CVE-2025-22062
- EPSS 0.11%
- Veröffentlicht 16.04.2025 14:12:17
- Zuletzt bearbeitet 03.11.2025 20:17:41
In the Linux kernel, the following vulnerability has been resolved: sctp: add mutual exclusion in proc_sctp_do_udp_port() We must serialize calls to sctp_udp_sock_stop() and sctp_udp_sock_start() or risk a crash as syzbot reported: Oops: general p...
CVE-2025-22060
- EPSS 0.1%
- Veröffentlicht 16.04.2025 14:12:16
- Zuletzt bearbeitet 03.11.2025 20:17:40
In the Linux kernel, the following vulnerability has been resolved: net: mvpp2: Prevent parser TCAM memory corruption Protect the parser TCAM/SRAM memory, and the cached (shadow) SRAM information, from concurrent modifications. Both the TCAM and S...
CVE-2025-22057
- EPSS 0.06%
- Veröffentlicht 16.04.2025 14:12:14
- Zuletzt bearbeitet 31.10.2025 20:17:44
In the Linux kernel, the following vulnerability has been resolved: net: decrease cached dst counters in dst_release Upstream fix ac888d58869b ("net: do not delay dst_entries_add() in dst_release()") moved decrementing the dst count from dst_destro...
CVE-2025-22058
- EPSS 0.1%
- Veröffentlicht 16.04.2025 14:12:14
- Zuletzt bearbeitet 03.11.2025 20:17:40
In the Linux kernel, the following vulnerability has been resolved: udp: Fix memory accounting leak. Matt Dowling reported a weird UDP memory usage issue. Under normal operation, the UDP memory usage reported in /proc/net/sockstat remains close to...
CVE-2025-22056
- EPSS 0.03%
- Veröffentlicht 16.04.2025 14:12:13
- Zuletzt bearbeitet 03.11.2025 20:17:40
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_tunnel: fix geneve_opt type confusion addition When handling multiple NFTA_TUNNEL_KEY_OPTS_GENEVE attributes, the parsing logic should place every geneve_opt structu...
CVE-2025-22055
- EPSS 0.11%
- Veröffentlicht 16.04.2025 14:12:12
- Zuletzt bearbeitet 03.11.2025 20:17:40
In the Linux kernel, the following vulnerability has been resolved: net: fix geneve_opt length integer overflow struct geneve_opt uses 5 bit length for each single option, which means every vary size option should be smaller than 128 bytes. Howeve...
CVE-2025-22053
- EPSS 0.07%
- Veröffentlicht 16.04.2025 14:12:11
- Zuletzt bearbeitet 31.10.2025 20:18:11
In the Linux kernel, the following vulnerability has been resolved: net: ibmveth: make veth_pool_store stop hanging v2: - Created a single error handling unlock and exit in veth_pool_store - Greatly expanded commit message with previous explanatory...
CVE-2025-22054
- EPSS 0.14%
- Veröffentlicht 16.04.2025 14:12:11
- Zuletzt bearbeitet 03.11.2025 20:17:40
In the Linux kernel, the following vulnerability has been resolved: arcnet: Add NULL check in com20020pci_probe() devm_kasprintf() returns NULL when memory allocation fails. Currently, com20020pci_probe() does not check for this case, which results...
CVE-2025-22049
- EPSS 0.08%
- Veröffentlicht 16.04.2025 14:12:08
- Zuletzt bearbeitet 03.11.2025 20:17:39
In the Linux kernel, the following vulnerability has been resolved: LoongArch: Increase ARCH_DMA_MINALIGN up to 16 ARCH_DMA_MINALIGN is 1 by default, but some LoongArch-specific devices (such as APBDMA) require 16 bytes alignment. When the data buf...
CVE-2025-22050
- EPSS 0.11%
- Veröffentlicht 16.04.2025 14:12:08
- Zuletzt bearbeitet 03.11.2025 20:17:39
In the Linux kernel, the following vulnerability has been resolved: usbnet:fix NPE during rx_complete Missing usbnet_going_away Check in Critical Path. The usb_submit_urb function lacks a usbnet_going_away validation, whereas __usbnet_queue_skb inc...