CVE-2025-38622
- EPSS 0.01%
- Veröffentlicht 22.08.2025 16:00:31
- Zuletzt bearbeitet 07.01.2026 16:40:00
In the Linux kernel, the following vulnerability has been resolved: net: drop UFO packets in udp_rcv_segment() When sending a packet with virtio_net_hdr to tun device, if the gso_type in virtio_net_hdr is SKB_GSO_UDP and the gso_size is less than u...
CVE-2025-38621
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:30
- Zuletzt bearbeitet 26.11.2025 17:46:17
In the Linux kernel, the following vulnerability has been resolved: md: make rdev_addable usable for rcu mode Our testcase trigger panic: BUG: kernel NULL pointer dereference, address: 00000000000000e0 ... Oops: Oops: 0000 [#1] SMP NOPTI CPU: 2 UI...
CVE-2025-38620
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:24
- Zuletzt bearbeitet 26.11.2025 17:45:17
In the Linux kernel, the following vulnerability has been resolved: zloop: fix KASAN use-after-free of tag set When a zoned loop device, or zloop device, is removed, KASAN enabled kernel reports "BUG KASAN use-after-free" in blk_mq_free_tag_set(). ...
CVE-2025-38619
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:23
- Zuletzt bearbeitet 26.11.2025 17:45:06
In the Linux kernel, the following vulnerability has been resolved: media: ti: j721e-csi2rx: fix list_del corruption If ti_csi2rx_start_dma() fails in ti_csi2rx_dma_callback(), the buffer is marked done with VB2_BUF_STATE_ERROR but is not removed f...
CVE-2025-38618
- EPSS 0.01%
- Veröffentlicht 22.08.2025 13:01:24
- Zuletzt bearbeitet 07.01.2026 16:56:23
In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound soc...
CVE-2025-38616
- EPSS 0.02%
- Veröffentlicht 22.08.2025 13:01:23
- Zuletzt bearbeitet 26.11.2025 17:44:59
In the Linux kernel, the following vulnerability has been resolved: tls: handle data disappearing from under the TLS ULP TLS expects that it owns the receive queue of the TCP socket. This cannot be guaranteed in case the reader of the TCP socket en...
CVE-2025-38617
- EPSS 0%
- Veröffentlicht 22.08.2025 13:01:23
- Zuletzt bearbeitet 07.01.2026 16:57:56
In the Linux kernel, the following vulnerability has been resolved: net/packet: fix a race in packet_set_ring() and packet_notifier() When packet_set_ring() releases po->bind_lock, another thread can run packet_notifier() and process an NETDEV_UP e...
CVE-2024-58239
- EPSS 0.02%
- Veröffentlicht 22.08.2025 13:01:17
- Zuletzt bearbeitet 26.11.2025 17:42:08
In the Linux kernel, the following vulnerability has been resolved: tls: stop recv() if initial process_rx_list gave us non-DATA If we have a non-DATA record on the rx_list and another record of the same type still on the queue, we will end up merg...
CVE-2025-38614
- EPSS 0.02%
- Veröffentlicht 19.08.2025 17:15:40
- Zuletzt bearbeitet 09.01.2026 16:08:32
In the Linux kernel, the following vulnerability has been resolved: eventpoll: Fix semi-unbounded recursion Ensure that epoll instances can never form a graph deeper than EP_MAX_NESTS+1 links. Currently, ep_loop_check_proc() ensures that the graph...
CVE-2025-38615
- EPSS 0.02%
- Veröffentlicht 19.08.2025 17:15:40
- Zuletzt bearbeitet 26.11.2025 17:41:11
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: cancle set bad inode after removing name fails The reproducer uses a file0 on a ntfs3 file system with a corrupted i_link. When renaming, the file0's inode is marked as a...