Логотип exploitDog
bind:"CVE-2025-22097" OR bind:"CVE-2025-38250" OR bind:"CVE-2025-37914" OR bind:"CVE-2025-38380"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-22097" OR bind:"CVE-2025-38250" OR bind:"CVE-2025-37914" OR bind:"CVE-2025-38380"

Количество 71

Количество 71

fstec логотип

BDU:2025-09577

8 месяцев назад

Уязвимость функции vhci_flush() библиотеки include/linux/skbuff.h компонента Bluetooth ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код, повысить свои привилегии или вызвать отказ в обслуживании

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01627-1

9 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2025-38380

6 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
redhat логотип

CVE-2025-38380

6 месяцев назад

No description is available for this CVE.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-38380

6 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
msrc логотип

CVE-2025-38380

5 месяцев назад

i2c/designware: Fix an initialization issue

EPSS: Низкий
ubuntu логотип

CVE-2025-37914

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2025-37914

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-37914

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2025-37914

7 месяцев назад

net_sched: ets: Fix double list add in class with netem as child qdisc

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2025-37914

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: n ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-x88q-4f25-f826

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-p8hf-2q7f-w7h9

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: i2c/designware: Fix an initialization issue The i2c_dw_xfer_init() function requires msgs and msg_write_idx from the dev context to be initialized. amd_i2c_dw_xfer_quirk() inits msgs and msgs_num, but not msg_write_idx. This could allow an out of bounds access (of msgs). Initialize msg_write_idx before calling i2c_dw_xfer_init().

EPSS: Низкий
fstec логотип

BDU:2025-11857

9 месяцев назад

Уязвимость компонента sch_ets.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2025-09138

7 месяцев назад

Уязвимость функции i2c_dw_xfer_init() модуля drivers/i2c/busses/i2c-designware-master.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01620-1

9 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02923-1

6 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01964-1

8 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
rocky логотип

RLSA-2025:14510

4 месяца назад

Important: kernel security update

EPSS: Низкий
rocky логотип

RLSA-2025:14420

4 месяца назад

Important: kernel security update

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2025-09577

Уязвимость функции vhci_flush() библиотеки include/linux/skbuff.h компонента Bluetooth ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код, повысить свои привилегии или вызвать отказ в обслуживании

CVSS3: 7.8
0%
Низкий
8 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:01627-1

Security update for the Linux Kernel

9 месяцев назад
ubuntu логотип
CVE-2025-38380

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

6 месяцев назад
redhat логотип
CVE-2025-38380

No description is available for this CVE.

CVSS3: 7
6 месяцев назад
nvd логотип
CVE-2025-38380

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

6 месяцев назад
msrc логотип
CVE-2025-38380

i2c/designware: Fix an initialization issue

5 месяцев назад
ubuntu логотип
CVE-2025-37914

In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

CVSS3: 7.8
0%
Низкий
9 месяцев назад
redhat логотип
CVE-2025-37914

In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

CVSS3: 7
0%
Низкий
9 месяцев назад
nvd логотип
CVE-2025-37914

In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

CVSS3: 7.8
0%
Низкий
9 месяцев назад
msrc логотип
CVE-2025-37914

net_sched: ets: Fix double list add in class with netem as child qdisc

CVSS3: 7
0%
Низкий
7 месяцев назад
debian логотип
CVE-2025-37914

In the Linux kernel, the following vulnerability has been resolved: n ...

CVSS3: 7.8
0%
Низкий
9 месяцев назад
github логотип
GHSA-x88q-4f25-f826

In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. In addition to checking for qlen being zero, this patch checks whether the class was already added to the active_list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

CVSS3: 7.8
0%
Низкий
9 месяцев назад
github логотип
GHSA-p8hf-2q7f-w7h9

In the Linux kernel, the following vulnerability has been resolved: i2c/designware: Fix an initialization issue The i2c_dw_xfer_init() function requires msgs and msg_write_idx from the dev context to be initialized. amd_i2c_dw_xfer_quirk() inits msgs and msgs_num, but not msg_write_idx. This could allow an out of bounds access (of msgs). Initialize msg_write_idx before calling i2c_dw_xfer_init().

6 месяцев назад
fstec логотип
BDU:2025-11857

Уязвимость компонента sch_ets.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 5.5
0%
Низкий
9 месяцев назад
fstec логотип
BDU:2025-09138

Уязвимость функции i2c_dw_xfer_init() модуля drivers/i2c/busses/i2c-designware-master.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
7 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:01620-1

Security update for the Linux Kernel

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02923-1

Security update for the Linux Kernel

6 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:01964-1

Security update for the Linux Kernel

8 месяцев назад
rocky логотип
RLSA-2025:14510

Important: kernel security update

4 месяца назад
rocky логотип
RLSA-2025:14420

Important: kernel security update

4 месяца назад

Уязвимостей на страницу