CVE-2025-21647
- EPSS 0.02%
- Veröffentlicht 19.01.2025 11:15:10
- Zuletzt bearbeitet 12.05.2026 13:16:30
In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: add bounds checks to host bulk flow fairness counts Even though we fixed a logic error in the commit cited below, syzbot still managed to trigger an underflow of t...
CVE-2025-21648
- EPSS 0.03%
- Veröffentlicht 19.01.2025 11:15:10
- Zuletzt bearbeitet 12.05.2026 13:16:30
In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: clamp maximum hashtable size to INT_MAX Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_n...
CVE-2025-21651
- EPSS 0.02%
- Veröffentlicht 19.01.2025 11:15:10
- Zuletzt bearbeitet 16.10.2025 19:22:28
In the Linux kernel, the following vulnerability has been resolved: net: hns3: don't auto enable misc vector Currently, there is a time window between misc irq enabled and service task inited. If an interrupte is reported at this time, it will caus...
CVE-2025-21653
- EPSS 0.03%
- Veröffentlicht 19.01.2025 11:15:10
- Zuletzt bearbeitet 12.05.2026 13:16:30
In the Linux kernel, the following vulnerability has been resolved: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute syzbot found that TCA_FLOW_RSHIFT attribute was not validated. Right shitfing a 32bit integer is undefined for large shift v...
CVE-2025-21635
- EPSS 0.02%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 01.10.2025 20:18:15
In the Linux kernel, the following vulnerability has been resolved: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for dif...
CVE-2025-21638
- EPSS 0.03%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 12.05.2026 13:16:29
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: auth_enable: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different r...
CVE-2025-21639
- EPSS 0.03%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 12.05.2026 13:16:30
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: rto_min/max: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different r...
CVE-2025-21640
- EPSS 0.03%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 12.05.2026 13:16:30
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for differe...
CVE-2025-21634
- EPSS 0.02%
- Veröffentlicht 19.01.2025 11:15:08
- Zuletzt bearbeitet 01.10.2025 20:18:14
In the Linux kernel, the following vulnerability has been resolved: cgroup/cpuset: remove kernfs active break A warning was found: WARNING: CPU: 10 PID: 3486953 at fs/kernfs/file.c:828 CPU: 10 PID: 3486953 Comm: rmdir Kdump: loaded Tainted: G RIP:...
CVE-2025-21629
- EPSS 0.02%
- Veröffentlicht 15.01.2025 13:15:15
- Zuletzt bearbeitet 03.11.2025 21:18:58
In the Linux kernel, the following vulnerability has been resolved: net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets The blamed commit disabled hardware offoad of IPv6 packets with extension headers on devices that advertise NETIF_F_IPV6...