CVE-2025-21875
- EPSS 0.02%
- Veröffentlicht 27.03.2025 14:57:06
- Zuletzt bearbeitet 03.11.2025 20:17:24
In the Linux kernel, the following vulnerability has been resolved: mptcp: always handle address removal under msk socket lock Syzkaller reported a lockdep splat in the PM control path: WARNING: CPU: 0 PID: 6693 at ./include/net/sock.h:1711 sock...
CVE-2025-21872
- EPSS 0.02%
- Veröffentlicht 27.03.2025 14:57:04
- Zuletzt bearbeitet 03.11.2025 20:17:24
In the Linux kernel, the following vulnerability has been resolved: efi: Don't map the entire mokvar table to determine its size Currently, when validating the mokvar table, we (re)map the entire table on each iteration of the loop, adding space as...
CVE-2025-21873
- EPSS 0.01%
- Veröffentlicht 27.03.2025 14:57:04
- Zuletzt bearbeitet 30.10.2025 16:19:03
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: bsg: Fix crash when arpmb command fails If the device doesn't support arpmb we'll crash due to copying user data in bsg_transport_sg_io_fn(). In the case where uf...
CVE-2024-58090
- EPSS 0.02%
- Veröffentlicht 27.03.2025 14:57:02
- Zuletzt bearbeitet 03.11.2025 20:17:03
In the Linux kernel, the following vulnerability has been resolved: sched/core: Prevent rescheduling when interrupts are disabled David reported a warning observed while loop testing kexec jump: Interrupts enabled after irqrouter_resume+0x0/0x50...
CVE-2025-21871
- EPSS 0.02%
- Veröffentlicht 27.03.2025 13:38:23
- Zuletzt bearbeitet 03.11.2025 20:17:24
In the Linux kernel, the following vulnerability has been resolved: tee: optee: Fix supplicant wait loop OP-TEE supplicant is a user-space daemon and it's possible for it be hung or crashed or killed in the middle of processing an OP-TEE RPC call. ...
CVE-2025-21869
- EPSS 0.04%
- Veröffentlicht 27.03.2025 13:38:22
- Zuletzt bearbeitet 29.10.2025 21:08:13
In the Linux kernel, the following vulnerability has been resolved: powerpc/code-patching: Disable KASAN report during patching via temporary mm Erhard reports the following KASAN hit on Talos II (power9) with kernel 6.13: [ 12.028126] =========...
CVE-2025-21870
- EPSS 0.03%
- Veröffentlicht 27.03.2025 13:38:22
- Zuletzt bearbeitet 29.10.2025 21:07:58
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers Other, non DAI copier widgets could have the same stream name (sname) as the ALH copier and in that case the copi...
CVE-2025-21868
- EPSS 0.03%
- Veröffentlicht 27.03.2025 13:38:21
- Zuletzt bearbeitet 24.11.2025 10:15:59
In the Linux kernel, the following vulnerability has been resolved: net: allow small head cache usage with large MAX_SKB_FRAGS values Sabrina reported the following splat: WARNING: CPU: 0 PID: 1 at net/core/dev.c:6935 netif_napi_add_weight_loc...
CVE-2025-21867
- EPSS 0.04%
- Veröffentlicht 27.03.2025 13:38:20
- Zuletzt bearbeitet 03.11.2025 20:17:24
In the Linux kernel, the following vulnerability has been resolved: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() KMSAN reported a use-after-free issue in eth_skb_pkt_type()[1]. The cause of the issue was that eth_skb_pkt_type() acc...
CVE-2025-2312
- EPSS 0.02%
- Veröffentlicht 25.03.2025 18:15:34
- Zuletzt bearbeitet 15.04.2026 00:35:42
A flaw was found in cifs-utils. When trying to obtain Kerberos credentials, the cifs.upcall program from the cifs-utils package makes an upcall to the wrong namespace in containerized environments. This issue may lead to disclosing sensitive data fro...