CVE-2025-22088
- EPSS 0.02%
- Veröffentlicht 16.04.2025 14:12:41
- Zuletzt bearbeitet 03.11.2025 20:17:43
In the Linux kernel, the following vulnerability has been resolved: RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() After the erdma_cep_put(new_cep) being called, new_cep will be freed, and the following dereference will cause a UAF pr...
CVE-2025-22089
- EPSS 0.04%
- Veröffentlicht 16.04.2025 14:12:41
- Zuletzt bearbeitet 03.11.2025 20:17:43
In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Don't expose hw_counters outside of init net namespace Commit 467f432a521a ("RDMA/core: Split port and device counter sysfs attributes") accidentally almost exposed hw c...
CVE-2025-22087
- EPSS 0.02%
- Veröffentlicht 16.04.2025 14:12:35
- Zuletzt bearbeitet 31.10.2025 20:57:00
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix array bounds error with may_goto may_goto uses an additional 8 bytes on the stack, which causes the interpreters[] array to go out of bounds when calculating index by stac...
CVE-2025-22086
- EPSS 0.03%
- Veröffentlicht 16.04.2025 14:12:34
- Zuletzt bearbeitet 03.11.2025 20:17:43
In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow When cur_qp isn't NULL, in order to avoid fetching the QP from the radix tree again we check if the next cqe QP is identical to th...
CVE-2025-22085
- EPSS 0.02%
- Veröffentlicht 16.04.2025 14:12:33
- Zuletzt bearbeitet 25.04.2025 18:41:52
In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix use-after-free when rename device name Syzbot reported a slab-use-after-free with the following call trace: ========================================================...
CVE-2025-22083
- EPSS 0.02%
- Veröffentlicht 16.04.2025 14:12:32
- Zuletzt bearbeitet 31.10.2025 20:58:31
In the Linux kernel, the following vulnerability has been resolved: vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint If vhost_scsi_set_endpoint is called multiple times without a vhost_scsi_clear_endpoint between them, we can h...
CVE-2025-22084
- EPSS 0.02%
- Veröffentlicht 16.04.2025 14:12:32
- Zuletzt bearbeitet 31.10.2025 20:57:23
In the Linux kernel, the following vulnerability has been resolved: w1: fix NULL pointer dereference in probe The w1_uart_probe() function calls w1_uart_serdev_open() (which includes devm_serdev_device_open()) before setting the client ops via serd...
CVE-2025-22082
- EPSS 0.02%
- Veröffentlicht 16.04.2025 14:12:31
- Zuletzt bearbeitet 31.10.2025 20:58:57
In the Linux kernel, the following vulnerability has been resolved: iio: backend: make sure to NULL terminate stack buffer Make sure to NULL terminate the buffer in iio_backend_debugfs_write_reg() before passing it to sscanf(). It is a stack variab...
CVE-2025-22081
- EPSS 0.03%
- Veröffentlicht 16.04.2025 14:12:30
- Zuletzt bearbeitet 03.11.2025 20:17:42
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix a couple integer overflows on 32bit systems On 32bit systems the "off + sizeof(struct NTFS_DE)" addition can have an integer wrapping issue. Fix it by using size_add...
CVE-2025-22079
- EPSS 0.02%
- Veröffentlicht 16.04.2025 14:12:29
- Zuletzt bearbeitet 03.11.2025 20:17:42
In the Linux kernel, the following vulnerability has been resolved: ocfs2: validate l_tree_depth to avoid out-of-bounds access The l_tree_depth field is 16-bit (__le16), but the actual maximum depth is limited to OCFS2_MAX_PATH_DEPTH. Add a check ...