- EPSS 0.05%
- Veröffentlicht 16.09.2025 13:00:26
- Zuletzt bearbeitet 03.11.2025 18:16:49
In the Linux kernel, the following vulnerability has been resolved: atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control(). syzbot reported the splat below. [0] When atmtcp_v_open() or atmtcp_v_close() is called via connect() or close(), at...
- EPSS 0.05%
- Veröffentlicht 16.09.2025 13:00:25
- Zuletzt bearbeitet 03.11.2025 18:16:49
In the Linux kernel, the following vulnerability has been resolved: net: rose: include node references in rose_neigh refcount Current implementation maintains two separate reference counting mechanisms: the 'count' field in struct rose_neigh tracks...
- EPSS 0.04%
- Veröffentlicht 16.09.2025 13:00:24
- Zuletzt bearbeitet 03.11.2025 18:16:48
In the Linux kernel, the following vulnerability has been resolved: net: rose: convert 'use' field to refcount_t The 'use' field in struct rose_neigh is used as a reference counter but lacks atomicity. This can lead to race conditions where a rose_...
- EPSS 0.05%
- Veröffentlicht 16.09.2025 13:00:23
- Zuletzt bearbeitet 03.11.2025 18:16:48
In the Linux kernel, the following vulnerability has been resolved: HID: asus: fix UAF via HID_CLAIMED_INPUT validation After hid_hw_start() is called hidinput_connect() will eventually be called to set up the device with the input layer since the ...
- EPSS 0.04%
- Veröffentlicht 16.09.2025 13:00:23
- Zuletzt bearbeitet 03.11.2025 18:16:48
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix race with concurrent opens in rename(2) Besides sending the rename request to the server, the rename process also involves closing any deferred close, waiting for ...
- EPSS 0.05%
- Veröffentlicht 16.09.2025 13:00:22
- Zuletzt bearbeitet 03.11.2025 18:16:48
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: use array_index_nospec with indices that come from guest min and dest_id are guest-controlled indices. Using array_index_nospec() after the bounds checks clamps these val...
CVE-2025-39822
- EPSS 0.02%
- Veröffentlicht 16.09.2025 13:00:21
- Zuletzt bearbeitet 02.12.2025 18:37:27
In the Linux kernel, the following vulnerability has been resolved: io_uring/kbuf: fix signedness in this_len calculation When importing and using buffers, buf->len is considered unsigned. However, buf->len is converted to signed int when committin...
CVE-2025-39820
- EPSS 0.02%
- Veröffentlicht 16.09.2025 13:00:20
- Zuletzt bearbeitet 02.12.2025 18:35:29
In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add a null ptr check for dpu_encoder_needs_modeset The drm_atomic_get_new_connector_state() can return NULL if the connector is not part of the atomic state. Add a che...
CVE-2025-39821
- EPSS 0.02%
- Veröffentlicht 16.09.2025 13:00:20
- Zuletzt bearbeitet 02.12.2025 18:35:40
In the Linux kernel, the following vulnerability has been resolved: perf: Avoid undefined behavior from stopping/starting inactive events Calling pmu->start()/stop() on perf events in PERF_EVENT_STATE_OFF can leave event->hw.idx at -1. When PMU dri...
- EPSS 0.05%
- Veröffentlicht 16.09.2025 13:00:19
- Zuletzt bearbeitet 03.11.2025 18:16:48
In the Linux kernel, the following vulnerability has been resolved: fs/smb: Fix inconsistent refcnt update A possible inconsistent update of refcount was identified in `smb2_compound_op`. Such inconsistent update could lead to possible resource lea...