CVE-2025-21787
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:19
- Zuletzt bearbeitet 12.05.2026 13:16:36
In the Linux kernel, the following vulnerability has been resolved: team: better TEAM_OPTION_TYPE_STRING validation syzbot reported following splat [1] Make sure user-provided data contains one nul byte. [1] BUG: KMSAN: uninit-value in string_no...
CVE-2025-21791
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:19
- Zuletzt bearbeitet 03.11.2025 21:19:10
In the Linux kernel, the following vulnerability has been resolved: vrf: use RCU protection in l3mdev_l3_out() l3mdev_l3_out() can be called without RCU being held: raw_sendmsg() ip_push_pending_frames() ip_send_skb() ip_local_out() __ip...
CVE-2025-21776
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:18
- Zuletzt bearbeitet 12.05.2026 13:16:36
In the Linux kernel, the following vulnerability has been resolved: USB: hub: Ignore non-compliant devices with too many configs or interfaces Robert Morris created a test program which can cause usb_hub_to_struct_hub() to dereference a NULL or ina...
CVE-2025-21779
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:18
- Zuletzt bearbeitet 03.11.2025 21:19:09
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel Advertise support for Hyper-V's SEND_IPI and SEND_IPI_EX hypercalls if and only if the local API is emu...
CVE-2025-21780
- EPSS 0.01%
- Veröffentlicht 27.02.2025 03:15:18
- Zuletzt bearbeitet 03.11.2025 21:19:09
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() It malicious user provides a small pptable through sysfs and then a bigger pptable, it may cause buffer overflow ...
CVE-2025-21781
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:18
- Zuletzt bearbeitet 03.11.2025 21:19:09
In the Linux kernel, the following vulnerability has been resolved: batman-adv: fix panic during interface removal Reference counting is used to ensure that batadv_hardif_neigh_node and batadv_hard_iface are not freed before/during batadv_v_elp_thr...
CVE-2025-21764
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:17
- Zuletzt bearbeitet 12.05.2026 13:16:35
In the Linux kernel, the following vulnerability has been resolved: ndisc: use RCU protection in ndisc_alloc_skb() ndisc_alloc_skb() can be called without RTNL or RCU being held. Add RCU protection to avoid possible UAF.
CVE-2025-21765
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:17
- Zuletzt bearbeitet 12.05.2026 13:16:36
In the Linux kernel, the following vulnerability has been resolved: ipv6: use RCU protection in ip6_default_advmss() ip6_default_advmss() needs rcu protection to make sure the net structure it reads does not disappear.
CVE-2025-21766
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:17
- Zuletzt bearbeitet 12.05.2026 13:16:36
In the Linux kernel, the following vulnerability has been resolved: ipv4: use RCU protection in __ip_rt_update_pmtu() __ip_rt_update_pmtu() must use RCU protection to make sure the net structure it reads does not disappear.
CVE-2025-21767
- EPSS 0.01%
- Veröffentlicht 27.02.2025 03:15:17
- Zuletzt bearbeitet 12.05.2026 13:16:36
In the Linux kernel, the following vulnerability has been resolved: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context The following bug report happened with a PREEMPT_RT kernel: BUG: sleeping function called ...