7.8

CVSS3.1

CVE-2025-21652 - ipvlan: Fix use-after-free in ipvlan_get_iflink().

In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix use-after-free in ipvlan_get_iflink(). syzbot presented an use-after-free report [0] regarding ipvlan and linkwatch. ipvlan does not hold a refcnt of the lower device unlike vlan and macvlan. If the linkwatch work i…

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: May 4, 2025, 7:18 a.m.

4.7

CVSS3.1

CVE-2025-21651 - net: hns3: don't auto enable misc vector

In the Linux kernel, the following vulnerability has been resolved: net: hns3: don't auto enable misc vector Currently, there is a time window between misc irq enabled and service task inited. If an interrupte is reported at this time, it will cause warning like below: [ 16.324639] Call trace:…

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Oct. 16, 2025, 7:22 p.m.

7.8

CVSS3.1

CVE-2025-21650 - net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue

In the Linux kernel, the following vulnerability has been resolved: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue The TQP BAR space is divided into two segments. TQPs 0-1023 and TQPs 1024-1279 are in different BAR space addresses. However, hclge_fetch_pf_reg does not …

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Oct. 1, 2025, 8:18 p.m.

5.5

CVSS3.1

CVE-2025-21646 - afs: Fix the maximum cell name length

In the Linux kernel, the following vulnerability has been resolved: afs: Fix the maximum cell name length The kafs filesystem limits the maximum length of a cell to 256 bytes, but a problem occurs if someone actually does that: kafs tries to create a directory under /proc/net/afs/ with the name o…

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:19 p.m.

5.5

CVSS3.1

CVE-2025-21648 - netfilter: conntrack: clamp maximum hashtable size to INT_MAX

In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: clamp maximum hashtable size to INT_MAX Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when resizing hashtable because __GF…

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:19 p.m.

5.5

CVSS3.1

CVE-2025-21643 - netfs: Fix kernel async DIO

In the Linux kernel, the following vulnerability has been resolved: netfs: Fix kernel async DIO Netfslib needs to be able to handle kernel-initiated asynchronous DIO that is supplied with a bio_vec[] array. Currently, because of the async flag, this gets passed to netfs_extract_user_iter() which…

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Oct. 16, 2025, 7:17 p.m.

5.5

CVSS3.1

CVE-2025-21641 - mptcp: sysctl: blackhole timeout: avoid using current->nsproxy

In the Linux kernel, the following vulnerability has been resolved: mptcp: sysctl: blackhole timeout: avoid using current->nsproxy As mentioned in the previous commit, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the reader'…

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Oct. 1, 2025, 8:18 p.m.

5.5

CVSS3.1

CVE-2025-21640 - sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from t…

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:19 p.m.

5.5

CVSS3.1

CVE-2025-21638 - sctp: sysctl: auth_enable: avoid using current->nsproxy

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: auth_enable: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the r…

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:18 p.m.

5.5

CVSS3.1

CVE-2025-21635 - rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy

In the Linux kernel, the following vulnerability has been resolved: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info fr…

πŸ“… Published: Jan. 19, 2025, midnight πŸ”„ Last Modified: Oct. 1, 2025, 8:18 p.m.
Total resulsts: 349182
Page 7049 of 34,919
Β« previous page Β» next page
Filters