Количество 11
Количество 11

CVE-2025-37860
In the Linux kernel, the following vulnerability has been resolved: sfc: fix NULL dereferences in ef100_process_design_param() Since cited commit, ef100_probe_main() and hence also ef100_check_design_params() run before efx->net_dev is created; consequently, we cannot netif_set_tso_max_size() or _segs() at this point. Move those netif calls to ef100_probe_netdev(), and also replace netif_err within the design params code with pci_err.

CVE-2025-37860
In the Linux kernel, the following vulnerability has been resolved: sfc: fix NULL dereferences in ef100_process_design_param() Since cited commit, ef100_probe_main() and hence also ef100_check_design_params() run before efx->net_dev is created; consequently, we cannot netif_set_tso_max_size() or _segs() at this point. Move those netif calls to ef100_probe_netdev(), and also replace netif_err within the design params code with pci_err.

CVE-2025-37860
In the Linux kernel, the following vulnerability has been resolved: sfc: fix NULL dereferences in ef100_process_design_param() Since cited commit, ef100_probe_main() and hence also ef100_check_design_params() run before efx->net_dev is created; consequently, we cannot netif_set_tso_max_size() or _segs() at this point. Move those netif calls to ef100_probe_netdev(), and also replace netif_err within the design params code with pci_err.
CVE-2025-37860
In the Linux kernel, the following vulnerability has been resolved: s ...
GHSA-j5qc-xcfm-cq6p
In the Linux kernel, the following vulnerability has been resolved: sfc: fix NULL dereferences in ef100_process_design_param() Since cited commit, ef100_probe_main() and hence also ef100_check_design_params() run before efx->net_dev is created; consequently, we cannot netif_set_tso_max_size() or _segs() at this point. Move those netif calls to ef100_probe_netdev(), and also replace netif_err within the design params code with pci_err.

SUSE-SU-2025:01707-1
Security update for the Linux Kernel

SUSE-SU-2025:01614-1
Security update for the Linux Kernel

SUSE-SU-2025:01951-1
Security update for the Linux Kernel

SUSE-SU-2025:01967-1
Security update for the Linux Kernel

SUSE-SU-2025:01964-1
Security update for the Linux Kernel

SUSE-SU-2025:01919-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2025-37860 In the Linux kernel, the following vulnerability has been resolved: sfc: fix NULL dereferences in ef100_process_design_param() Since cited commit, ef100_probe_main() and hence also ef100_check_design_params() run before efx->net_dev is created; consequently, we cannot netif_set_tso_max_size() or _segs() at this point. Move those netif calls to ef100_probe_netdev(), and also replace netif_err within the design params code with pci_err. | CVSS3: 5.5 | 0% Низкий | 5 месяцев назад |
![]() | CVE-2025-37860 In the Linux kernel, the following vulnerability has been resolved: sfc: fix NULL dereferences in ef100_process_design_param() Since cited commit, ef100_probe_main() and hence also ef100_check_design_params() run before efx->net_dev is created; consequently, we cannot netif_set_tso_max_size() or _segs() at this point. Move those netif calls to ef100_probe_netdev(), and also replace netif_err within the design params code with pci_err. | CVSS3: 5.5 | 0% Низкий | 5 месяцев назад |
![]() | CVE-2025-37860 In the Linux kernel, the following vulnerability has been resolved: sfc: fix NULL dereferences in ef100_process_design_param() Since cited commit, ef100_probe_main() and hence also ef100_check_design_params() run before efx->net_dev is created; consequently, we cannot netif_set_tso_max_size() or _segs() at this point. Move those netif calls to ef100_probe_netdev(), and also replace netif_err within the design params code with pci_err. | CVSS3: 5.5 | 0% Низкий | 5 месяцев назад |
CVE-2025-37860 In the Linux kernel, the following vulnerability has been resolved: s ... | CVSS3: 5.5 | 0% Низкий | 5 месяцев назад | |
GHSA-j5qc-xcfm-cq6p In the Linux kernel, the following vulnerability has been resolved: sfc: fix NULL dereferences in ef100_process_design_param() Since cited commit, ef100_probe_main() and hence also ef100_check_design_params() run before efx->net_dev is created; consequently, we cannot netif_set_tso_max_size() or _segs() at this point. Move those netif calls to ef100_probe_netdev(), and also replace netif_err within the design params code with pci_err. | CVSS3: 5.5 | 0% Низкий | 5 месяцев назад | |
![]() | SUSE-SU-2025:01707-1 Security update for the Linux Kernel | 4 месяца назад | ||
![]() | SUSE-SU-2025:01614-1 Security update for the Linux Kernel | 4 месяца назад | ||
![]() | SUSE-SU-2025:01951-1 Security update for the Linux Kernel | 3 месяца назад | ||
![]() | SUSE-SU-2025:01967-1 Security update for the Linux Kernel | 3 месяца назад | ||
![]() | SUSE-SU-2025:01964-1 Security update for the Linux Kernel | 3 месяца назад | ||
![]() | SUSE-SU-2025:01919-1 Security update for the Linux Kernel | 3 месяца назад |
Уязвимостей на страницу