CVE-2025-21739
- EPSS 0.03%
- Veröffentlicht 27.02.2025 03:15:14
- Zuletzt bearbeitet 24.03.2025 17:12:42
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix use-after free in init error and remove paths devm_blk_crypto_profile_init() registers a cleanup handler to run when the associated (platform-) device is being...
CVE-2025-21732
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:13
- Zuletzt bearbeitet 28.10.2025 20:41:47
In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error This patch addresses a race condition for an ODP MR that can result in a CQE with an error on the UMR QP. During ...
CVE-2025-21733
- EPSS 0.03%
- Veröffentlicht 27.02.2025 03:15:13
- Zuletzt bearbeitet 28.10.2025 20:42:13
In the Linux kernel, the following vulnerability has been resolved: tracing/osnoise: Fix resetting of tracepoints If a timerlat tracer is started with the osnoise option OSNOISE_WORKLOAD disabled, but then that option is enabled and timerlat is rem...
CVE-2024-58013
- EPSS 0.03%
- Veröffentlicht 27.02.2025 03:15:12
- Zuletzt bearbeitet 03.11.2025 20:16:58
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync This fixes the following crash: ================================================================== BU...
CVE-2024-58014
- EPSS 0.04%
- Veröffentlicht 27.02.2025 03:15:12
- Zuletzt bearbeitet 03.11.2025 20:16:58
In the Linux kernel, the following vulnerability has been resolved: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() In 'wlc_phy_iqcal_gainparams_nphy()', add gain range check to WARN() instead of possible out-of-bounds 'tbl_...
CVE-2024-58015
- EPSS 0.04%
- Veröffentlicht 27.02.2025 03:15:12
- Zuletzt bearbeitet 22.10.2025 19:37:21
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too...
CVE-2024-58016
- EPSS 0.06%
- Veröffentlicht 27.02.2025 03:15:12
- Zuletzt bearbeitet 03.11.2025 20:16:58
In the Linux kernel, the following vulnerability has been resolved: safesetid: check size of policy writes syzbot attempts to write a buffer with a large size to a sysfs entry with writes handled by handle_policy_update(), triggering a warning in k...
CVE-2024-58018
- EPSS 0.03%
- Veröffentlicht 27.02.2025 03:15:12
- Zuletzt bearbeitet 22.10.2025 19:36:06
In the Linux kernel, the following vulnerability has been resolved: nvkm: correctly calculate the available space of the GSP cmdq buffer r535_gsp_cmdq_push() waits for the available page in the GSP cmdq buffer when handling a large RPC request. Whe...
CVE-2024-58019
- EPSS 0.03%
- Veröffentlicht 27.02.2025 03:15:12
- Zuletzt bearbeitet 28.10.2025 20:41:36
In the Linux kernel, the following vulnerability has been resolved: nvkm/gsp: correctly advance the read pointer of GSP message queue A GSP event message consists three parts: message header, RPC header, message body. GSP calculates the number of p...
CVE-2024-58001
- EPSS 0.05%
- Veröffentlicht 27.02.2025 03:15:11
- Zuletzt bearbeitet 03.11.2025 20:16:57
In the Linux kernel, the following vulnerability has been resolved: ocfs2: handle a symlink read error correctly Patch series "Convert ocfs2 to use folios". Mark did a conversion of ocfs2 to use folios and sent it to me as a giant patch for review...