CVE-2025-37807
- EPSS 0.04%
- Veröffentlicht 08.05.2025 06:26:06
- Zuletzt bearbeitet 10.11.2025 17:32:35
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix kmemleak warning for percpu hashmap Vlad Poenaru reported the following kmemleak issue: unreferenced object 0x606fd7c44ac8 (size 32): backtrace (crc 0): pcpu_...
CVE-2025-37808
- EPSS 0.07%
- Veröffentlicht 08.05.2025 06:26:06
- Zuletzt bearbeitet 10.11.2025 17:31:43
In the Linux kernel, the following vulnerability has been resolved: crypto: null - Use spin lock instead of mutex As the null algorithm may be freed in softirq context through af_alg, use spin locks instead of mutexes to protect the default null al...
CVE-2025-37803
- EPSS 0.05%
- Veröffentlicht 08.05.2025 06:26:03
- Zuletzt bearbeitet 03.11.2025 20:18:36
In the Linux kernel, the following vulnerability has been resolved: udmabuf: fix a buf size overflow issue during udmabuf creation by casting size_limit_mb to u64 when calculate pglimit.
CVE-2025-37800
- EPSS 0.05%
- Veröffentlicht 08.05.2025 06:26:01
- Zuletzt bearbeitet 05.06.2025 14:32:50
In the Linux kernel, the following vulnerability has been resolved: driver core: fix potential NULL pointer dereference in dev_uevent() If userspace reads "uevent" device attribute at the same time as another threads unbinds the device from its dri...
CVE-2020-36791
- EPSS 0.06%
- Veröffentlicht 07.05.2025 13:17:33
- Zuletzt bearbeitet 10.11.2025 17:34:55
In the Linux kernel, the following vulnerability has been resolved: net_sched: keep alloc_hash updated after hash allocation In commit 599be01ee567 ("net_sched: fix an OOB access in cls_tcindex") I moved cp->hash calculation before the first tcinde...
CVE-2024-58237
- EPSS 0.06%
- Veröffentlicht 05.05.2025 14:53:34
- Zuletzt bearbeitet 10.11.2025 17:35:27
In the Linux kernel, the following vulnerability has been resolved: bpf: consider that tail calls invalidate packet pointers Tail-called programs could execute any of the helpers that invalidate packet pointers. Hence, conservatively assume that ea...
CVE-2024-58100
- EPSS 0.05%
- Veröffentlicht 05.05.2025 14:53:33
- Zuletzt bearbeitet 10.11.2025 17:35:41
In the Linux kernel, the following vulnerability has been resolved: bpf: check changes_pkt_data property for extension programs When processing calls to global sub-programs, verifier decides whether to invalidate all packet pointers in current stat...
CVE-2024-58098
- EPSS 0.05%
- Veröffentlicht 05.05.2025 14:53:32
- Zuletzt bearbeitet 10.11.2025 17:35:57
In the Linux kernel, the following vulnerability has been resolved: bpf: track changes_pkt_data property for global functions When processing calls to certain helpers, verifier invalidates all packet pointers in a current state. For example, consid...
CVE-2022-21546
- EPSS 0.07%
- Veröffentlicht 02.05.2025 21:52:09
- Zuletzt bearbeitet 10.11.2025 17:37:14
In the Linux kernel, the following vulnerability has been resolved: scsi: target: Fix WRITE_SAME No Data Buffer crash In newer version of the SBC specs, we have a NDOB bit that indicates there is no data buffer that gets written out. If this bit is...
CVE-2023-53143
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:56:13
- Zuletzt bearbeitet 10.11.2025 17:37:57
In the Linux kernel, the following vulnerability has been resolved: ext4: fix another off-by-one fsmap error on 1k block filesystems Apparently syzbot figured out that issuing this FSMAP call: struct fsmap_head cmd = { .fmh_count = ...; .fmh_key...