Количество 10
Количество 10
CVE-2025-21837
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2025-21837
[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: io_uring/uring_cmd: unconditionally copy SQEs at prep time
CVE-2025-21837
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
GHSA-qm29-hj4p-276m
In the Linux kernel, the following vulnerability has been resolved: io_uring/uring_cmd: unconditionally copy SQEs at prep time This isn't generally necessary, but conditions have been observed where SQE data is accessed from the original SQE after prep has been done and outside of the initial issue. Opcode prep handlers must ensure that any SQE related data is stable beyond the prep phase, but uring_cmd is a bit special in how it handles the SQE which makes it susceptible to reading stale data. If the application has reused the SQE before the original completes, then that can lead to data corruption. Down the line we can relax this again once uring_cmd has been sanitized a bit, and avoid unnecessarily copying the SQE.
ELSA-2025-20095-0
ELSA-2025-20095-0: kernel security update (MODERATE)
RLSA-2025:20095
Moderate: kernel security update
ELSA-2025-20518-0
ELSA-2025-20518-0: kernel security update (MODERATE)
RLSA-2025:20518
Moderate: kernel security update
SUSE-SU-2025:01951-1
Security update for the Linux Kernel
SUSE-SU-2025:01967-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-21837 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 9 месяцев назад | |||
CVE-2025-21837 [REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: io_uring/uring_cmd: unconditionally copy SQEs at prep time | CVSS3: 5.5 | 9 месяцев назад | ||
CVE-2025-21837 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 9 месяцев назад | |||
GHSA-qm29-hj4p-276m In the Linux kernel, the following vulnerability has been resolved: io_uring/uring_cmd: unconditionally copy SQEs at prep time This isn't generally necessary, but conditions have been observed where SQE data is accessed from the original SQE after prep has been done and outside of the initial issue. Opcode prep handlers must ensure that any SQE related data is stable beyond the prep phase, but uring_cmd is a bit special in how it handles the SQE which makes it susceptible to reading stale data. If the application has reused the SQE before the original completes, then that can lead to data corruption. Down the line we can relax this again once uring_cmd has been sanitized a bit, and avoid unnecessarily copying the SQE. | 9 месяцев назад | |||
ELSA-2025-20095-0 ELSA-2025-20095-0: kernel security update (MODERATE) | 19 дней назад | |||
RLSA-2025:20095 Moderate: kernel security update | 16 дней назад | |||
ELSA-2025-20518-0 ELSA-2025-20518-0: kernel security update (MODERATE) | 27 дней назад | |||
RLSA-2025:20518 Moderate: kernel security update | 22 дня назад | |||
SUSE-SU-2025:01951-1 Security update for the Linux Kernel | 6 месяцев назад | |||
SUSE-SU-2025:01967-1 Security update for the Linux Kernel | 6 месяцев назад |
Уязвимостей на страницу