CVE-2025-21637 – Linux Kernel SCTP sysctl null pointer dereference vulnerability
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: udp_port: avoid using current->nsproxy As mentioned in a previous commit of this series, using the ‘net’ structure via ‘current’ is not recommended for different reasons: – Inconsistency: getting info from the reader’s/writer’s netns vs only from the opener’s netns. – current->nsproxy can be […]
CVE-2025-21636 – Linux Kernel SCTP sysctl NULL Pointer Dereference Vulnerability
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy As mentioned in a previous commit of this series, using the ‘net’ structure via ‘current’ is not recommended for different reasons: – Inconsistency: getting info from the reader’s/writer’s netns vs only from the opener’s netns. – current->nsproxy can be […]
CVE-2025-21634 – Linux kernel cgroup/cpuset kernelfs active break Vuln
In the Linux kernel, the following vulnerability has been resolved: cgroup/cpuset: remove kernfs active break A warning was found: WARNING: CPU: 10 PID: 3486953 at fs/kernfs/file.c:828 CPU: 10 PID: 3486953 Comm: rmdir Kdump: loaded Tainted: G RIP: 0010:kernfs_should_drain_open_files+0x1a1/0x1b0 RSP: 0018:ffff8881107ef9e0 EFLAGS: 00010202 RAX: 0000000080000002 RBX: ffff888154738c00 RCX: dffffc0000000000 RDX: 0000000000000007 RSI: 0000000000000004 RDI: ffff888154738c04 RBP: […]
CVE-2025-21632 – Linux Kernel x86 FPU Shadow Stack Unsynchronized Access Vulnerability
In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Ensure shadow stack is active before “getting” registers The x86 shadow stack support has its own set of registers. Those registers are XSAVE-managed, but they are “supervisor state components” which means that userspace can not touch them with XSAVE/XRSTOR. It also means that they […]
CVE-2025-21633 – Apache Linux Kernel IO Uring Ring Buffer Use After Free Vulnerability
The following table lists the changes that have been made to the CVE-2025-21633 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Jan. 19, 2025 Action […]
CVE-2025-21631 – Linux block bfq: Use-After-Free in bfq_init_rq
The following table lists the changes that have been made to the CVE-2025-21631 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Jan. 19, 2025 Action […]
Week in review: AWS S3 data encrypted without ransomware, data of 15k Fortinet firewalls leaked
Week in review: AWS S3 data encrypted without ransomware, data of 15k Fortinet firewalls leaked Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Attackers are encrypting AWS S3 data without using ransomware A ransomware gang dubbed Codefinger is e … Read more Published Date: Jan 19, 2025 (1 hour, […]
CVE-2025-0567 – Epic Games Launcher Local Untrusted Search Path Vulnerability
The following table lists the changes that have been made to the CVE-2025-0567 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 19, 2025 Action […]
CVE-2025-0566 – Tenda AC15 Stack-Based Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-0566 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 19, 2025 Action […]
CVE-2025-0565 – ZZCMS SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-0565 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 19, 2025 Action […]