Логотип exploitDog
bind:"BDU:2025-09246" OR bind:"CVE-2025-38369"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2025-09246" OR bind:"CVE-2025-38369"

Количество 19

Количество 19

fstec логотип

BDU:2025-09246

9 месяцев назад

Уязвимость модуля drivers/dma/idxd/cdev.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
EPSS: Низкий
ubuntu логотип

CVE-2025-38369

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using Running IDXD workloads in a container with the /dev directory mounted can trigger a call trace or even a kernel panic when the parent process of the container is terminated. This issue occurs because, under certain configurations, Docker does not properly propagate the mount replica back to the original mount point. In this case, when the user driver detaches, the WQ is destroyed but it still calls destroy_workqueue() attempting to completes all pending work. It's necessary to check wq->wq and skip the drain if it no longer exists.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2025-38369

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using Running IDXD workloads in a container with the /dev directory mounted can trigger a call trace or even a kernel panic when the parent process of the container is terminated. This issue occurs because, under certain configurations, Docker does not properly propagate the mount replica back to the original mount point. In this case, when the user driver detaches, the WQ is destroyed but it still calls destroy_workqueue() attempting to completes all pending work. It's necessary to check wq->wq and skip the drain if it no longer exists.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2025-38369

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using Running IDXD workloads in a container with the /dev directory mounted can trigger a call trace or even a kernel panic when the parent process of the container is terminated. This issue occurs because, under certain configurations, Docker does not properly propagate the mount replica back to the original mount point. In this case, when the user driver detaches, the WQ is destroyed but it still calls destroy_workqueue() attempting to completes all pending work. It's necessary to check wq->wq and skip the drain if it no longer exists.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2025-38369

6 месяцев назад

dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2025-38369

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: d ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-q6ch-8cp2-xfhp

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using Running IDXD workloads in a container with the /dev directory mounted can trigger a call trace or even a kernel panic when the parent process of the container is terminated. This issue occurs because, under certain configurations, Docker does not properly propagate the mount replica back to the original mount point. In this case, when the user driver detaches, the WQ is destroyed but it still calls destroy_workqueue() attempting to completes all pending work. It's necessary to check wq->wq and skip the drain if it no longer exists.

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2025-20095-0

2 месяца назад

ELSA-2025-20095-0: kernel security update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2025:20095

2 месяца назад

Moderate: kernel security update

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03023-1

5 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02996-1

5 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02969-1

5 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02853-1

6 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02997-1

5 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03011-1

5 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20551

5 месяцев назад

ELSA-2025-20551: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02923-1

6 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025:20081-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025-20011-1

3 месяца назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2025-09246

Уязвимость модуля drivers/dma/idxd/cdev.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7
0%
Низкий
9 месяцев назад
ubuntu логотип
CVE-2025-38369

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using Running IDXD workloads in a container with the /dev directory mounted can trigger a call trace or even a kernel panic when the parent process of the container is terminated. This issue occurs because, under certain configurations, Docker does not properly propagate the mount replica back to the original mount point. In this case, when the user driver detaches, the WQ is destroyed but it still calls destroy_workqueue() attempting to completes all pending work. It's necessary to check wq->wq and skip the drain if it no longer exists.

CVSS3: 7.8
0%
Низкий
6 месяцев назад
redhat логотип
CVE-2025-38369

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using Running IDXD workloads in a container with the /dev directory mounted can trigger a call trace or even a kernel panic when the parent process of the container is terminated. This issue occurs because, under certain configurations, Docker does not properly propagate the mount replica back to the original mount point. In this case, when the user driver detaches, the WQ is destroyed but it still calls destroy_workqueue() attempting to completes all pending work. It's necessary to check wq->wq and skip the drain if it no longer exists.

CVSS3: 5.5
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-38369

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using Running IDXD workloads in a container with the /dev directory mounted can trigger a call trace or even a kernel panic when the parent process of the container is terminated. This issue occurs because, under certain configurations, Docker does not properly propagate the mount replica back to the original mount point. In this case, when the user driver detaches, the WQ is destroyed but it still calls destroy_workqueue() attempting to completes all pending work. It's necessary to check wq->wq and skip the drain if it no longer exists.

CVSS3: 7.8
0%
Низкий
6 месяцев назад
msrc логотип
CVE-2025-38369

dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using

CVSS3: 5.5
0%
Низкий
6 месяцев назад
debian логотип
CVE-2025-38369

In the Linux kernel, the following vulnerability has been resolved: d ...

CVSS3: 7.8
0%
Низкий
6 месяцев назад
github логотип
GHSA-q6ch-8cp2-xfhp

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using Running IDXD workloads in a container with the /dev directory mounted can trigger a call trace or even a kernel panic when the parent process of the container is terminated. This issue occurs because, under certain configurations, Docker does not properly propagate the mount replica back to the original mount point. In this case, when the user driver detaches, the WQ is destroyed but it still calls destroy_workqueue() attempting to completes all pending work. It's necessary to check wq->wq and skip the drain if it no longer exists.

CVSS3: 7.8
0%
Низкий
6 месяцев назад
oracle-oval логотип
ELSA-2025-20095-0

ELSA-2025-20095-0: kernel security update (MODERATE)

2 месяца назад
rocky логотип
RLSA-2025:20095

Moderate: kernel security update

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03023-1

Security update for the Linux Kernel

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02996-1

Security update for the Linux Kernel

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02969-1

Security update for the Linux Kernel

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02853-1

Security update for the Linux Kernel

6 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02997-1

Security update for the Linux Kernel

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03011-1

Security update for the Linux Kernel

5 месяцев назад
oracle-oval логотип
ELSA-2025-20551

ELSA-2025-20551: Unbreakable Enterprise kernel security update (IMPORTANT)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02923-1

Security update for the Linux Kernel

6 месяцев назад
suse-cvrf логотип
openSUSE-SU-2025:20081-1

Security update for the Linux Kernel

2 месяца назад
suse-cvrf логотип
openSUSE-SU-2025-20011-1

Security update for the Linux Kernel

3 месяца назад

Уязвимостей на страницу