CVE-2025-37806
- EPSS 0.05%
- Veröffentlicht 08.05.2025 06:26:05
- Zuletzt bearbeitet 10.11.2025 17:32:50
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Keep write operations atomic syzbot reported a NULL pointer dereference in __generic_file_write_iter. [1] Before the write operation is completed, the user executes ioct...
CVE-2025-37803
- EPSS 0.05%
- Veröffentlicht 08.05.2025 06:26:03
- Zuletzt bearbeitet 03.11.2025 20:18:36
In the Linux kernel, the following vulnerability has been resolved: udmabuf: fix a buf size overflow issue during udmabuf creation by casting size_limit_mb to u64 when calculate pglimit.
CVE-2025-37800
- EPSS 0.05%
- Veröffentlicht 08.05.2025 06:26:01
- Zuletzt bearbeitet 05.06.2025 14:32:50
In the Linux kernel, the following vulnerability has been resolved: driver core: fix potential NULL pointer dereference in dev_uevent() If userspace reads "uevent" device attribute at the same time as another threads unbinds the device from its dri...
CVE-2025-37801
- EPSS 0.05%
- Veröffentlicht 08.05.2025 06:26:01
- Zuletzt bearbeitet 03.11.2025 20:18:35
In the Linux kernel, the following vulnerability has been resolved: spi: spi-imx: Add check for spi_imx_setupxfer() Add check for the return value of spi_imx_setupxfer(). spi_imx->rx and spi_imx->tx function pointer can be NULL when spi_imx_setupxf...
CVE-2024-58237
- EPSS 0.06%
- Veröffentlicht 05.05.2025 14:53:34
- Zuletzt bearbeitet 10.11.2025 17:35:27
In the Linux kernel, the following vulnerability has been resolved: bpf: consider that tail calls invalidate packet pointers Tail-called programs could execute any of the helpers that invalidate packet pointers. Hence, conservatively assume that ea...
CVE-2024-58100
- EPSS 0.05%
- Veröffentlicht 05.05.2025 14:53:33
- Zuletzt bearbeitet 10.11.2025 17:35:41
In the Linux kernel, the following vulnerability has been resolved: bpf: check changes_pkt_data property for extension programs When processing calls to global sub-programs, verifier decides whether to invalidate all packet pointers in current stat...
CVE-2024-58098
- EPSS 0.05%
- Veröffentlicht 05.05.2025 14:53:32
- Zuletzt bearbeitet 10.11.2025 17:35:57
In the Linux kernel, the following vulnerability has been resolved: bpf: track changes_pkt_data property for global functions When processing calls to certain helpers, verifier invalidates all packet pointers in a current state. For example, consid...
CVE-2025-37799
- EPSS 0.07%
- Veröffentlicht 03.05.2025 11:39:51
- Zuletzt bearbeitet 10.11.2025 17:36:25
In the Linux kernel, the following vulnerability has been resolved: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp vmxnet3 driver's XDP handling is buggy for packet sizes using ring0 (that is, packet sizes between 128 - 3k bytes). We ...
CVE-2025-37798
- EPSS 0.08%
- Veröffentlicht 02.05.2025 14:16:02
- Zuletzt bearbeitet 06.11.2025 20:49:48
In the Linux kernel, the following vulnerability has been resolved: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() After making all ->qlen_notify() callbacks idempotent, now it is safe to remove the check of qlen!=0 from both fq...
CVE-2025-37797
- EPSS 0.08%
- Veröffentlicht 02.05.2025 14:16:01
- Zuletzt bearbeitet 06.11.2025 20:48:20
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check...