CVE-2025-38032
- EPSS 0.02%
- Veröffentlicht 18.06.2025 09:33:19
- Zuletzt bearbeitet 14.11.2025 17:09:21
In the Linux kernel, the following vulnerability has been resolved: mr: consolidate the ipmr_can_free_table() checks. Guoyu Yin reported a splat in the ipmr netns cleanup path: WARNING: CPU: 2 PID: 14564 at net/ipv4/ipmr.c:440 ipmr_free_table net/...
- EPSS 0.02%
- Veröffentlicht 18.06.2025 09:33:18
- Zuletzt bearbeitet 19.06.2025 13:15:51
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2025-38031
- EPSS 0.03%
- Veröffentlicht 18.06.2025 09:33:18
- Zuletzt bearbeitet 18.12.2025 21:36:36
In the Linux kernel, the following vulnerability has been resolved: padata: do not leak refcount in reorder_work A recent patch that addressed a UAF introduced a reference count leak: the parallel_data refcount is incremented unconditionally, regar...
CVE-2025-38029
- EPSS 0.02%
- Veröffentlicht 18.06.2025 09:33:17
- Zuletzt bearbeitet 14.11.2025 17:09:49
In the Linux kernel, the following vulnerability has been resolved: kasan: avoid sleepable page allocation from atomic context apply_to_pte_range() enters the lazy MMU mode and then invokes kasan_populate_vmalloc_pte() callback on each page table w...
CVE-2025-38028
- EPSS 0.01%
- Veröffentlicht 18.06.2025 09:28:33
- Zuletzt bearbeitet 14.11.2025 17:11:02
In the Linux kernel, the following vulnerability has been resolved: NFS/localio: Fix a race in nfs_local_open_fh() Once the clp->cl_uuid.lock has been dropped, another CPU could come in and free the struct nfsd_file that was just added. To prevent ...
CVE-2025-38027
- EPSS 0.01%
- Veröffentlicht 18.06.2025 09:28:32
- Zuletzt bearbeitet 18.12.2025 21:23:38
In the Linux kernel, the following vulnerability has been resolved: regulator: max20086: fix invalid memory access max20086_parse_regulators_dt() calls of_regulator_match() using an array of struct of_regulator_match allocated on the stack for the ...
CVE-2025-38025
- EPSS 0.02%
- Veröffentlicht 18.06.2025 09:28:31
- Zuletzt bearbeitet 14.11.2025 17:11:27
In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad7606: check for NULL before calling sw_mode_config() Check that the sw_mode_config function pointer is not NULL before calling it. Not all buses define this callback, w...
- EPSS -
- Veröffentlicht 18.06.2025 09:28:31
- Zuletzt bearbeitet 18.06.2025 12:15:18
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2025-38024
- EPSS 0.02%
- Veröffentlicht 18.06.2025 09:28:30
- Zuletzt bearbeitet 17.12.2025 19:48:04
In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x7d/0xa0 lib/dump_stack.c:120 print...
CVE-2025-38022
- EPSS 0.01%
- Veröffentlicht 18.06.2025 09:28:29
- Zuletzt bearbeitet 14.11.2025 17:11:43
In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:...