Количество 48
Количество 48
CVE-2025-38352
In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.
CVE-2025-38352
In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.
CVE-2025-38352
In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.
CVE-2025-38352
posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
CVE-2025-38352
In the Linux kernel, the following vulnerability has been resolved: p ...
RLSA-2025:15662
Important: kernel security update
GHSA-mr4j-mh66-4679
In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.
ELSA-2025-15662
ELSA-2025-15662: kernel security update (IMPORTANT)
BDU:2025-10870
Уязвимость функции handle_posix_cpu_timers ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
RLSA-2025:15471
Important: kernel security update
ELSA-2025-15648
ELSA-2025-15648: kernel security update (IMPORTANT)
ELSA-2025-15471
ELSA-2025-15471: kernel security update (IMPORTANT)
SUSE-SU-2026:0521-1
Security update for the Linux Kernel (Live Patch 69 for SUSE Linux Enterprise 12 SP5)
SUSE-SU-2026:0518-1
Security update for the Linux Kernel (Live Patch 64 for SUSE Linux Enterprise 12 SP5)
SUSE-SU-2026:0515-1
Security update for the Linux Kernel (Live Patch 65 for SUSE Linux Enterprise 12 SP5)
SUSE-SU-2026:0565-1
Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:0556-1
Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 15 SP7)
SUSE-SU-2026:0546-1
Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:0539-1
Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0535-1
Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-38352 In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case. | CVSS3: 7.4 | 0% Низкий | 8 месяцев назад | |
CVE-2025-38352 In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case. | CVSS3: 7.8 | 0% Низкий | 8 месяцев назад | |
CVE-2025-38352 In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case. | CVSS3: 7.4 | 0% Низкий | 8 месяцев назад | |
CVE-2025-38352 posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() | CVSS3: 7.4 | 0% Низкий | 8 месяцев назад | |
CVE-2025-38352 In the Linux kernel, the following vulnerability has been resolved: p ... | CVSS3: 7.4 | 0% Низкий | 8 месяцев назад | |
RLSA-2025:15662 Important: kernel security update | 0% Низкий | 6 месяцев назад | ||
GHSA-mr4j-mh66-4679 In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case. | CVSS3: 7.4 | 0% Низкий | 8 месяцев назад | |
ELSA-2025-15662 ELSA-2025-15662: kernel security update (IMPORTANT) | 7 месяцев назад | |||
BDU:2025-10870 Уязвимость функции handle_posix_cpu_timers ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 4.6 | 0% Низкий | 8 месяцев назад | |
RLSA-2025:15471 Important: kernel security update | 6 месяцев назад | |||
ELSA-2025-15648 ELSA-2025-15648: kernel security update (IMPORTANT) | 6 месяцев назад | |||
ELSA-2025-15471 ELSA-2025-15471: kernel security update (IMPORTANT) | 7 месяцев назад | |||
SUSE-SU-2026:0521-1 Security update for the Linux Kernel (Live Patch 69 for SUSE Linux Enterprise 12 SP5) | около 1 месяца назад | |||
SUSE-SU-2026:0518-1 Security update for the Linux Kernel (Live Patch 64 for SUSE Linux Enterprise 12 SP5) | около 1 месяца назад | |||
SUSE-SU-2026:0515-1 Security update for the Linux Kernel (Live Patch 65 for SUSE Linux Enterprise 12 SP5) | около 1 месяца назад | |||
SUSE-SU-2026:0565-1 Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4) | около 1 месяца назад | |||
SUSE-SU-2026:0556-1 Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 15 SP7) | около 1 месяца назад | |||
SUSE-SU-2026:0546-1 Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6) | около 1 месяца назад | |||
SUSE-SU-2026:0539-1 Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | около 1 месяца назад | |||
SUSE-SU-2026:0535-1 Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) | около 1 месяца назад |
Уязвимостей на страницу