-
CVE-2025-68374
- EPSS 0.03%
- Veröffentlicht 24.12.2025 10:33:04
- Zuletzt bearbeitet 29.12.2025 15:58:34
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: md: fix rcu protection in md_wakeup_thread We attempted to use RCU to protect the pointer 'thread', but directly passed the value when calling md_wakeup_thread(). This means that the RCU pointer has been acquired before rcu_read_lock(), which renders rcu_read_lock() ineffective and could lead to a use-after-free.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
21989cb5034c835b212385a2afadf279d8069da0
Version
4469315439827290923fce4f3f672599cabeb366
Status
affected
Version <
a4bd1caf591faeae44cb10b6517e7dacb5139bda
Version
4469315439827290923fce4f3f672599cabeb366
Status
affected
Version <
f98b191f78124405294481dea85f8a22a3eb0a59
Version
4469315439827290923fce4f3f672599cabeb366
Status
affected
Version <
0dc76205549b4c25705e54345f211b9f66e018a0
Version
4469315439827290923fce4f3f672599cabeb366
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.5
Status
affected
Version <
6.5
Version
0
Status
unaffected
Version <=
6.12.*
Version
6.12.63
Status
unaffected
Version <=
6.17.*
Version
6.17.13
Status
unaffected
Version <=
6.18.*
Version
6.18.2
Status
unaffected
Version <=
*
Version
6.19-rc1
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.064 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|