Логотип exploitDog
bind:"CVE-2025-38211" OR bind:"CVE-2025-38332" OR bind:"CVE-2025-38464" OR bind:"CVE-2025-38477"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-38211" OR bind:"CVE-2025-38332" OR bind:"CVE-2025-38464" OR bind:"CVE-2025-38477"

Количество 119

Количество 119

rocky логотип

RLSA-2025:15008

4 месяца назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-15008

4 месяца назад

ELSA-2025-15008: kernel security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2025-38211

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last deref") simplified cm_id resource management by freeing cm_id once all references to the cm_id were removed. The references are removed either upon completion of iw_cm event handlers or when the application destroys the cm_id. This commit introduced the use-after-free condition where cm_id_private object could still be in use by event handler works during the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to destroying CM IDs") addressed this use-after- free by flushing all pending works at the cm_id destruction. However, still another use-after-free possibility remained. It happens with the work objects allocated for each cm_id_priv within alloc_work_entries() during cm_id creation, and subsequently freed in dealloc_work_entries() once all r...

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2025-38211

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last deref") simplified cm_id resource management by freeing cm_id once all references to the cm_id were removed. The references are removed either upon completion of iw_cm event handlers or when the application destroys the cm_id. This commit introduced the use-after-free condition where cm_id_private object could still be in use by event handler works during the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to destroying CM IDs") addressed this use-after- free by flushing all pending works at the cm_id destruction. However, still another use-after-free possibility remained. It happens with the work objects allocated for each cm_id_priv within alloc_work_entries() during cm_id creation, and subsequently freed in dealloc_work_entries() once all r...

CVSS3: 7.3
EPSS: Низкий
nvd логотип

CVE-2025-38211

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last deref") simplified cm_id resource management by freeing cm_id once all references to the cm_id were removed. The references are removed either upon completion of iw_cm event handlers or when the application destroys the cm_id. This commit introduced the use-after-free condition where cm_id_private object could still be in use by event handler works during the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to destroying CM IDs") addressed this use-after- free by flushing all pending works at the cm_id destruction. However, still another use-after-free possibility remained. It happens with the work objects allocated for each cm_id_priv within alloc_work_entries() during cm_id creation, and subsequently freed in dealloc_work_entries() once all r

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2025-38211

5 месяцев назад

RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2025-38211

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: R ...

CVSS3: 7.8
EPSS: Низкий
rocky логотип

RLSA-2025:15011

3 месяца назад

Important: kernel security update

EPSS: Низкий
rocky логотип

RLSA-2025:15005

3 месяца назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-15011

4 месяца назад

ELSA-2025-15011: kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-15005

4 месяца назад

ELSA-2025-15005: kernel security update (MODERATE)

EPSS: Низкий
github логотип

GHSA-wcw7-g3wh-rxf7

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last deref") simplified cm_id resource management by freeing cm_id once all references to the cm_id were removed. The references are removed either upon completion of iw_cm event handlers or when the application destroys the cm_id. This commit introduced the use-after-free condition where cm_id_private object could still be in use by event handler works during the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to destroying CM IDs") addressed this use-after- free by flushing all pending works at the cm_id destruction. However, still another use-after-free possibility remained. It happens with the work objects allocated for each cm_id_priv within alloc_work_entries() during cm_id creation, and subsequently freed in dealloc_work_entries() once al...

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2025-15216

8 месяцев назад

Уязвимость функций EXPORT_SYMBOL(), destroy_cm_id() и cm_work_handler() ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.3
EPSS: Низкий
ubuntu логотип

CVE-2025-38332

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2025-38332

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-38332

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2025-38332

5 месяцев назад

scsi: lpfc: Use memcpy() for BIOS version

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2025-38332

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: s ...

CVSS3: 5.5
EPSS: Низкий
oracle-oval логотип

ELSA-2025-20551

4 месяца назад

ELSA-2025-20551: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
github логотип

GHSA-c38j-rpqw-ch4h

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2025:15008

Moderate: kernel security update

4 месяца назад
oracle-oval логотип
ELSA-2025-15008

ELSA-2025-15008: kernel security update (MODERATE)

4 месяца назад
ubuntu логотип
CVE-2025-38211

In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last deref") simplified cm_id resource management by freeing cm_id once all references to the cm_id were removed. The references are removed either upon completion of iw_cm event handlers or when the application destroys the cm_id. This commit introduced the use-after-free condition where cm_id_private object could still be in use by event handler works during the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to destroying CM IDs") addressed this use-after- free by flushing all pending works at the cm_id destruction. However, still another use-after-free possibility remained. It happens with the work objects allocated for each cm_id_priv within alloc_work_entries() during cm_id creation, and subsequently freed in dealloc_work_entries() once all r...

CVSS3: 7.8
0%
Низкий
6 месяцев назад
redhat логотип
CVE-2025-38211

In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last deref") simplified cm_id resource management by freeing cm_id once all references to the cm_id were removed. The references are removed either upon completion of iw_cm event handlers or when the application destroys the cm_id. This commit introduced the use-after-free condition where cm_id_private object could still be in use by event handler works during the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to destroying CM IDs") addressed this use-after- free by flushing all pending works at the cm_id destruction. However, still another use-after-free possibility remained. It happens with the work objects allocated for each cm_id_priv within alloc_work_entries() during cm_id creation, and subsequently freed in dealloc_work_entries() once all r...

CVSS3: 7.3
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-38211

In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last deref") simplified cm_id resource management by freeing cm_id once all references to the cm_id were removed. The references are removed either upon completion of iw_cm event handlers or when the application destroys the cm_id. This commit introduced the use-after-free condition where cm_id_private object could still be in use by event handler works during the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to destroying CM IDs") addressed this use-after- free by flushing all pending works at the cm_id destruction. However, still another use-after-free possibility remained. It happens with the work objects allocated for each cm_id_priv within alloc_work_entries() during cm_id creation, and subsequently freed in dealloc_work_entries() once all r

CVSS3: 7.8
0%
Низкий
6 месяцев назад
msrc логотип
CVE-2025-38211

RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction

CVSS3: 5.5
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-38211

In the Linux kernel, the following vulnerability has been resolved: R ...

CVSS3: 7.8
0%
Низкий
6 месяцев назад
rocky логотип
RLSA-2025:15011

Important: kernel security update

3 месяца назад
rocky логотип
RLSA-2025:15005

Moderate: kernel security update

3 месяца назад
oracle-oval логотип
ELSA-2025-15011

ELSA-2025-15011: kernel security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-15005

ELSA-2025-15005: kernel security update (MODERATE)

4 месяца назад
github логотип
GHSA-wcw7-g3wh-rxf7

In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last deref") simplified cm_id resource management by freeing cm_id once all references to the cm_id were removed. The references are removed either upon completion of iw_cm event handlers or when the application destroys the cm_id. This commit introduced the use-after-free condition where cm_id_private object could still be in use by event handler works during the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to destroying CM IDs") addressed this use-after- free by flushing all pending works at the cm_id destruction. However, still another use-after-free possibility remained. It happens with the work objects allocated for each cm_id_priv within alloc_work_entries() during cm_id creation, and subsequently freed in dealloc_work_entries() once al...

CVSS3: 7.8
0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-15216

Уязвимость функций EXPORT_SYMBOL(), destroy_cm_id() и cm_work_handler() ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.3
0%
Низкий
8 месяцев назад
ubuntu логотип
CVE-2025-38332

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

CVSS3: 5.5
0%
Низкий
6 месяцев назад
redhat логотип
CVE-2025-38332

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

CVSS3: 7
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-38332

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

CVSS3: 5.5
0%
Низкий
6 месяцев назад
msrc логотип
CVE-2025-38332

scsi: lpfc: Use memcpy() for BIOS version

CVSS3: 7.8
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-38332

In the Linux kernel, the following vulnerability has been resolved: s ...

CVSS3: 5.5
0%
Низкий
6 месяцев назад
oracle-oval логотип
ELSA-2025-20551

ELSA-2025-20551: Unbreakable Enterprise kernel security update (IMPORTANT)

4 месяца назад
github логотип
GHSA-c38j-rpqw-ch4h

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

CVSS3: 5.5
0%
Низкий
6 месяцев назад

Уязвимостей на страницу