CVE-2025-21773
- EPSS 0.01%
- Veröffentlicht 27.02.2025 03:15:17
- Zuletzt bearbeitet 01.10.2025 20:18:23
In the Linux kernel, the following vulnerability has been resolved: can: etas_es58x: fix potential NULL pointer dereference on udev->serial The driver assumed that es58x_dev->udev->serial could never be NULL. While this is true on commercially avai...
CVE-2025-21754
- EPSS 0.01%
- Veröffentlicht 27.02.2025 03:15:16
- Zuletzt bearbeitet 28.10.2025 20:50:26
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix assertion failure when splitting ordered extent after transaction abort If while we are doing a direct IO write a transaction abort happens, we mark all existing ordered...
CVE-2025-21756
- EPSS 0.09%
- Veröffentlicht 27.02.2025 03:15:16
- Zuletzt bearbeitet 12.05.2026 13:16:34
In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during ...
CVE-2025-21758
- EPSS 0.13%
- Veröffentlicht 27.02.2025 03:15:16
- Zuletzt bearbeitet 12.05.2026 13:16:34
In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: add RCU protection to mld_newpack() mld_newpack() can be called without RTNL or RCU being held. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp...
CVE-2025-21759
- EPSS 0.25%
- Veröffentlicht 27.02.2025 03:15:16
- Zuletzt bearbeitet 24.03.2025 17:33:09
In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called without RTNL or RCU being held. Extend RCU protection so that we can safely fetch the net pointer and...
CVE-2025-21760
- EPSS 0.19%
- Veröffentlicht 27.02.2025 03:15:16
- Zuletzt bearbeitet 12.05.2026 13:16:35
In the Linux kernel, the following vulnerability has been resolved: ndisc: extend RCU protection in ndisc_send_skb() ndisc_send_skb() can be called without RTNL or RCU held. Acquire rcu_read_lock() earlier, so that we can use dev_net_rcu() and avo...
CVE-2025-21761
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:16
- Zuletzt bearbeitet 12.05.2026 13:16:35
In the Linux kernel, the following vulnerability has been resolved: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() ovs_vport_cmd_fill_info() can be called without RTNL or RCU. Use RCU protection and dev_net_rcu() to avoid potential U...
CVE-2025-21762
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:16
- Zuletzt bearbeitet 12.05.2026 13:16:35
In the Linux kernel, the following vulnerability has been resolved: arp: use RCU protection in arp_xmit() arp_xmit() can be called without RTNL or RCU protection. Use RCU protection to avoid potential UAF.
CVE-2025-21763
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:16
- Zuletzt bearbeitet 12.05.2026 13:16:35
In the Linux kernel, the following vulnerability has been resolved: neighbour: use RCU protection in __neigh_notify() __neigh_notify() can be called without RTNL or RCU protection. Use RCU protection to avoid potential UAF.
CVE-2025-21744
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:15
- Zuletzt bearbeitet 12.05.2026 13:16:34
In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() On removal of the device or unloading of the kernel module a potential NULL pointer dereference occurs. The foll...