Количество 7
Количество 7
CVE-2025-40264
In the Linux kernel, the following vulnerability has been resolved: be2net: pass wrb_params in case of OS2BMC be_insert_vlan_in_pkt() is called with the wrb_params argument being NULL at be_send_pkt_to_bmc() call site. This may lead to dereferencing a NULL pointer when processing a workaround for specific packet, as commit bc0c3405abbb ("be2net: fix a Tx stall bug caused by a specific ipv6 packet") states. The correct way would be to pass the wrb_params from be_xmit().
CVE-2025-40264
In the Linux kernel, the following vulnerability has been resolved: be2net: pass wrb_params in case of OS2BMC be_insert_vlan_in_pkt() is called with the wrb_params argument being NULL at be_send_pkt_to_bmc() call site. This may lead to dereferencing a NULL pointer when processing a workaround for specific packet, as commit bc0c3405abbb ("be2net: fix a Tx stall bug caused by a specific ipv6 packet") states. The correct way would be to pass the wrb_params from be_xmit().
CVE-2025-40264
be2net: pass wrb_params in case of OS2BMC
CVE-2025-40264
In the Linux kernel, the following vulnerability has been resolved: b ...
GHSA-gvxj-xj5w-j8qf
In the Linux kernel, the following vulnerability has been resolved: be2net: pass wrb_params in case of OS2BMC be_insert_vlan_in_pkt() is called with the wrb_params argument being NULL at be_send_pkt_to_bmc() call site. This may lead to dereferencing a NULL pointer when processing a workaround for specific packet, as commit bc0c3405abbb ("be2net: fix a Tx stall bug caused by a specific ipv6 packet") states. The correct way would be to pass the wrb_params from be_xmit().
BDU:2025-15939
Уязвимость функции be_send_pkt_to_bmc() модуля drivers/net/ethernet/emulex/benet/be_main.c драйвера сетевого устройства be2net ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
openSUSE-SU-2026:20145-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-40264 In the Linux kernel, the following vulnerability has been resolved: be2net: pass wrb_params in case of OS2BMC be_insert_vlan_in_pkt() is called with the wrb_params argument being NULL at be_send_pkt_to_bmc() call site. This may lead to dereferencing a NULL pointer when processing a workaround for specific packet, as commit bc0c3405abbb ("be2net: fix a Tx stall bug caused by a specific ipv6 packet") states. The correct way would be to pass the wrb_params from be_xmit(). | 0% Низкий | 2 месяца назад | ||
CVE-2025-40264 In the Linux kernel, the following vulnerability has been resolved: be2net: pass wrb_params in case of OS2BMC be_insert_vlan_in_pkt() is called with the wrb_params argument being NULL at be_send_pkt_to_bmc() call site. This may lead to dereferencing a NULL pointer when processing a workaround for specific packet, as commit bc0c3405abbb ("be2net: fix a Tx stall bug caused by a specific ipv6 packet") states. The correct way would be to pass the wrb_params from be_xmit(). | 0% Низкий | 2 месяца назад | ||
CVE-2025-40264 be2net: pass wrb_params in case of OS2BMC | CVSS3: 5.5 | 0% Низкий | 2 месяца назад | |
CVE-2025-40264 In the Linux kernel, the following vulnerability has been resolved: b ... | 0% Низкий | 2 месяца назад | ||
GHSA-gvxj-xj5w-j8qf In the Linux kernel, the following vulnerability has been resolved: be2net: pass wrb_params in case of OS2BMC be_insert_vlan_in_pkt() is called with the wrb_params argument being NULL at be_send_pkt_to_bmc() call site. This may lead to dereferencing a NULL pointer when processing a workaround for specific packet, as commit bc0c3405abbb ("be2net: fix a Tx stall bug caused by a specific ipv6 packet") states. The correct way would be to pass the wrb_params from be_xmit(). | 0% Низкий | 2 месяца назад | ||
BDU:2025-15939 Уязвимость функции be_send_pkt_to_bmc() модуля drivers/net/ethernet/emulex/benet/be_main.c драйвера сетевого устройства be2net ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.7 | 0% Низкий | 3 месяца назад | |
openSUSE-SU-2026:20145-1 Security update for the Linux Kernel | 7 дней назад |
Уязвимостей на страницу