Логотип exploitDog
bind:CVE-2025-37995
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-37995

Количество 19

Количество 19

ubuntu логотип

CVE-2025-37995

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: module: ensure that kobject_put() is safe for module type kobjects In 'lookup_or_create_module_kobject()', an internal kobject is created using 'module_ktype'. So call to 'kobject_put()' on error handling path causes an attempt to use an uninitialized completion pointer in 'module_kobject_release()'. In this scenario, we just want to release kobject without an extra synchronization required for a regular module unloading process, so adding an extra check whether 'complete()' is actually required makes 'kobject_put()' safe.

EPSS: Низкий
redhat логотип

CVE-2025-37995

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: module: ensure that kobject_put() is safe for module type kobjects In 'lookup_or_create_module_kobject()', an internal kobject is created using 'module_ktype'. So call to 'kobject_put()' on error handling path causes an attempt to use an uninitialized completion pointer in 'module_kobject_release()'. In this scenario, we just want to release kobject without an extra synchronization required for a regular module unloading process, so adding an extra check whether 'complete()' is actually required makes 'kobject_put()' safe.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-37995

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: module: ensure that kobject_put() is safe for module type kobjects In 'lookup_or_create_module_kobject()', an internal kobject is created using 'module_ktype'. So call to 'kobject_put()' on error handling path causes an attempt to use an uninitialized completion pointer in 'module_kobject_release()'. In this scenario, we just want to release kobject without an extra synchronization required for a regular module unloading process, so adding an extra check whether 'complete()' is actually required makes 'kobject_put()' safe.

EPSS: Низкий
msrc логотип

CVE-2025-37995

4 месяца назад

module: ensure that kobject_put() is safe for module type kobjects

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2025-37995

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: m ...

EPSS: Низкий
github логотип

GHSA-8q5q-7mvv-w97x

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: module: ensure that kobject_put() is safe for module type kobjects In 'lookup_or_create_module_kobject()', an internal kobject is created using 'module_ktype'. So call to 'kobject_put()' on error handling path causes an attempt to use an uninitialized completion pointer in 'module_kobject_release()'. In this scenario, we just want to release kobject without an extra synchronization required for a regular module unloading process, so adding an extra check whether 'complete()' is actually required makes 'kobject_put()' safe.

EPSS: Низкий
fstec логотип

BDU:2025-12334

6 месяцев назад

Уязвимость ядра операционной системы Linux, связанная с доступом к неинициализированному указателю, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
oracle-oval логотип

ELSA-2025-20521

3 месяца назад

ELSA-2025-20521: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02538-1

3 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02335-1

4 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02249-1

4 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02334-1

4 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20470

4 месяца назад

ELSA-2025-20470: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02333-1

4 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02307-1

4 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02254-1

4 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02923-1

3 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20530

3 месяца назад

ELSA-2025-20530: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20480

4 месяца назад

ELSA-2025-20480: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-37995

In the Linux kernel, the following vulnerability has been resolved: module: ensure that kobject_put() is safe for module type kobjects In 'lookup_or_create_module_kobject()', an internal kobject is created using 'module_ktype'. So call to 'kobject_put()' on error handling path causes an attempt to use an uninitialized completion pointer in 'module_kobject_release()'. In this scenario, we just want to release kobject without an extra synchronization required for a regular module unloading process, so adding an extra check whether 'complete()' is actually required makes 'kobject_put()' safe.

0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-37995

In the Linux kernel, the following vulnerability has been resolved: module: ensure that kobject_put() is safe for module type kobjects In 'lookup_or_create_module_kobject()', an internal kobject is created using 'module_ktype'. So call to 'kobject_put()' on error handling path causes an attempt to use an uninitialized completion pointer in 'module_kobject_release()'. In this scenario, we just want to release kobject without an extra synchronization required for a regular module unloading process, so adding an extra check whether 'complete()' is actually required makes 'kobject_put()' safe.

CVSS3: 7
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-37995

In the Linux kernel, the following vulnerability has been resolved: module: ensure that kobject_put() is safe for module type kobjects In 'lookup_or_create_module_kobject()', an internal kobject is created using 'module_ktype'. So call to 'kobject_put()' on error handling path causes an attempt to use an uninitialized completion pointer in 'module_kobject_release()'. In this scenario, we just want to release kobject without an extra synchronization required for a regular module unloading process, so adding an extra check whether 'complete()' is actually required makes 'kobject_put()' safe.

0%
Низкий
5 месяцев назад
msrc логотип
CVE-2025-37995

module: ensure that kobject_put() is safe for module type kobjects

CVSS3: 7
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-37995

In the Linux kernel, the following vulnerability has been resolved: m ...

0%
Низкий
5 месяцев назад
github логотип
GHSA-8q5q-7mvv-w97x

In the Linux kernel, the following vulnerability has been resolved: module: ensure that kobject_put() is safe for module type kobjects In 'lookup_or_create_module_kobject()', an internal kobject is created using 'module_ktype'. So call to 'kobject_put()' on error handling path causes an attempt to use an uninitialized completion pointer in 'module_kobject_release()'. In this scenario, we just want to release kobject without an extra synchronization required for a regular module unloading process, so adding an extra check whether 'complete()' is actually required makes 'kobject_put()' safe.

0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-12334

Уязвимость ядра операционной системы Linux, связанная с доступом к неинициализированному указателю, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
6 месяцев назад
oracle-oval логотип
ELSA-2025-20521

ELSA-2025-20521: Unbreakable Enterprise kernel security update (IMPORTANT)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02538-1

Security update for the Linux Kernel

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02335-1

Security update for the Linux Kernel

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02249-1

Security update for the Linux Kernel

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02334-1

Security update for the Linux Kernel

4 месяца назад
oracle-oval логотип
ELSA-2025-20470

ELSA-2025-20470: Unbreakable Enterprise kernel security update (IMPORTANT)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02333-1

Security update for the Linux Kernel

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02307-1

Security update for the Linux Kernel

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02254-1

Security update for the Linux Kernel

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02923-1

Security update for the Linux Kernel

3 месяца назад
oracle-oval логотип
ELSA-2025-20530

ELSA-2025-20530: Unbreakable Enterprise kernel security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-20480

ELSA-2025-20480: Unbreakable Enterprise kernel security update (IMPORTANT)

4 месяца назад

Уязвимостей на страницу