CVE-2025-21640
- EPSS 0.03%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 12.05.2026 13:16:30
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for differe...
CVE-2025-21642
- EPSS 0.02%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 01.10.2025 20:18:16
In the Linux kernel, the following vulnerability has been resolved: mptcp: sysctl: sched: avoid using current->nsproxy Using the 'net' structure via 'current' is not recommended for different reasons. First, if the goal is to use it to read or wri...
CVE-2025-21643
- EPSS 0.02%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 16.10.2025 19:17:07
In the Linux kernel, the following vulnerability has been resolved: netfs: Fix kernel async DIO Netfslib needs to be able to handle kernel-initiated asynchronous DIO that is supplied with a bio_vec[] array. Currently, because of the async flag, th...
CVE-2025-21632
- EPSS 0.02%
- Veröffentlicht 19.01.2025 11:15:08
- Zuletzt bearbeitet 24.09.2025 16:36:25
In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Ensure shadow stack is active before "getting" registers The x86 shadow stack support has its own set of registers. Those registers are XSAVE-managed, but they are "superv...
CVE-2025-21634
- EPSS 0.02%
- Veröffentlicht 19.01.2025 11:15:08
- Zuletzt bearbeitet 01.10.2025 20:18:14
In the Linux kernel, the following vulnerability has been resolved: cgroup/cpuset: remove kernfs active break A warning was found: WARNING: CPU: 10 PID: 3486953 at fs/kernfs/file.c:828 CPU: 10 PID: 3486953 Comm: rmdir Kdump: loaded Tainted: G RIP:...
CVE-2025-21631
- EPSS 0.02%
- Veröffentlicht 19.01.2025 11:15:07
- Zuletzt bearbeitet 03.11.2025 21:18:59
In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() Our syzkaller report a following UAF for v6.6: BUG: KASAN: slab-use-after-free in bfq_init_rq+0x175d/0x17a0 block/bfq-iosched...
CVE-2024-57895
- EPSS 0.03%
- Veröffentlicht 15.01.2025 13:15:14
- Zuletzt bearbeitet 06.04.2026 14:01:29
In the Linux kernel, the following vulnerability has been resolved: ksmbd: set ATTR_CTIME flags when setting mtime David reported that the new warning from setattr_copy_mgtime is coming like the following. [ 113.215316] ------------[ cut here ]--...
CVE-2024-57896
- EPSS 0.02%
- Veröffentlicht 15.01.2025 13:15:14
- Zuletzt bearbeitet 03.11.2025 21:18:39
In the Linux kernel, the following vulnerability has been resolved: btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount During the unmount path, at close_ctree(), we first stop the cleaner kthread, using kthread_stop(...
CVE-2024-57897
- EPSS 0.01%
- Veröffentlicht 15.01.2025 13:15:14
- Zuletzt bearbeitet 03.11.2025 21:18:39
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Correct the migration DMA map direction The SVM DMA device map direction should be set the same as the DMA unmap setting, otherwise the DMA core will report the followi...
CVE-2024-57898
- EPSS 0.03%
- Veröffentlicht 15.01.2025 13:15:14
- Zuletzt bearbeitet 17.10.2025 16:11:24
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: clear link ID from bitmap during link delete after clean up Currently, during link deletion, the link ID is first removed from the valid_links bitmap before perform...