CVE-2024-58090
- EPSS 0.02%
- Veröffentlicht 27.03.2025 14:57:02
- Zuletzt bearbeitet 03.11.2025 20:17:03
In the Linux kernel, the following vulnerability has been resolved: sched/core: Prevent rescheduling when interrupts are disabled David reported a warning observed while loop testing kexec jump: Interrupts enabled after irqrouter_resume+0x0/0x50...
CVE-2025-21871
- EPSS 0.02%
- Veröffentlicht 27.03.2025 13:38:23
- Zuletzt bearbeitet 03.11.2025 20:17:24
In the Linux kernel, the following vulnerability has been resolved: tee: optee: Fix supplicant wait loop OP-TEE supplicant is a user-space daemon and it's possible for it be hung or crashed or killed in the middle of processing an OP-TEE RPC call. ...
CVE-2025-21869
- EPSS 0.04%
- Veröffentlicht 27.03.2025 13:38:22
- Zuletzt bearbeitet 29.10.2025 21:08:13
In the Linux kernel, the following vulnerability has been resolved: powerpc/code-patching: Disable KASAN report during patching via temporary mm Erhard reports the following KASAN hit on Talos II (power9) with kernel 6.13: [ 12.028126] =========...
CVE-2025-21870
- EPSS 0.03%
- Veröffentlicht 27.03.2025 13:38:22
- Zuletzt bearbeitet 29.10.2025 21:07:58
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers Other, non DAI copier widgets could have the same stream name (sname) as the ALH copier and in that case the copi...
CVE-2025-21868
- EPSS 0.03%
- Veröffentlicht 27.03.2025 13:38:21
- Zuletzt bearbeitet 24.11.2025 10:15:59
In the Linux kernel, the following vulnerability has been resolved: net: allow small head cache usage with large MAX_SKB_FRAGS values Sabrina reported the following splat: WARNING: CPU: 0 PID: 1 at net/core/dev.c:6935 netif_napi_add_weight_loc...
CVE-2025-21867
- EPSS 0.04%
- Veröffentlicht 27.03.2025 13:38:20
- Zuletzt bearbeitet 03.11.2025 20:17:24
In the Linux kernel, the following vulnerability has been resolved: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() KMSAN reported a use-after-free issue in eth_skb_pkt_type()[1]. The cause of the issue was that eth_skb_pkt_type() acc...
CVE-2023-52927
- EPSS 0.03%
- Veröffentlicht 14.03.2025 14:25:59
- Zuletzt bearbeitet 12.05.2026 12:16:16
In the Linux kernel, the following vulnerability has been resolved: netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_conntrack_in() calling nf_ct_find_expectation() will remove the exp from the hash table. However, in s...
CVE-2025-21866
- EPSS 0.02%
- Veröffentlicht 12.03.2025 09:42:22
- Zuletzt bearbeitet 03.11.2025 20:17:23
In the Linux kernel, the following vulnerability has been resolved: powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC Erhard reported the following KASAN hit while booting his PowerMac G4 with a KASAN-enabled kerne...
CVE-2025-21864
- EPSS 0.02%
- Veröffentlicht 12.03.2025 09:42:21
- Zuletzt bearbeitet 12.05.2026 13:16:39
In the Linux kernel, the following vulnerability has been resolved: tcp: drop secpath at the same time as we currently drop dst Xiumei reported hitting the WARN in xfrm6_tunnel_net_exit while running tests that boil down to: - create a pair of net...
CVE-2025-21865
- EPSS 0.01%
- Veröffentlicht 12.03.2025 09:42:21
- Zuletzt bearbeitet 12.05.2026 13:16:39
In the Linux kernel, the following vulnerability has been resolved: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). Brad Spengler reported the list_del() corruption splat in gtp_net_exit_batch_rtnl(). [0] Commit eb28fd76c0a0 ("gt...