CVE-2025-38058
- EPSS 0.07%
- Veröffentlicht 18.06.2025 09:33:38
- Zuletzt bearbeitet 12.05.2026 13:16:41
In the Linux kernel, the following vulnerability has been resolved: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock ... or we risk stealing final mntput from sync umount - raising mnt_count after umount(2) has verified that...
CVE-2025-38059
- EPSS 0.07%
- Veröffentlicht 18.06.2025 09:33:38
- Zuletzt bearbeitet 14.11.2025 17:06:22
In the Linux kernel, the following vulnerability has been resolved: btrfs: avoid NULL pointer dereference if no valid csum tree [BUG] When trying read-only scrub on a btrfs with rescue=idatacsums mount option, it will crash with the following call ...
CVE-2025-38057
- EPSS 0.1%
- Veröffentlicht 18.06.2025 09:33:37
- Zuletzt bearbeitet 17.03.2026 13:22:17
In the Linux kernel, the following vulnerability has been resolved: espintcp: fix skb leaks A few error paths are missing a kfree_skb.
CVE-2025-38052
- EPSS 0.08%
- Veröffentlicht 18.06.2025 09:33:33
- Zuletzt bearbeitet 17.12.2025 18:27:06
In the Linux kernel, the following vulnerability has been resolved: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done Syzbot reported a slab-use-after-free with the following call trace: ===========================================...
- EPSS 0.08%
- Veröffentlicht 18.06.2025 09:33:32
- Zuletzt bearbeitet 12.01.2026 13:11:24
In the Linux kernel, the following vulnerability has been resolved: smb: client: Fix use-after-free in cifs_fill_dirent There is a race condition in the readdir concurrency process, which may access the rsp buffer after it has been released, trigge...
CVE-2025-38044
- EPSS 0.09%
- Veröffentlicht 18.06.2025 09:33:28
- Zuletzt bearbeitet 17.12.2025 18:15:57
In the Linux kernel, the following vulnerability has been resolved: media: cx231xx: set device_caps for 417 The video_device for the MPEG encoder did not set device_caps. Add this, otherwise the video device can't be registered (you get a WARN_ON ...
CVE-2025-38042
- EPSS 0.09%
- Veröffentlicht 18.06.2025 09:33:27
- Zuletzt bearbeitet 14.11.2025 17:07:59
In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: k3-udma-glue: Drop skip_fdq argument from k3_udma_glue_reset_rx_chn The user of k3_udma_glue_reset_rx_chn() e.g. ti_am65_cpsw_nuss can run on multiple platforms havi...
CVE-2025-38040
- EPSS 0.08%
- Veröffentlicht 18.06.2025 09:33:25
- Zuletzt bearbeitet 18.12.2025 21:32:44
In the Linux kernel, the following vulnerability has been resolved: serial: mctrl_gpio: split disable_ms into sync and no_sync APIs The following splat has been observed on a SAMA5D27 platform using atmel_serial: BUG: sleeping function called from...
CVE-2025-38037
- EPSS 0.12%
- Veröffentlicht 18.06.2025 09:33:23
- Zuletzt bearbeitet 18.12.2025 21:36:09
In the Linux kernel, the following vulnerability has been resolved: vxlan: Annotate FDB data races The 'used' and 'updated' fields in the FDB entry structure can be accessed concurrently by multiple threads, leading to reports such as [1]. Can be r...
CVE-2025-38035
- EPSS 0.11%
- Veröffentlicht 18.06.2025 09:33:22
- Zuletzt bearbeitet 17.12.2025 18:09:49
In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: don't restore null sk_state_change queue->state_change is set as part of nvmet_tcp_set_queue_sock(), but if the TCP connection isn't established when nvmet_tcp_set_queue...