5.5

CVSS3.1

CVE-2025-21639 - sctp: sysctl: rto_min/max: avoid using current->nsproxy

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: rto_min/max: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the r…

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:18 p.m.

5.5

CVSS3.1

CVE-2025-21634 - cgroup/cpuset: remove kernfs active break

In the Linux kernel, the following vulnerability has been resolved: cgroup/cpuset: remove kernfs active break A warning was found: WARNING: CPU: 10 PID: 3486953 at fs/kernfs/file.c:828 CPU: 10 PID: 3486953 Comm: rmdir Kdump: loaded Tainted: G RIP: 0010:kernfs_should_drain_open_files+0x1a1/0x1b0 …

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Oct. 1, 2025, 8:18 p.m.

7.8

CVSS3.1

CVE-2025-21631 - block, bfq: fix waker_bfqq UAF after bfq_split_bfqq()

In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() Our syzkaller report a following UAF for v6.6: BUG: KASAN: slab-use-after-free in bfq_init_rq+0x175d/0x17a0 block/bfq-iosched.c:6958 Read of size 8 at addr ffff8881b57147d8 b…

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:18 p.m.

5.5

CVSS3.1

CVE-2025-21637 - sctp: sysctl: udp_port: avoid using current->nsproxy

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: udp_port: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the read…

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:18 p.m.

5.5

CVSS3.1

CVE-2025-21636 - sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info…

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:18 p.m.

7.1

CVSS3.1

CVE-2024-57911 - iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer

In the Linux kernel, the following vulnerability has been resolved: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer The 'data' array is allocated via kmalloc() and it is used to push data to user space from a triggered buffer, but it does not set values for inactive …

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:18 p.m.

7.8

CVSS3.1

CVE-2024-57904 - iio: adc: at91: call input_free_device() on allocated iio_dev

In the Linux kernel, the following vulnerability has been resolved: iio: adc: at91: call input_free_device() on allocated iio_dev Current implementation of at91_ts_register() calls input_free_deivce() on st->ts_input, however, the err label can be reached before the allocated iio_dev is stored to…

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:18 p.m.

4.7

CVSS3.1

CVE-2024-57913 - usb: gadget: f_fs: Remove WARN_ON in functionfs_bind

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Remove WARN_ON in functionfs_bind This commit addresses an issue related to below kernel panic where panic_on_warn is enabled. It is caused by the unnecessary use of WARN_ON in functionsfs_bind, which easily le…

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:18 p.m.

5.5

CVSS3.1

CVE-2025-21632 - x86/fpu: Ensure shadow stack is active before "getting" registers

In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Ensure shadow stack is active before "getting" registers The x86 shadow stack support has its own set of registers. Those registers are XSAVE-managed, but they are "supervisor state components" which means that userspace…

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Sept. 24, 2025, 4:36 p.m.

5.5

CVSS3.1

CVE-2024-57923 - btrfs: zlib: fix avail_in bytes for s390 zlib HW compression path

In the Linux kernel, the following vulnerability has been resolved: btrfs: zlib: fix avail_in bytes for s390 zlib HW compression path Since the input data length passed to zlib_compress_folios() can be arbitrary, always setting strm.avail_in to a multiple of PAGE_SIZE may cause read-in bytes to e…

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Sept. 26, 2025, 7:49 p.m.
Total resulsts: 349182
Page 7047 of 34,919
Β« previous page Β» next page
Filters