CVE-2025-21637 – Linux Kernel SCTP sysctl null pointer dereference vulnerability

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: udp_port: avoid using current->nsproxy As mentioned in a previous commit of this series, using the ‘net’ structure via ‘current’ is not recommended for different reasons: – Inconsistency: getting info from the reader’s/writer’s netns vs only from the opener’s netns. – current->nsproxy can be […]

CVE-2025-21636 – Linux Kernel SCTP sysctl NULL Pointer Dereference Vulnerability

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy As mentioned in a previous commit of this series, using the ‘net’ structure via ‘current’ is not recommended for different reasons: – Inconsistency: getting info from the reader’s/writer’s netns vs only from the opener’s netns. – current->nsproxy can be […]

CVE-2025-21634 – Linux kernel cgroup/cpuset kernelfs active break Vuln

In the Linux kernel, the following vulnerability has been resolved: cgroup/cpuset: remove kernfs active break A warning was found: WARNING: CPU: 10 PID: 3486953 at fs/kernfs/file.c:828 CPU: 10 PID: 3486953 Comm: rmdir Kdump: loaded Tainted: G RIP: 0010:kernfs_should_drain_open_files+0x1a1/0x1b0 RSP: 0018:ffff8881107ef9e0 EFLAGS: 00010202 RAX: 0000000080000002 RBX: ffff888154738c00 RCX: dffffc0000000000 RDX: 0000000000000007 RSI: 0000000000000004 RDI: ffff888154738c04 RBP: […]

CVE-2025-21632 – Linux Kernel x86 FPU Shadow Stack Unsynchronized Access Vulnerability

In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Ensure shadow stack is active before “getting” registers The x86 shadow stack support has its own set of registers. Those registers are XSAVE-managed, but they are “supervisor state components” which means that userspace can not touch them with XSAVE/XRSTOR. It also means that they […]

CVE-2025-21633 – Apache Linux Kernel IO Uring Ring Buffer Use After Free Vulnerability

The following table lists the changes that have been made to the CVE-2025-21633 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Jan. 19, 2025 Action […]

CVE-2025-21631 – Linux block bfq: Use-After-Free in bfq_init_rq

The following table lists the changes that have been made to the CVE-2025-21631 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Jan. 19, 2025 Action […]

CVE-2025-0567 – Epic Games Launcher Local Untrusted Search Path Vulnerability

The following table lists the changes that have been made to the CVE-2025-0567 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 19, 2025 Action […]

CVE-2025-0566 – Tenda AC15 Stack-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-0566 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 19, 2025 Action […]

CVE-2025-0565 – ZZCMS SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-0565 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 19, 2025 Action […]