CVE-2025-21778
- EPSS 0.03%
- Veröffentlicht 27.02.2025 03:15:18
- Zuletzt bearbeitet 28.10.2025 20:38:27
In the Linux kernel, the following vulnerability has been resolved: tracing: Do not allow mmap() of persistent ring buffer When trying to mmap a trace instance buffer that is attached to reserve_mem, it would crash: BUG: unable to handle page fau...
CVE-2025-21779
- EPSS 0.06%
- Veröffentlicht 27.02.2025 03:15:18
- Zuletzt bearbeitet 03.11.2025 21:19:09
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel Advertise support for Hyper-V's SEND_IPI and SEND_IPI_EX hypercalls if and only if the local API is emu...
CVE-2025-21780
- EPSS 0.03%
- Veröffentlicht 27.02.2025 03:15:18
- Zuletzt bearbeitet 03.11.2025 21:19:09
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() It malicious user provides a small pptable through sysfs and then a bigger pptable, it may cause buffer overflow ...
CVE-2025-21781
- EPSS 0.06%
- Veröffentlicht 27.02.2025 03:15:18
- Zuletzt bearbeitet 03.11.2025 21:19:09
In the Linux kernel, the following vulnerability has been resolved: batman-adv: fix panic during interface removal Reference counting is used to ensure that batadv_hardif_neigh_node and batadv_hard_iface are not freed before/during batadv_v_elp_thr...
CVE-2025-21764
- EPSS 0.04%
- Veröffentlicht 27.02.2025 03:15:17
- Zuletzt bearbeitet 03.11.2025 20:17:16
In the Linux kernel, the following vulnerability has been resolved: ndisc: use RCU protection in ndisc_alloc_skb() ndisc_alloc_skb() can be called without RTNL or RCU being held. Add RCU protection to avoid possible UAF.
CVE-2025-21765
- EPSS 0.06%
- Veröffentlicht 27.02.2025 03:15:17
- Zuletzt bearbeitet 03.11.2025 20:17:16
In the Linux kernel, the following vulnerability has been resolved: ipv6: use RCU protection in ip6_default_advmss() ip6_default_advmss() needs rcu protection to make sure the net structure it reads does not disappear.
CVE-2025-21766
- EPSS 0.05%
- Veröffentlicht 27.02.2025 03:15:17
- Zuletzt bearbeitet 03.11.2025 20:17:16
In the Linux kernel, the following vulnerability has been resolved: ipv4: use RCU protection in __ip_rt_update_pmtu() __ip_rt_update_pmtu() must use RCU protection to make sure the net structure it reads does not disappear.
CVE-2025-21767
- EPSS 0.05%
- Veröffentlicht 27.02.2025 03:15:17
- Zuletzt bearbeitet 03.11.2025 20:17:16
In the Linux kernel, the following vulnerability has been resolved: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context The following bug report happened with a PREEMPT_RT kernel: BUG: sleeping function called ...
CVE-2025-21768
- EPSS 0.03%
- Veröffentlicht 27.02.2025 03:15:17
- Zuletzt bearbeitet 28.10.2025 20:28:41
In the Linux kernel, the following vulnerability has been resolved: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels Some lwtunnels have a dst cache for post-transformation dst. If the packet destination did not change we may end up re...
CVE-2025-21769
- EPSS 0.04%
- Veröffentlicht 27.02.2025 03:15:17
- Zuletzt bearbeitet 01.10.2025 20:18:23
In the Linux kernel, the following vulnerability has been resolved: ptp: vmclock: Add .owner to vmclock_miscdev_fops Without the .owner field, the module can be unloaded while /dev/vmclock0 is open, leading to an oops.