

SUSE-SU-2025:02710-1
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6)

SUSE-SU-2025:02704-1
Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3)

SUSE-SU-2025:02693-1
Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP6)

SUSE-SU-2025:02689-1
Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6)

SUSE-SU-2025:02687-1
Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3)

SUSE-SU-2025:02676-1
Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP5)

SUSE-SU-2025:02637-1
Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP6)

SUSE-SU-2025:02619-1
Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3)

SUSE-SU-2025:02608-1
Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3)

SUSE-SU-2025:02606-1
Security update for the Linux Kernel (Live Patch 66 for SLE 12 SP5)

SUSE-SU-2025:02602-1
Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6)

SUSE-SU-2025:02943-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2025-37752 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.... | 0% Низкий | 4 месяца назад | |
![]() | CVE-2025-37752 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.... | CVSS3: 5.5 | 0% Низкий | 4 месяца назад |
![]() | CVE-2025-37752 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dump_s | 0% Низкий | 4 месяца назад | |
CVE-2025-37752 In the Linux kernel, the following vulnerability has been resolved: n ... | 0% Низкий | 4 месяца назад | ||
![]() | SUSE-SU-2025:02699-1 Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6) | 0% Низкий | около 1 месяца назад | |
![]() | SUSE-SU-2025:02626-1 Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP6) | 0% Низкий | около 1 месяца назад | |
GHSA-39cv-hx7c-vjcq In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dum... | 0% Низкий | 4 месяца назад | ||
![]() | BDU:2025-05411 Уязвимость компонента net_sched модуля net/sched/sch_sfq.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код | CVSS3: 4.6 | 0% Низкий | 5 месяцев назад |
![]() | SUSE-SU-2025:02710-1 Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02704-1 Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02693-1 Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP6) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02689-1 Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02687-1 Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02676-1 Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP5) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02637-1 Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP6) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02619-1 Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02608-1 Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02606-1 Security update for the Linux Kernel (Live Patch 66 for SLE 12 SP5) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02602-1 Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02943-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7) | 17 дней назад |
Уязвимостей на страницу