Логотип exploitDog
bind:CVE-2025-68374
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-68374

Количество 5

Количество 5

ubuntu логотип

CVE-2025-68374

около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: md: fix rcu protection in md_wakeup_thread We attempted to use RCU to protect the pointer 'thread', but directly passed the value when calling md_wakeup_thread(). This means that the RCU pointer has been acquired before rcu_read_lock(), which renders rcu_read_lock() ineffective and could lead to a use-after-free.

EPSS: Низкий
nvd логотип

CVE-2025-68374

около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: md: fix rcu protection in md_wakeup_thread We attempted to use RCU to protect the pointer 'thread', but directly passed the value when calling md_wakeup_thread(). This means that the RCU pointer has been acquired before rcu_read_lock(), which renders rcu_read_lock() ineffective and could lead to a use-after-free.

EPSS: Низкий
msrc логотип

CVE-2025-68374

около 1 месяца назад

md: fix rcu protection in md_wakeup_thread

EPSS: Низкий
debian логотип

CVE-2025-68374

около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: m ...

EPSS: Низкий
github логотип

GHSA-56x5-2pg4-9qq2

около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: md: fix rcu protection in md_wakeup_thread We attempted to use RCU to protect the pointer 'thread', but directly passed the value when calling md_wakeup_thread(). This means that the RCU pointer has been acquired before rcu_read_lock(), which renders rcu_read_lock() ineffective and could lead to a use-after-free.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-68374

In the Linux kernel, the following vulnerability has been resolved: md: fix rcu protection in md_wakeup_thread We attempted to use RCU to protect the pointer 'thread', but directly passed the value when calling md_wakeup_thread(). This means that the RCU pointer has been acquired before rcu_read_lock(), which renders rcu_read_lock() ineffective and could lead to a use-after-free.

0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2025-68374

In the Linux kernel, the following vulnerability has been resolved: md: fix rcu protection in md_wakeup_thread We attempted to use RCU to protect the pointer 'thread', but directly passed the value when calling md_wakeup_thread(). This means that the RCU pointer has been acquired before rcu_read_lock(), which renders rcu_read_lock() ineffective and could lead to a use-after-free.

0%
Низкий
около 1 месяца назад
msrc логотип
CVE-2025-68374

md: fix rcu protection in md_wakeup_thread

0%
Низкий
около 1 месяца назад
debian логотип
CVE-2025-68374

In the Linux kernel, the following vulnerability has been resolved: m ...

0%
Низкий
около 1 месяца назад
github логотип
GHSA-56x5-2pg4-9qq2

In the Linux kernel, the following vulnerability has been resolved: md: fix rcu protection in md_wakeup_thread We attempted to use RCU to protect the pointer 'thread', but directly passed the value when calling md_wakeup_thread(). This means that the RCU pointer has been acquired before rcu_read_lock(), which renders rcu_read_lock() ineffective and could lead to a use-after-free.

0%
Низкий
около 1 месяца назад

Уязвимостей на страницу