Логотип exploitDog
bind:"CVE-2025-22097" OR bind:"CVE-2025-38250" OR bind:"CVE-2025-37914" OR bind:"CVE-2025-38380"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-22097" OR bind:"CVE-2025-38250" OR bind:"CVE-2025-37914" OR bind:"CVE-2025-38380"

Количество 64

Количество 64

ubuntu логотип

CVE-2025-38380

3 месяца назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
redhat логотип

CVE-2025-38380

3 месяца назад

No description is available for this CVE.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-38380

3 месяца назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
msrc логотип

CVE-2025-38380

2 месяца назад

i2c/designware: Fix an initialization issue

EPSS: Низкий
ubuntu логотип

CVE-2025-37914

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

EPSS: Низкий
redhat логотип

CVE-2025-37914

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-37914

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

EPSS: Низкий
msrc логотип

CVE-2025-37914

4 месяца назад

net_sched: ets: Fix double list add in class with netem as child qdisc

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2025-37914

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: n ...

EPSS: Низкий
github логотип

GHSA-p8hf-2q7f-w7h9

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: i2c/designware: Fix an initialization issue The i2c_dw_xfer_init() function requires msgs and msg_write_idx from the dev context to be initialized. amd_i2c_dw_xfer_quirk() inits msgs and msgs_num, but not msg_write_idx. This could allow an out of bounds access (of msgs). Initialize msg_write_idx before calling i2c_dw_xfer_init().

EPSS: Низкий
fstec логотип

BDU:2025-09138

4 месяца назад

Уязвимость функции i2c_dw_xfer_init() модуля drivers/i2c/busses/i2c-designware-master.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
EPSS: Низкий
github логотип

GHSA-x88q-4f25-f826

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

EPSS: Низкий
fstec логотип

BDU:2025-11857

6 месяцев назад

Уязвимость компонента sch_ets.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01620-1

6 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02923-1

3 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01964-1

5 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
rocky логотип

RLSA-2025:14510

около 1 месяца назад

Important: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-14510

2 месяца назад

ELSA-2025-14510: kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-14420

2 месяца назад

ELSA-2025-14420: kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03023-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-38380

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

3 месяца назад
redhat логотип
CVE-2025-38380

No description is available for this CVE.

CVSS3: 7
3 месяца назад
nvd логотип
CVE-2025-38380

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

3 месяца назад
msrc логотип
CVE-2025-38380

i2c/designware: Fix an initialization issue

2 месяца назад
ubuntu логотип
CVE-2025-37914

In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

0%
Низкий
6 месяцев назад
redhat логотип
CVE-2025-37914

In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

CVSS3: 7
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-37914

In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

0%
Низкий
6 месяцев назад
msrc логотип
CVE-2025-37914

net_sched: ets: Fix double list add in class with netem as child qdisc

CVSS3: 7
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-37914

In the Linux kernel, the following vulnerability has been resolved: n ...

0%
Низкий
6 месяцев назад
github логотип
GHSA-p8hf-2q7f-w7h9

In the Linux kernel, the following vulnerability has been resolved: i2c/designware: Fix an initialization issue The i2c_dw_xfer_init() function requires msgs and msg_write_idx from the dev context to be initialized. amd_i2c_dw_xfer_quirk() inits msgs and msgs_num, but not msg_write_idx. This could allow an out of bounds access (of msgs). Initialize msg_write_idx before calling i2c_dw_xfer_init().

3 месяца назад
fstec логотип
BDU:2025-09138

Уязвимость функции i2c_dw_xfer_init() модуля drivers/i2c/busses/i2c-designware-master.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
4 месяца назад
github логотип
GHSA-x88q-4f25-f826

In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-11857

Уязвимость компонента sch_ets.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 5.5
0%
Низкий
6 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:01620-1

Security update for the Linux Kernel

6 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02923-1

Security update for the Linux Kernel

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:01964-1

Security update for the Linux Kernel

5 месяцев назад
rocky логотип
RLSA-2025:14510

Important: kernel security update

около 1 месяца назад
oracle-oval логотип
ELSA-2025-14510

ELSA-2025-14510: kernel security update (IMPORTANT)

2 месяца назад
oracle-oval логотип
ELSA-2025-14420

ELSA-2025-14420: kernel security update (IMPORTANT)

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03023-1

Security update for the Linux Kernel

2 месяца назад

Уязвимостей на страницу