- EPSS 0.03%
- Veröffentlicht 01.10.2025 12:15:55
- Zuletzt bearbeitet 02.10.2025 19:11:46
In the Linux kernel, the following vulnerability has been resolved: macvlan: add forgotten nla_policy for IFLA_MACVLAN_BC_CUTOFF The previous commit 954d1fa1ac93 ("macvlan: Add netlink attribute for broadcast cutoff") added one additional attribute...
- EPSS 0.03%
- Veröffentlicht 01.10.2025 12:15:55
- Zuletzt bearbeitet 02.10.2025 19:11:46
In the Linux kernel, the following vulnerability has been resolved: tipc: do not update mtu if msg_max is too small in mtu negotiation When doing link mtu negotiation, a malicious peer may send Activate msg with a very small mtu, e.g. 4 in Shuang's...
- EPSS 0.03%
- Veröffentlicht 01.10.2025 12:15:54
- Zuletzt bearbeitet 02.10.2025 19:11:46
In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Properly order ib_device_unalloc() to avoid UAF ib_dealloc_device() should be called only after device cleanup. Fix the dealloc sequence.
- EPSS 0.04%
- Veröffentlicht 01.10.2025 12:15:54
- Zuletzt bearbeitet 02.10.2025 19:11:46
In the Linux kernel, the following vulnerability has been resolved: clk: tegra: tegra124-emc: Fix potential memory leak The tegra and tegra needs to be freed in the error handling path, otherwise it will be leaked.
- EPSS 0.04%
- Veröffentlicht 01.10.2025 12:15:54
- Zuletzt bearbeitet 02.10.2025 19:11:46
In the Linux kernel, the following vulnerability has been resolved: udf: Do not bother merging very long extents When merging very long extents we try to push as much length as possible to the first extent. However this is unnecessarily complicated...
- EPSS 0.03%
- Veröffentlicht 01.10.2025 12:15:54
- Zuletzt bearbeitet 02.10.2025 19:11:46
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Unregister devlink params in case interface is down Currently, in case an interface is down, mlx5 driver doesn't unregister its devlink params, which leads to this WARN[1...
- EPSS 0.03%
- Veröffentlicht 01.10.2025 12:15:54
- Zuletzt bearbeitet 02.10.2025 19:11:46
In the Linux kernel, the following vulnerability has been resolved: ublk: fail to start device if queue setup is interrupted In ublk_ctrl_start_dev(), if wait_for_completion_interruptible() is interrupted by signal, queues aren't setup successfully...
- EPSS 0.03%
- Veröffentlicht 01.10.2025 12:15:54
- Zuletzt bearbeitet 02.10.2025 19:11:46
In the Linux kernel, the following vulnerability has been resolved: qed: allow sleep in qed_mcp_trace_dump() By default, qed_mcp_cmd_and_union() delays 10us at a time in a loop that can run 500K times, so calls to qed_mcp_nvm_rd_cmd() may block the...
- EPSS 0.03%
- Veröffentlicht 01.10.2025 12:15:54
- Zuletzt bearbeitet 02.10.2025 19:11:46
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix handling of lrbp->cmd ufshcd_queuecommand() may be called two times in a row for a SCSI command before it is completed. Hence make the following changes: - I...
- EPSS 0.03%
- Veröffentlicht 01.10.2025 12:15:53
- Zuletzt bearbeitet 02.10.2025 19:12:17
In the Linux kernel, the following vulnerability has been resolved: media: vsp1: Replace vb2_is_streaming() with vb2_start_streaming_called() The vsp1 driver uses the vb2_is_streaming() function in its .buf_queue() handler to check if the .start_st...