Логотип exploitDog
bind:"CVE-2025-22097" OR bind:"CVE-2025-38332" OR bind:"CVE-2025-38352" OR bind:"CVE-2025-38449"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-22097" OR bind:"CVE-2025-38332" OR bind:"CVE-2025-38352" OR bind:"CVE-2025-38449"

Количество 72

Количество 72

rocky логотип

RLSA-2025:15661

2 месяца назад

Important: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-15661

3 месяца назад

ELSA-2025-15661: kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-15447

3 месяца назад

ELSA-2025-15447: kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2025-22097

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2025-22097

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 6.7
EPSS: Низкий
nvd логотип

CVE-2025-22097

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2025-22097

8 месяцев назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2025-22097

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: d ...

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2025-15648

3 месяца назад

ELSA-2025-15648: kernel security update (IMPORTANT)

EPSS: Низкий
github логотип

GHSA-5g5j-4w29-mr24

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2025-12092

10 месяцев назад

Уязвимость компонента drivers/gpu/drm/vkms ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2025-38332

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

EPSS: Низкий
redhat логотип

CVE-2025-38332

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-38332

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

EPSS: Низкий
msrc логотип

CVE-2025-38332

5 месяцев назад

scsi: lpfc: Use memcpy() for BIOS version

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2025-38332

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: s ...

EPSS: Низкий
oracle-oval логотип

ELSA-2025-13960

4 месяца назад

ELSA-2025-13960: kernel security update (IMPORTANT)

EPSS: Низкий
github логотип

GHSA-c38j-rpqw-ch4h

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

EPSS: Низкий
fstec логотип

BDU:2025-10743

5 месяцев назад

Уязвимость функции memcpy ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01627-1

7 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2025:15661

Important: kernel security update

2 месяца назад
oracle-oval логотип
ELSA-2025-15661

ELSA-2025-15661: kernel security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-15447

ELSA-2025-15447: kernel security update (IMPORTANT)

3 месяца назад
ubuntu логотип
CVE-2025-22097

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 7.8
0%
Низкий
8 месяцев назад
redhat логотип
CVE-2025-22097

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 6.7
0%
Низкий
8 месяцев назад
nvd логотип
CVE-2025-22097

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 7.8
0%
Низкий
8 месяцев назад
msrc логотип
CVSS3: 7.8
0%
Низкий
8 месяцев назад
debian логотип
CVE-2025-22097

In the Linux kernel, the following vulnerability has been resolved: d ...

CVSS3: 7.8
0%
Низкий
8 месяцев назад
oracle-oval логотип
ELSA-2025-15648

ELSA-2025-15648: kernel security update (IMPORTANT)

3 месяца назад
github логотип
GHSA-5g5j-4w29-mr24

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 7.8
0%
Низкий
8 месяцев назад
fstec логотип
BDU:2025-12092

Уязвимость компонента drivers/gpu/drm/vkms ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.8
0%
Низкий
10 месяцев назад
ubuntu логотип
CVE-2025-38332

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-38332

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

CVSS3: 7
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-38332

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

0%
Низкий
5 месяцев назад
msrc логотип
CVE-2025-38332

scsi: lpfc: Use memcpy() for BIOS version

CVSS3: 7.8
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-38332

In the Linux kernel, the following vulnerability has been resolved: s ...

0%
Низкий
5 месяцев назад
oracle-oval логотип
ELSA-2025-13960

ELSA-2025-13960: kernel security update (IMPORTANT)

4 месяца назад
github логотип
GHSA-c38j-rpqw-ch4h

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-10743

Уязвимость функции memcpy ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8
0%
Низкий
5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:01627-1

Security update for the Linux Kernel

7 месяцев назад

Уязвимостей на страницу