CVE-2025-21649
- EPSS 0.02%
- Veröffentlicht 19.01.2025 11:15:10
- Zuletzt bearbeitet 01.10.2025 20:18:16
In the Linux kernel, the following vulnerability has been resolved: net: hns3: fix kernel crash when 1588 is sent on HIP08 devices Currently, HIP08 devices does not register the ptp devices, so the hdev->ptp is NULL. But the tx process would still ...
CVE-2025-21650
- EPSS 0.03%
- Veröffentlicht 19.01.2025 11:15:10
- Zuletzt bearbeitet 01.10.2025 20:18:16
In the Linux kernel, the following vulnerability has been resolved: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue The TQP BAR space is divided into two segments. TQPs 0-1023 and TQPs 1024-1279 are in different BAR space...
CVE-2025-21651
- EPSS 0.02%
- Veröffentlicht 19.01.2025 11:15:10
- Zuletzt bearbeitet 16.10.2025 19:22:28
In the Linux kernel, the following vulnerability has been resolved: net: hns3: don't auto enable misc vector Currently, there is a time window between misc irq enabled and service task inited. If an interrupte is reported at this time, it will caus...
CVE-2025-21652
- EPSS 0.02%
- Veröffentlicht 19.01.2025 11:15:10
- Zuletzt bearbeitet 10.02.2025 18:15:34
In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix use-after-free in ipvlan_get_iflink(). syzbot presented an use-after-free report [0] regarding ipvlan and linkwatch. ipvlan does not hold a refcnt of the lower device ...
CVE-2025-21653
- EPSS 0.03%
- Veröffentlicht 19.01.2025 11:15:10
- Zuletzt bearbeitet 12.05.2026 13:16:30
In the Linux kernel, the following vulnerability has been resolved: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute syzbot found that TCA_FLOW_RSHIFT attribute was not validated. Right shitfing a 32bit integer is undefined for large shift v...
CVE-2025-21635
- EPSS 0.02%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 01.10.2025 20:18:15
In the Linux kernel, the following vulnerability has been resolved: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for dif...
CVE-2025-21636
- EPSS 0.02%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 03.11.2025 21:18:59
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for ...
CVE-2025-21637
- EPSS 0.02%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 03.11.2025 21:18:59
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: udp_port: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reas...
CVE-2025-21638
- EPSS 0.03%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 12.05.2026 13:16:29
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: auth_enable: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different r...
CVE-2025-21639
- EPSS 0.03%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 12.05.2026 13:16:30
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: rto_min/max: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different r...