An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12.
More Stories
USN-7455-4: Linux kernel (Oracle) vulnerabilities
Jann Horn discovered that the watch_queue event notification subsystem in the Linux kernel contained an out-of-bounds write vulnerability. A local...
Commvault Command Center Path Traversal Vulnerability (CVE-2025-34028)
What is the Vulnerability?A critical path traversal vulnerability has been identified in Commvault's Command Center Innovation Release. The vulnerability, tracked...
chromium-135.0.7049.114-1.fc41
FEDORA-2025-9ea1ed1fcf Packages in this update: chromium-135.0.7049.114-1.fc41 Update description: Update to 135.0.7049.114 Read More
chromium-135.0.7049.114-1.el10_1
FEDORA-EPEL-2025-41e9d3ba95 Packages in this update: chromium-135.0.7049.114-1.el10_1 Update description: Update to 135.0.7049.114 Read More
chromium-135.0.7049.114-1.fc42
FEDORA-2025-ca9bc14500 Packages in this update: chromium-135.0.7049.114-1.fc42 Update description: Update to 135.0.7049.114 Read More
chromium-135.0.7049.114-1.el9
FEDORA-EPEL-2025-1f10cd8fe7 Packages in this update: chromium-135.0.7049.114-1.el9 Update description: Update to 135.0.7049.114 Read More