Логотип exploitDog
bind:"CVE-2025-38211" OR bind:"CVE-2025-38477" OR bind:"CVE-2025-38464" OR bind:"CVE-2025-38332"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-38211" OR bind:"CVE-2025-38477" OR bind:"CVE-2025-38464" OR bind:"CVE-2025-38332"

Количество 112

Количество 112

suse-cvrf логотип

SUSE-SU-2025:02996-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02969-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02853-1

3 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03583-1

23 дня назад

Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03576-1

24 дня назад

Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03568-1

24 дня назад

Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03562-1

24 дня назад

Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03552-1

25 дней назад

Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03550-1

25 дней назад

Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03497-1

28 дней назад

Security update for the Linux Kernel (Live Patch 69 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03485-1

28 дней назад

Security update for the Linux Kernel (Live Patch 70 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03479-1

28 дней назад

Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03473-1

29 дней назад

Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP6)

EPSS: Низкий
github логотип

GHSA-79vc-v8qm-8x53

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats.

EPSS: Низкий
fstec логотип

BDU:2025-09177

4 месяца назад

Уязвимость функции qfq_aggregate() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02997-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03011-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2025-38332

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

EPSS: Низкий
redhat логотип

CVE-2025-38332

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-38332

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2025:02996-1

Security update for the Linux Kernel

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02969-1

Security update for the Linux Kernel

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02853-1

Security update for the Linux Kernel

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03583-1

Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3)

0%
Низкий
23 дня назад
suse-cvrf логотип
SUSE-SU-2025:03576-1

Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP7)

0%
Низкий
24 дня назад
suse-cvrf логотип
SUSE-SU-2025:03568-1

Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6)

0%
Низкий
24 дня назад
suse-cvrf логотип
SUSE-SU-2025:03562-1

Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP5)

0%
Низкий
24 дня назад
suse-cvrf логотип
SUSE-SU-2025:03552-1

Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP4)

0%
Низкий
25 дней назад
suse-cvrf логотип
SUSE-SU-2025:03550-1

Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP4)

0%
Низкий
25 дней назад
suse-cvrf логотип
SUSE-SU-2025:03497-1

Security update for the Linux Kernel (Live Patch 69 for SLE 12 SP5)

0%
Низкий
28 дней назад
suse-cvrf логотип
SUSE-SU-2025:03485-1

Security update for the Linux Kernel (Live Patch 70 for SLE 12 SP5)

0%
Низкий
28 дней назад
suse-cvrf логотип
SUSE-SU-2025:03479-1

Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP7)

0%
Низкий
28 дней назад
suse-cvrf логотип
SUSE-SU-2025:03473-1

Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP6)

0%
Низкий
29 дней назад
github логотип
GHSA-79vc-v8qm-8x53

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats.

0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-09177

Уязвимость функции qfq_aggregate() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
0%
Низкий
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02997-1

Security update for the Linux Kernel

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03011-1

Security update for the Linux Kernel

2 месяца назад
ubuntu логотип
CVE-2025-38332

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-38332

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

CVSS3: 7
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-38332

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

0%
Низкий
4 месяца назад

Уязвимостей на страницу