CVE-2025-21648 – “Linux Netfilter Conntrack INT_MAXHashtable Vulnerability”
The following table lists the changes that have been made to the CVE-2025-21648 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Jan. 19, 2025 Action […]
CVE-2025-21647 – Linux Kernel sch_cake Out-of-Bounds Memory Access Vulnerability
In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: add bounds checks to host bulk flow fairness counts Even though we fixed a logic error in the commit cited below, syzbot still managed to trigger an underflow of the per-host bulk flow counters, leading to an out of bounds memory access. To […]
CVE-2025-21642 – Microsoft Windows MPTCP Linux Kernel NetSysctl Use After Free Vulnerability
In the Linux kernel, the following vulnerability has been resolved: mptcp: sysctl: sched: avoid using current->nsproxy Using the ‘net’ structure via ‘current’ is not recommended for different reasons. First, if the goal is to use it to read or write per-netns data, this is inconsistent with how the “generic” sysctl entries are doing: directly by […]
CVE-2025-21635 – “Linux RDS rds_tcp buffer NULL Pointer Dereference”
In the Linux kernel, the following vulnerability has been resolved: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy As mentioned in a previous commit of this series, using the ‘net’ structure via ‘current’ is not recommended for different reasons: – Inconsistency: getting info from the reader’s/writer’s netns vs only from the opener’s netns. – current->nsproxy can be […]
CVE-2025-21644 – “Intel Xeon DRM GuC Firmware Wedge Null Pointer Dereference Vulnerability”
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix tlb invalidation when wedging If GuC fails to load, the driver wedges, but in the process it tries to do stuff that may not be initialized yet. This moves the xe_gt_tlb_invalidation_init() to be done earlier: as its own doc says, it’s a software-only […]
CVE-2025-21643 – “CIFS Netfs Linux Kernel Async DIO Handling Vulnerability”
The following table lists the changes that have been made to the CVE-2025-21643 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Jan. 19, 2025 Action […]
CVE-2025-21641 – Linux Kernel MPTCP Sysctl Blackhole Timeout Use-After-Free Vulnerability
In the Linux kernel, the following vulnerability has been resolved: mptcp: sysctl: blackhole timeout: avoid using current->nsproxy As mentioned in the previous commit, using the ‘net’ structure via ‘current’ is not recommended for different reasons: – Inconsistency: getting info from the reader’s/writer’s netns vs only from the opener’s netns. – current->nsproxy can be NULL in […]
CVE-2025-21640 – Apache Linux Kernel SCTP Null Pointer Dereference Vulnerability
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy As mentioned in a previous commit of this series, using the ‘net’ structure via ‘current’ is not recommended for different reasons: – Inconsistency: getting info from the reader’s/writer’s netns vs only from the opener’s netns. – current->nsproxy can be […]
CVE-2025-21639 – Linux Kernel SCTP – Use Of Null Pointer Dereference Vulnerability
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: rto_min/max: avoid using current->nsproxy As mentioned in a previous commit of this series, using the ‘net’ structure via ‘current’ is not recommended for different reasons: – Inconsistency: getting info from the reader’s/writer’s netns vs only from the opener’s netns. – current->nsproxy can be […]
CVE-2025-21638 – Linux SCTP sysctl auth enables NULL Pointer Dereference
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: auth_enable: avoid using current->nsproxy As mentioned in a previous commit of this series, using the ‘net’ structure via ‘current’ is not recommended for different reasons: – Inconsistency: getting info from the reader’s/writer’s netns vs only from the opener’s netns. – current->nsproxy can be […]