Логотип exploitDog
bind:"CVE-2025-37803" OR bind:"CVE-2025-22097" OR bind:"CVE-2025-38350" OR bind:"CVE-2025-38449"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-37803" OR bind:"CVE-2025-22097" OR bind:"CVE-2025-38350" OR bind:"CVE-2025-38449"

Количество 61

Количество 61

oracle-oval логотип

ELSA-2025-15447

21 день назад

ELSA-2025-15447: kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2025-37803

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: udmabuf: fix a buf size overflow issue during udmabuf creation by casting size_limit_mb to u64 when calculate pglimit.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2025-37803

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: udmabuf: fix a buf size overflow issue during udmabuf creation by casting size_limit_mb to u64 when calculate pglimit.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-37803

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: udmabuf: fix a buf size overflow issue during udmabuf creation by casting size_limit_mb to u64 when calculate pglimit.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2025-37803

3 месяца назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2025-37803

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: u ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-42fq-x79v-5vv5

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: udmabuf: fix a buf size overflow issue during udmabuf creation by casting size_limit_mb to u64 when calculate pglimit.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2025-10604

5 месяцев назад

Уязвимость функции size_limit_mb ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2025-15661

20 дней назад

ELSA-2025-15661: kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-15429

22 дня назад

ELSA-2025-15429: kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2025-22097

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2025-22097

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 6.7
EPSS: Низкий
nvd логотип

CVE-2025-22097

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2025-22097

5 месяцев назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2025-22097

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: d ...

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2025-15785

17 дней назад

ELSA-2025-15785: kernel security update (IMPORTANT)

EPSS: Низкий
github логотип

GHSA-5g5j-4w29-mr24

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2025-12092

8 месяцев назад

Уязвимость компонента drivers/gpu/drm/vkms ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01972-1

4 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2025-38449

2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: drm/gem: Acquire references on GEM handles for framebuffers A GEM handle can be released while the GEM buffer object is attached to a DRM framebuffer. This leads to the release of the dma-buf backing the buffer object, if any. [1] Trying to use the framebuffer in further mode-setting operations leads to a segmentation fault. Most easily happens with driver that use shadow planes for vmap-ing the dma-buf during a page flip. An example is shown below. [ 156.791968] ------------[ cut here ]------------ [ 156.796830] WARNING: CPU: 2 PID: 2255 at drivers/dma-buf/dma-buf.c:1527 dma_buf_vmap+0x224/0x430 [...] [ 156.942028] RIP: 0010:dma_buf_vmap+0x224/0x430 [ 157.043420] Call Trace: [ 157.045898] <TASK> [ 157.048030] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.052436] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.056836] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.061253] ? drm_gem_shmem_vmap+0x74/0x710 [ 157.065567] ? dma_...

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2025-15447

ELSA-2025-15447: kernel security update (IMPORTANT)

21 день назад
ubuntu логотип
CVE-2025-37803

In the Linux kernel, the following vulnerability has been resolved: udmabuf: fix a buf size overflow issue during udmabuf creation by casting size_limit_mb to u64 when calculate pglimit.

CVSS3: 7.8
0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-37803

In the Linux kernel, the following vulnerability has been resolved: udmabuf: fix a buf size overflow issue during udmabuf creation by casting size_limit_mb to u64 when calculate pglimit.

CVSS3: 7
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-37803

In the Linux kernel, the following vulnerability has been resolved: udmabuf: fix a buf size overflow issue during udmabuf creation by casting size_limit_mb to u64 when calculate pglimit.

CVSS3: 7.8
0%
Низкий
5 месяцев назад
msrc логотип
CVSS3: 7.8
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-37803

In the Linux kernel, the following vulnerability has been resolved: u ...

CVSS3: 7.8
0%
Низкий
5 месяцев назад
github логотип
GHSA-42fq-x79v-5vv5

In the Linux kernel, the following vulnerability has been resolved: udmabuf: fix a buf size overflow issue during udmabuf creation by casting size_limit_mb to u64 when calculate pglimit.

CVSS3: 7.8
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-10604

Уязвимость функции size_limit_mb ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.8
0%
Низкий
5 месяцев назад
oracle-oval логотип
ELSA-2025-15661

ELSA-2025-15661: kernel security update (IMPORTANT)

20 дней назад
oracle-oval логотип
ELSA-2025-15429

ELSA-2025-15429: kernel security update (IMPORTANT)

22 дня назад
ubuntu логотип
CVE-2025-22097

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 7.8
0%
Низкий
6 месяцев назад
redhat логотип
CVE-2025-22097

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 6.7
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-22097

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 7.8
0%
Низкий
6 месяцев назад
msrc логотип
CVSS3: 7.8
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-22097

In the Linux kernel, the following vulnerability has been resolved: d ...

CVSS3: 7.8
0%
Низкий
6 месяцев назад
oracle-oval логотип
ELSA-2025-15785

ELSA-2025-15785: kernel security update (IMPORTANT)

17 дней назад
github логотип
GHSA-5g5j-4w29-mr24

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS3: 7.8
0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-12092

Уязвимость компонента drivers/gpu/drm/vkms ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.8
0%
Низкий
8 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:01972-1

Security update for the Linux Kernel

4 месяца назад
ubuntu логотип
CVE-2025-38449

In the Linux kernel, the following vulnerability has been resolved: drm/gem: Acquire references on GEM handles for framebuffers A GEM handle can be released while the GEM buffer object is attached to a DRM framebuffer. This leads to the release of the dma-buf backing the buffer object, if any. [1] Trying to use the framebuffer in further mode-setting operations leads to a segmentation fault. Most easily happens with driver that use shadow planes for vmap-ing the dma-buf during a page flip. An example is shown below. [ 156.791968] ------------[ cut here ]------------ [ 156.796830] WARNING: CPU: 2 PID: 2255 at drivers/dma-buf/dma-buf.c:1527 dma_buf_vmap+0x224/0x430 [...] [ 156.942028] RIP: 0010:dma_buf_vmap+0x224/0x430 [ 157.043420] Call Trace: [ 157.045898] <TASK> [ 157.048030] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.052436] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.056836] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.061253] ? drm_gem_shmem_vmap+0x74/0x710 [ 157.065567] ? dma_...

0%
Низкий
2 месяца назад

Уязвимостей на страницу