Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-22111

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: Remove RTNL dance for SIOCBRADDIF and SIOCBRDELIF.<br /> <br /> SIOCBRDELIF is passed to dev_ioctl() first and later forwarded to<br /> br_ioctl_call(), which causes unnecessary RTNL dance and the splat<br /> below [0] under RTNL pressure.<br /> <br /> Let&amp;#39;s say Thread A is trying to detach a device from a bridge and<br /> Thread B is trying to remove the bridge.<br /> <br /> In dev_ioctl(), Thread A bumps the bridge device&amp;#39;s refcnt by<br /> netdev_hold() and releases RTNL because the following br_ioctl_call()<br /> also re-acquires RTNL.<br /> <br /> In the race window, Thread B could acquire RTNL and try to remove<br /> the bridge device. Then, rtnl_unlock() by Thread B will release RTNL<br /> and wait for netdev_put() by Thread A.<br /> <br /> Thread A, however, must hold RTNL after the unlock in dev_ifsioc(),<br /> which may take long under RTNL pressure, resulting in the splat by<br /> Thread B.<br /> <br /> Thread A (SIOCBRDELIF) Thread B (SIOCBRDELBR)<br /> ---------------------- ----------------------<br /> sock_ioctl sock_ioctl<br /> `- sock_do_ioctl `- br_ioctl_call<br /> `- dev_ioctl `- br_ioctl_stub<br /> |- rtnl_lock |<br /> |- dev_ifsioc &amp;#39;<br /> &amp;#39; |- dev = __dev_get_by_name(...)<br /> |- netdev_hold(dev, ...) .<br /> / |- rtnl_unlock ------. |<br /> | |- br_ioctl_call `---&gt; |- rtnl_lock<br /> Race | | `- br_ioctl_stub |- br_del_bridge<br /> Window | | | |- dev = __dev_get_by_name(...)<br /> | | | May take long | `- br_dev_delete(dev, ...)<br /> | | | under RTNL pressure | `- unregister_netdevice_queue(dev, ...)<br /> | | | | `- rtnl_unlock<br /> \ | |- rtnl_lock
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2026

CVE-2025-22115

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> btrfs: fix block group refcount race in btrfs_create_pending_block_groups()<br /> <br /> Block group creation is done in two phases, which results in a slightly<br /> unintuitive property: a block group can be allocated/deallocated from<br /> after btrfs_make_block_group() adds it to the space_info with<br /> btrfs_add_bg_to_space_info(), but before creation is completely completed<br /> in btrfs_create_pending_block_groups(). As a result, it is possible for a<br /> block group to go unused and have &amp;#39;btrfs_mark_bg_unused&amp;#39; called on it<br /> concurrently with &amp;#39;btrfs_create_pending_block_groups&amp;#39;. This causes a<br /> number of issues, which were fixed with the block group flag<br /> &amp;#39;BLOCK_GROUP_FLAG_NEW&amp;#39;.<br /> <br /> However, this fix is not quite complete. Since it does not use the<br /> unused_bg_lock, it is possible for the following race to occur:<br /> <br /> btrfs_create_pending_block_groups btrfs_mark_bg_unused<br /> if list_empty // false<br /> list_del_init<br /> clear_bit<br /> else if (test_bit) // true<br /> list_move_tail<br /> <br /> And we get into the exact same broken ref count and invalid new_bgs<br /> state for transaction cleanup that BLOCK_GROUP_FLAG_NEW was designed to<br /> prevent.<br /> <br /> The broken refcount aspect will result in a warning like:<br /> <br /> [1272.943527] refcount_t: underflow; use-after-free.<br /> [1272.943967] WARNING: CPU: 1 PID: 61 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110<br /> [1272.944731] Modules linked in: btrfs virtio_net xor zstd_compress raid6_pq null_blk [last unloaded: btrfs]<br /> [1272.945550] CPU: 1 UID: 0 PID: 61 Comm: kworker/u32:1 Kdump: loaded Tainted: G W 6.14.0-rc5+ #108<br /> [1272.946368] Tainted: [W]=WARN<br /> [1272.946585] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014<br /> [1272.947273] Workqueue: btrfs_discard btrfs_discard_workfn [btrfs]<br /> [1272.947788] RIP: 0010:refcount_warn_saturate+0xba/0x110<br /> [1272.949532] RSP: 0018:ffffbf1200247df0 EFLAGS: 00010282<br /> [1272.949901] RAX: 0000000000000000 RBX: ffffa14b00e3f800 RCX: 0000000000000000<br /> [1272.950437] RDX: 0000000000000000 RSI: ffffbf1200247c78 RDI: 00000000ffffdfff<br /> [1272.950986] RBP: ffffa14b00dc2860 R08: 00000000ffffdfff R09: ffffffff90526268<br /> [1272.951512] R10: ffffffff904762c0 R11: 0000000063666572 R12: ffffa14b00dc28c0<br /> [1272.952024] R13: 0000000000000000 R14: ffffa14b00dc2868 R15: 000001285dcd12c0<br /> [1272.952850] FS: 0000000000000000(0000) GS:ffffa14d33c40000(0000) knlGS:0000000000000000<br /> [1272.953458] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [1272.953931] CR2: 00007f838cbda000 CR3: 000000010104e000 CR4: 00000000000006f0<br /> [1272.954474] Call Trace:<br /> [1272.954655] <br /> [1272.954812] ? refcount_warn_saturate+0xba/0x110<br /> [1272.955173] ? __warn.cold+0x93/0xd7<br /> [1272.955487] ? refcount_warn_saturate+0xba/0x110<br /> [1272.955816] ? report_bug+0xe7/0x120<br /> [1272.956103] ? handle_bug+0x53/0x90<br /> [1272.956424] ? exc_invalid_op+0x13/0x60<br /> [1272.956700] ? asm_exc_invalid_op+0x16/0x20<br /> [1272.957011] ? refcount_warn_saturate+0xba/0x110<br /> [1272.957399] btrfs_discard_cancel_work.cold+0x26/0x2b [btrfs]<br /> [1272.957853] btrfs_put_block_group.cold+0x5d/0x8e [btrfs]<br /> [1272.958289] btrfs_discard_workfn+0x194/0x380 [btrfs]<br /> [1272.958729] process_one_work+0x130/0x290<br /> [1272.959026] worker_thread+0x2ea/0x420<br /> [1272.959335] ? __pfx_worker_thread+0x10/0x10<br /> [1272.959644] kthread+0xd7/0x1c0<br /> [1272.959872] ? __pfx_kthread+0x10/0x10<br /> [1272.960172] ret_from_fork+0x30/0x50<br /> [1272.960474] ? __pfx_kthread+0x10/0x10<br /> [1272.960745] ret_from_fork_asm+0x1a/0x30<br /> [1272.961035] <br /> [1272.961238] ---[ end trace 0000000000000000 ]---<br /> <br /> Though we have seen them in the async discard workfn as well. It is<br /> most likely to happen after a relocation finishes which cancels discard,<br /> tears down the block group, etc.<br /> <br /> Fix this fully by taking the lock arou<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-22114

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> btrfs: don&amp;#39;t clobber ret in btrfs_validate_super()<br /> <br /> Commit 2a9bb78cfd36 ("btrfs: validate system chunk array at<br /> btrfs_validate_super()") introduces a call to validate_sys_chunk_array()<br /> in btrfs_validate_super(), which clobbers the value of ret set earlier.<br /> This has the effect of negating the validity checks done earlier, making<br /> it so btrfs could potentially try to mount invalid filesystems.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-22112

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> eth: bnxt: fix out-of-range access of vnic_info array<br /> <br /> The bnxt_queue_{start | stop}() access vnic_info as much as allocated,<br /> which indicates bp-&gt;nr_vnics.<br /> So, it should not reach bp-&gt;vnic_info[bp-&gt;nr_vnics].
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-22113

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ext4: avoid journaling sb update on error if journal is destroying<br /> <br /> Presently we always BUG_ON if trying to start a transaction on a journal marked<br /> with JBD2_UNMOUNT, since this should never happen. However, while ltp running<br /> stress tests, it was observed that in case of some error handling paths, it is<br /> possible for update_super_work to start a transaction after the journal is<br /> destroyed eg:<br /> <br /> (umount)<br /> ext4_kill_sb<br /> kill_block_super<br /> generic_shutdown_super<br /> sync_filesystem /* commits all txns */<br /> evict_inodes<br /> /* might start a new txn */<br /> ext4_put_super<br /> flush_work(&amp;sbi-&gt;s_sb_upd_work) /* flush the workqueue */<br /> jbd2_journal_destroy<br /> journal_kill_thread<br /> journal-&gt;j_flags |= JBD2_UNMOUNT;<br /> jbd2_journal_commit_transaction<br /> jbd2_journal_get_descriptor_buffer<br /> jbd2_journal_bmap<br /> ext4_journal_bmap<br /> ext4_map_blocks<br /> ...<br /> ext4_inode_error<br /> ext4_handle_error<br /> schedule_work(&amp;sbi-&gt;s_sb_upd_work)<br /> <br /> /* work queue kicks in */<br /> update_super_work<br /> jbd2_journal_start<br /> start_this_handle<br /> BUG_ON(journal-&gt;j_flags &amp;<br /> JBD2_UNMOUNT)<br /> <br /> Hence, introduce a new mount flag to indicate journal is destroying and only do<br /> a journaled (and deferred) update of sb if this flag is not set. Otherwise, just<br /> fallback to an un-journaled commit.<br /> <br /> Further, in the journal destroy path, we have the following sequence:<br /> <br /> 1. Set mount flag indicating journal is destroying<br /> 2. force a commit and wait for it<br /> 3. flush pending sb updates<br /> <br /> This sequence is important as it ensures that, after this point, there is no sb<br /> update that might be journaled so it is safe to update the sb outside the<br /> journal. (To avoid race discussed in 2d01ddc86606)<br /> <br /> Also, we don&amp;#39;t need a similar check in ext4_grp_locked_error since it is only<br /> called from mballoc and AFAICT it would be always valid to schedule work here.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-22110

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nfnetlink_queue: Initialize ctx to avoid memory allocation error<br /> <br /> It is possible that ctx in nfqnl_build_packet_message() could be used<br /> before it is properly initialize, which is only initialized<br /> by nfqnl_get_sk_secctx().<br /> <br /> This patch corrects this problem by initializing the lsmctx to a safe<br /> value when it is declared.<br /> <br /> This is similar to the commit 35fcac7a7c25<br /> ("audit: Initialize lsmctx to avoid memory allocation error").
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-22109

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ax25: Remove broken autobind<br /> <br /> Binding AX25 socket by using the autobind feature leads to memory leaks<br /> in ax25_connect() and also refcount leaks in ax25_release(). Memory<br /> leak was detected with kmemleak:<br /> <br /> ================================================================<br /> unreferenced object 0xffff8880253cd680 (size 96):<br /> backtrace:<br /> __kmalloc_node_track_caller_noprof (./include/linux/kmemleak.h:43)<br /> kmemdup_noprof (mm/util.c:136)<br /> ax25_rt_autobind (net/ax25/ax25_route.c:428)<br /> ax25_connect (net/ax25/af_ax25.c:1282)<br /> __sys_connect_file (net/socket.c:2045)<br /> __sys_connect (net/socket.c:2064)<br /> __x64_sys_connect (net/socket.c:2067)<br /> do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)<br /> entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)<br /> ================================================================<br /> <br /> When socket is bound, refcounts must be incremented the way it is done<br /> in ax25_bind() and ax25_setsockopt() (SO_BINDTODEVICE). In case of<br /> autobind, the refcounts are not incremented.<br /> <br /> This bug leads to the following issue reported by Syzkaller:<br /> <br /> ================================================================<br /> ax25_connect(): syz-executor318 uses autobind, please contact jreuter@yaina.de<br /> ------------[ cut here ]------------<br /> refcount_t: decrement hit 0; leaking memory.<br /> WARNING: CPU: 0 PID: 5317 at lib/refcount.c:31 refcount_warn_saturate+0xfa/0x1d0 lib/refcount.c:31<br /> Modules linked in:<br /> CPU: 0 UID: 0 PID: 5317 Comm: syz-executor318 Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0<br /> Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014<br /> RIP: 0010:refcount_warn_saturate+0xfa/0x1d0 lib/refcount.c:31<br /> ...<br /> Call Trace:<br /> <br /> __refcount_dec include/linux/refcount.h:336 [inline]<br /> refcount_dec include/linux/refcount.h:351 [inline]<br /> ref_tracker_free+0x6af/0x7e0 lib/ref_tracker.c:236<br /> netdev_tracker_free include/linux/netdevice.h:4302 [inline]<br /> netdev_put include/linux/netdevice.h:4319 [inline]<br /> ax25_release+0x368/0x960 net/ax25/af_ax25.c:1080<br /> __sock_release net/socket.c:647 [inline]<br /> sock_close+0xbc/0x240 net/socket.c:1398<br /> __fput+0x3e9/0x9f0 fs/file_table.c:464<br /> __do_sys_close fs/open.c:1580 [inline]<br /> __se_sys_close fs/open.c:1565 [inline]<br /> __x64_sys_close+0x7f/0x110 fs/open.c:1565<br /> do_syscall_x64 arch/x86/entry/common.c:52 [inline]<br /> do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83<br /> entry_SYSCALL_64_after_hwframe+0x77/0x7f<br /> ...<br /> <br /> ================================================================<br /> <br /> Considering the issues above and the comments left in the code that say:<br /> "check if we can remove this feature. It is broken."; "autobinding in this<br /> may or may not work"; - it is better to completely remove this feature than<br /> to fix it because it is broken and leads to various kinds of memory bugs.<br /> <br /> Now calling connect() without first binding socket will result in an<br /> error (-EINVAL). Userspace software that relies on the autobind feature<br /> might get broken. However, this feature does not seem widely used with<br /> this specific driver as it was not reliable at any point of time, and it<br /> is already broken anyway. E.g. ax25-tools and ax25-apps packages for<br /> popular distributions do not use the autobind feature for AF_AX25.<br /> <br /> Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-22108

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bnxt_en: Mask the bd_cnt field in the TX BD properly<br /> <br /> The bd_cnt field in the TX BD specifies the total number of BDs for<br /> the TX packet. The bd_cnt field has 5 bits and the maximum number<br /> supported is 32 with the value 0.<br /> <br /> CONFIG_MAX_SKB_FRAGS can be modified and the total number of SKB<br /> fragments can approach or exceed the maximum supported by the chip.<br /> Add a macro to properly mask the bd_cnt field so that the value 32<br /> will be properly masked and set to 0 in the bd_cnd field.<br /> <br /> Without this patch, the out-of-range bd_cnt value will corrupt the<br /> TX BD and may cause TX timeout.<br /> <br /> The next patch will check for values exceeding 32.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-22116

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> idpf: check error for register_netdev() on init<br /> <br /> Current init logic ignores the error code from register_netdev(),<br /> which will cause WARN_ON() on attempt to unregister it, if there was one,<br /> and there is no info for the user that the creation of the netdev failed.<br /> <br /> WARNING: CPU: 89 PID: 6902 at net/core/dev.c:11512 unregister_netdevice_many_notify+0x211/0x1a10<br /> ...<br /> [ 3707.563641] unregister_netdev+0x1c/0x30<br /> [ 3707.563656] idpf_vport_dealloc+0x5cf/0xce0 [idpf]<br /> [ 3707.563684] idpf_deinit_task+0xef/0x160 [idpf]<br /> [ 3707.563712] idpf_vc_core_deinit+0x84/0x320 [idpf]<br /> [ 3707.563739] idpf_remove+0xbf/0x780 [idpf]<br /> [ 3707.563769] pci_device_remove+0xab/0x1e0<br /> [ 3707.563786] device_release_driver_internal+0x371/0x530<br /> [ 3707.563803] driver_detach+0xbf/0x180<br /> [ 3707.563816] bus_remove_driver+0x11b/0x2a0<br /> [ 3707.563829] pci_unregister_driver+0x2a/0x250<br /> <br /> Introduce an error check and log the vport number and error code.<br /> On removal make sure to check VPORT_REG_NETDEV flag prior to calling<br /> unregister and free on the netdev.<br /> <br /> Add local variables for idx, vport_config and netdev for readability.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026

CVE-2025-22117

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ice: fix using untrusted value of pkt_len in ice_vc_fdir_parse_raw()<br /> <br /> Fix using the untrusted value of proto-&gt;raw.pkt_len in function<br /> ice_vc_fdir_parse_raw() by verifying if it does not exceed the<br /> VIRTCHNL_MAX_SIZE_RAW_PACKET value.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026

CVE-2025-22102

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> Bluetooth: btnxpuart: Fix kernel panic during FW release<br /> <br /> This fixes a kernel panic seen during release FW in a stress test<br /> scenario where WLAN and BT FW download occurs simultaneously, and due to<br /> a HW bug, chip sends out only 1 bootloader signatures.<br /> <br /> When driver receives the bootloader signature, it enters FW download<br /> mode, but since no consequtive bootloader signatures seen, FW file is<br /> not requested.<br /> <br /> After 60 seconds, when FW download times out, release_firmware causes a<br /> kernel panic.<br /> <br /> [ 2601.949184] Unable to handle kernel paging request at virtual address 0000312e6f006573<br /> [ 2601.992076] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000111802000<br /> [ 2601.992080] [0000312e6f006573] pgd=0000000000000000, p4d=0000000000000000<br /> [ 2601.992087] Internal error: Oops: 0000000096000021 [#1] PREEMPT SMP<br /> [ 2601.992091] Modules linked in: algif_hash algif_skcipher af_alg btnxpuart(O) pciexxx(O) mlan(O) overlay fsl_jr_uio caam_jr caamkeyblob_desc caamhash_desc caamalg_desc crypto_engine authenc libdes crct10dif_ce polyval_ce snd_soc_fsl_easrc snd_soc_fsl_asoc_card imx8_media_dev(C) snd_soc_fsl_micfil polyval_generic snd_soc_fsl_xcvr snd_soc_fsl_sai snd_soc_imx_audmux snd_soc_fsl_asrc snd_soc_imx_card snd_soc_imx_hdmi snd_soc_fsl_aud2htx snd_soc_fsl_utils imx_pcm_dma dw_hdmi_cec flexcan can_dev<br /> [ 2602.001825] CPU: 2 PID: 20060 Comm: hciconfig Tainted: G C O 6.6.23-lts-next-06236-gb586a521770e #1<br /> [ 2602.010182] Hardware name: NXP i.MX8MPlus EVK board (DT)<br /> [ 2602.010185] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br /> [ 2602.010191] pc : _raw_spin_lock+0x34/0x68<br /> [ 2602.010201] lr : free_fw_priv+0x20/0xfc<br /> [ 2602.020561] sp : ffff800089363b30<br /> [ 2602.020563] x29: ffff800089363b30 x28: ffff0000d0eb5880 x27: 0000000000000000<br /> [ 2602.020570] x26: 0000000000000000 x25: ffff0000d728b330 x24: 0000000000000000<br /> [ 2602.020577] x23: ffff0000dc856f38<br /> [ 2602.033797] x22: ffff800089363b70 x21: ffff0000dc856000<br /> [ 2602.033802] x20: ff00312e6f006573 x19: ffff0000d0d9ea80 x18: 0000000000000000<br /> [ 2602.033809] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaad80dd480<br /> [ 2602.083320] x14: 0000000000000000 x13: 00000000000001b9 x12: 0000000000000002<br /> [ 2602.083326] x11: 0000000000000000 x10: 0000000000000a60 x9 : ffff800089363a30<br /> [ 2602.083333] x8 : ffff0001793d75c0 x7 : ffff0000d6dbc400 x6 : 0000000000000000<br /> [ 2602.083339] x5 : 00000000410fd030 x4 : 0000000000000000 x3 : 0000000000000001<br /> [ 2602.083346] x2 : 0000000000000000 x1 : 0000000000000001 x0 : ff00312e6f006573<br /> [ 2602.083354] Call trace:<br /> [ 2602.083356] _raw_spin_lock+0x34/0x68<br /> [ 2602.083364] release_firmware+0x48/0x6c<br /> [ 2602.083370] nxp_setup+0x3c4/0x540 [btnxpuart]<br /> [ 2602.083383] hci_dev_open_sync+0xf0/0xa34<br /> [ 2602.083391] hci_dev_open+0xd8/0x178<br /> [ 2602.083399] hci_sock_ioctl+0x3b0/0x590<br /> [ 2602.083405] sock_do_ioctl+0x60/0x118<br /> [ 2602.083413] sock_ioctl+0x2f4/0x374<br /> [ 2602.091430] __arm64_sys_ioctl+0xac/0xf0<br /> [ 2602.091437] invoke_syscall+0x48/0x110<br /> [ 2602.091445] el0_svc_common.constprop.0+0xc0/0xe0<br /> [ 2602.091452] do_el0_svc+0x1c/0x28<br /> [ 2602.091457] el0_svc+0x40/0xe4<br /> [ 2602.091465] el0t_64_sync_handler+0x120/0x12c<br /> [ 2602.091470] el0t_64_sync+0x190/0x194
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-22101

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: libwx: fix Tx L4 checksum<br /> <br /> The hardware only supports L4 checksum offload for TCP/UDP/SCTP protocol.<br /> There was a bug to set Tx checksum flag for the other protocol that results<br /> in Tx ring hang. Fix to compute software checksum for these packets.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025