CVE-2025-38649
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:53
- Zuletzt bearbeitet 26.11.2025 16:27:46
In the Linux kernel, the following vulnerability has been resolved: arm64: dts: qcom: qcs615: fix a crash issue caused by infinite loop for Coresight An infinite loop has been created by the Coresight devices. When only a source device is enabled, ...
CVE-2025-38647
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:52
- Zuletzt bearbeitet 15.12.2025 22:54:31
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: sar: drop lockdep assertion in rtw89_set_sar_from_acpi The following assertion is triggered on the rtw89 driver startup. It looks meaningless to hold wiphy lock on the...
CVE-2025-38648
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:52
- Zuletzt bearbeitet 26.11.2025 16:27:38
In the Linux kernel, the following vulnerability has been resolved: spi: stm32: Check for cfg availability in stm32_spi_probe The stm32_spi_probe function now includes a check to ensure that the pointer returned by of_device_get_match_data is not N...
CVE-2025-38646
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:51
- Zuletzt bearbeitet 26.11.2025 16:42:46
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band With a quite rare chance, RX report might be problematic to make SW think a packet is recei...
- EPSS 0.04%
- Veröffentlicht 22.08.2025 16:00:50
- Zuletzt bearbeitet 03.11.2025 18:16:32
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Check device memory pointer before usage Add a NULL check before accessing device memory to prevent a crash if dev->dm allocation in mlx5_init_once() fails.
CVE-2025-38643
- EPSS 0.01%
- Veröffentlicht 22.08.2025 16:00:49
- Zuletzt bearbeitet 01.12.2025 19:14:29
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() Callers of wdev_chandef() must hold the wiphy mutex. But the worker cfg80211_propagate_cac_done_wk() never takes t...
- EPSS 0.04%
- Veröffentlicht 22.08.2025 16:00:49
- Zuletzt bearbeitet 03.11.2025 18:16:32
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211...
CVE-2025-38642
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:48
- Zuletzt bearbeitet 26.11.2025 16:38:47
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix WARN_ON for monitor mode on some devices On devices without WANT_MONITOR_VIF (and probably without channel context support) we get a WARN_ON for changing the pe...
CVE-2025-38641
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:47
- Zuletzt bearbeitet 26.11.2025 16:37:03
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: Fix potential NULL dereference on kmalloc failure Avoid potential NULL pointer dereference by checking the return value of kmalloc and handling allocation failure...
CVE-2025-38640
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:46
- Zuletzt bearbeitet 26.11.2025 16:36:32
In the Linux kernel, the following vulnerability has been resolved: bpf: Disable migration in nf_hook_run_bpf(). syzbot reported that the netfilter bpf prog can be called without migration disabled in xmit path. Then the assertion in __bpf_prog_ru...