Количество 57
Количество 57

CVE-2025-37797
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied.

CVE-2025-37797
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied.

CVE-2025-37797
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied.

CVE-2025-37797
CVE-2025-37797
In the Linux kernel, the following vulnerability has been resolved: n ...

SUSE-SU-2025:02707-1
Security update for the Linux Kernel (Live Patch 59 for SLE 15 SP3)

SUSE-SU-2025:02671-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP5)
GHSA-hvr4-ppmm-c7fp
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied.

SUSE-SU-2025:02710-1
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6)

SUSE-SU-2025:02704-1
Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3)

SUSE-SU-2025:02693-1
Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP6)

SUSE-SU-2025:02689-1
Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6)

SUSE-SU-2025:02687-1
Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3)

SUSE-SU-2025:02676-1
Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP5)

SUSE-SU-2025:02637-1
Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP6)

SUSE-SU-2025:02619-1
Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3)

SUSE-SU-2025:02608-1
Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3)

SUSE-SU-2025:02606-1
Security update for the Linux Kernel (Live Patch 66 for SLE 12 SP5)

SUSE-SU-2025:02602-1
Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6)

SUSE-SU-2025:02708-1
Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP4)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2025-37797 In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied. | 0% Низкий | 4 месяца назад | |
![]() | CVE-2025-37797 In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied. | CVSS3: 7 | 0% Низкий | 4 месяца назад |
![]() | CVE-2025-37797 In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied. | 0% Низкий | 4 месяца назад | |
![]() | 0% Низкий | около 2 месяцев назад | ||
CVE-2025-37797 In the Linux kernel, the following vulnerability has been resolved: n ... | 0% Низкий | 4 месяца назад | ||
![]() | SUSE-SU-2025:02707-1 Security update for the Linux Kernel (Live Patch 59 for SLE 15 SP3) | 0% Низкий | около 1 месяца назад | |
![]() | SUSE-SU-2025:02671-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP5) | 0% Низкий | около 1 месяца назад | |
GHSA-hvr4-ppmm-c7fp In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied. | 0% Низкий | 4 месяца назад | ||
![]() | SUSE-SU-2025:02710-1 Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02704-1 Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02693-1 Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP6) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02689-1 Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02687-1 Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02676-1 Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP5) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02637-1 Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP6) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02619-1 Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02608-1 Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02606-1 Security update for the Linux Kernel (Live Patch 66 for SLE 12 SP5) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02602-1 Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02708-1 Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP4) | около 1 месяца назад |
Уязвимостей на страницу