CVE-2025-21638
- EPSS 0.05%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 03.11.2025 21:18:59
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: auth_enable: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different r...
CVE-2025-21639
- EPSS 0.05%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 03.11.2025 21:18:59
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: rto_min/max: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different r...
CVE-2025-21640
- EPSS 0.05%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 03.11.2025 21:19:00
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for differe...
CVE-2025-21641
- EPSS 0.04%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 01.10.2025 20:18:16
In the Linux kernel, the following vulnerability has been resolved: mptcp: sysctl: blackhole timeout: avoid using current->nsproxy As mentioned in the previous commit, using the 'net' structure via 'current' is not recommended for different reasons...
CVE-2025-21642
- EPSS 0.03%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 01.10.2025 20:18:16
In the Linux kernel, the following vulnerability has been resolved: mptcp: sysctl: sched: avoid using current->nsproxy Using the 'net' structure via 'current' is not recommended for different reasons. First, if the goal is to use it to read or wri...
CVE-2025-21643
- EPSS 0.04%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 16.10.2025 19:17:07
In the Linux kernel, the following vulnerability has been resolved: netfs: Fix kernel async DIO Netfslib needs to be able to handle kernel-initiated asynchronous DIO that is supplied with a bio_vec[] array. Currently, because of the async flag, th...
CVE-2025-21644
- EPSS 0.04%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 01.10.2025 20:18:16
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix tlb invalidation when wedging If GuC fails to load, the driver wedges, but in the process it tries to do stuff that may not be initialized yet. This moves the xe_gt_tlb...
CVE-2025-21632
- EPSS 0.03%
- Veröffentlicht 19.01.2025 11:15:08
- Zuletzt bearbeitet 24.09.2025 16:36:25
In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Ensure shadow stack is active before "getting" registers The x86 shadow stack support has its own set of registers. Those registers are XSAVE-managed, but they are "superv...
CVE-2025-21633
- EPSS 0.02%
- Veröffentlicht 19.01.2025 11:15:08
- Zuletzt bearbeitet 20.05.2025 14:15:27
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2025-21634
- EPSS 0.04%
- Veröffentlicht 19.01.2025 11:15:08
- Zuletzt bearbeitet 01.10.2025 20:18:14
In the Linux kernel, the following vulnerability has been resolved: cgroup/cpuset: remove kernfs active break A warning was found: WARNING: CPU: 10 PID: 3486953 at fs/kernfs/file.c:828 CPU: 10 PID: 3486953 Comm: rmdir Kdump: loaded Tainted: G RIP:...