5.5

CVSS3.1

CVE-2025-21891 - ipvlan: ensure network headers are in skb linear part

In the Linux kernel, the following vulnerability has been resolved: ipvlan: ensure network headers are in skb linear part syzbot found that ipvlan_process_v6_outbound() was assuming the IPv6 network header isis present in skb->head [1] Add the needed pskb_network_may_pull() calls for both IPv4 a…

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 8:17 p.m.

9.8

CVSS3.1

CVE-2025-25686 -

semcms <=5.0 is vulnerable to SQL Injection in SEMCMS_Fuction.php.

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: April 11, 2025, 5:34 p.m.

7.8

CVSS3.1

CVE-2025-21887 - ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up

In the Linux kernel, the following vulnerability has been resolved: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up The issue was caused by dput(upper) being called before ovl_dentry_update_reval(), while upper->d_flags was still accessed in ovl_dentry_remote(). Move dput…

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: Dec. 6, 2025, 10:15 p.m.

5.5

CVSS3.1

CVE-2025-21885 - RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers

In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers While using nvme target with use_srq on, below kernel panic is noticed. [ 549.698111] bnxt_en 0000:41:00.0 enp65s0np0: FEC autoneg off encoding: Clause …

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: Oct. 29, 2025, 4:52 p.m.

5.5

CVSS3.1

CVE-2025-21874 - dm-integrity: Avoid divide by zero in table status in Inline mode

In the Linux kernel, the following vulnerability has been resolved: dm-integrity: Avoid divide by zero in table status in Inline mode In Inline mode, the journal is unused, and journal_sectors is zero. Calculating the journal watermark requires dividing by journal_sectors, which should be done o…

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: Oct. 30, 2025, 4:12 p.m.

5.5

CVSS3.1

CVE-2025-21873 - scsi: ufs: core: bsg: Fix crash when arpmb command fails

In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: bsg: Fix crash when arpmb command fails If the device doesn't support arpmb we'll crash due to copying user data in bsg_transport_sg_io_fn(). In the case where ufs_bsg_exec_advanced_rpmb_req() returns an error, …

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: Oct. 30, 2025, 4:19 p.m.

7.8

CVSS3.1

CVE-2025-21867 - bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()

In the Linux kernel, the following vulnerability has been resolved: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() KMSAN reported a use-after-free issue in eth_skb_pkt_type()[1]. The cause of the issue was that eth_skb_pkt_type() accessed skb's data that didn't contain an Ethernet …

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 8:17 p.m.

5.5

CVSS3.1

CVE-2023-53033 - netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits If the offset + length goes over the ethernet + vlan header, then the length is adjusted to copy the bytes that are within the boundaries of the vlan_et…

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: Oct. 31, 2025, 6:49 p.m.

5.5

CVSS3.1

CVE-2023-53026 - RDMA/core: Fix ib block iterator counter overflow

In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix ib block iterator counter overflow When registering a new DMA MR after selecting the best aligned page size for it, we iterate over the given sglist to split each entry to smaller, aligned to the selected page size…

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: Oct. 1, 2025, 6:15 p.m.

7.8

CVSS3.1

CVE-2023-53019 - net: mdio: validate parameter addr in mdiobus_get_phy()

In the Linux kernel, the following vulnerability has been resolved: net: mdio: validate parameter addr in mdiobus_get_phy() The caller may pass any value as addr, what may result in an out-of-bounds access to array mdio_map. One existing case is stmmac_init_phy() that may pass -1 as addr. Therefo…

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: Oct. 30, 2025, 4:20 p.m.
Total resulsts: 346616
Page 5939 of 34,662
Β« previous page Β» next page
Filters