CVE-2025-21959
- EPSS 0.04%
- Veröffentlicht 01.04.2025 16:15:27
- Zuletzt bearbeitet 03.11.2025 20:17:32
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree() Since commit b36e4523d4d5 ("netfilter: nf_conncount: fix garbage collection confirm race"), `cp...
CVE-2025-21960
- EPSS 0.03%
- Veröffentlicht 01.04.2025 16:15:27
- Zuletzt bearbeitet 03.11.2025 20:17:32
In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() The bnxt_rx_pkt() updates ip_summed value at the end if checksum offload is enabled. When the XDP-MB program is attached a...
CVE-2025-21961
- EPSS 0.02%
- Veröffentlicht 01.04.2025 16:15:27
- Zuletzt bearbeitet 01.10.2025 18:15:40
In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: fix truesize for mb-xdp-pass case When mb-xdp is set and return is XDP_PASS, packet is converted from xdp_buff to sk_buff with xdp_update_skb_shared_info() in bnxt_xdp_b...
CVE-2025-21962
- EPSS 0.03%
- Veröffentlicht 01.04.2025 16:15:27
- Zuletzt bearbeitet 03.11.2025 20:17:32
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing closetimeo mount option User-provided mount parameter closetimeo of type u32 is intended to have an upper limit, but before it is valida...
CVE-2025-21963
- EPSS 0.03%
- Veröffentlicht 01.04.2025 16:15:27
- Zuletzt bearbeitet 03.11.2025 20:17:33
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing acdirmax mount option User-provided mount parameter acdirmax of type u32 is intended to have an upper limit, but before it is validated,...
CVE-2025-21964
- EPSS 0.03%
- Veröffentlicht 01.04.2025 16:15:27
- Zuletzt bearbeitet 03.11.2025 20:17:33
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing acregmax mount option User-provided mount parameter acregmax of type u32 is intended to have an upper limit, but before it is validated,...
CVE-2025-21965
- EPSS 0.02%
- Veröffentlicht 01.04.2025 16:15:27
- Zuletzt bearbeitet 31.10.2025 19:35:16
In the Linux kernel, the following vulnerability has been resolved: sched_ext: Validate prev_cpu in scx_bpf_select_cpu_dfl() If a BPF scheduler provides an invalid CPU (outside the nr_cpu_ids range) as prev_cpu to scx_bpf_select_cpu_dfl() it can ca...
CVE-2025-21966
- EPSS 0.03%
- Veröffentlicht 01.04.2025 16:15:27
- Zuletzt bearbeitet 01.10.2025 19:15:34
In the Linux kernel, the following vulnerability has been resolved: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature Fix memory corruption due to incorrect parameter being passed to bio_init
CVE-2025-21967
- EPSS 0.02%
- Veröffentlicht 01.04.2025 16:15:27
- Zuletzt bearbeitet 16.04.2025 14:15:24
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_free_work_struct ->interim_entry of ksmbd_work could be deleted after oplock is freed. We don't need to manage it with linked list. The interim r...
CVE-2025-21949
- EPSS 0.03%
- Veröffentlicht 01.04.2025 16:15:26
- Zuletzt bearbeitet 01.10.2025 18:15:39
In the Linux kernel, the following vulnerability has been resolved: LoongArch: Set hugetlb mmap base address aligned with pmd size With ltp test case "testcases/bin/hugefork02", there is a dmesg error report message such as: kernel BUG at mm/huge...