- EPSS 0.04%
- Veröffentlicht 04.10.2025 15:44:04
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: sctp: add a refcnt in sctp_stream_priorities to avoid a nested loop With this refcnt added in sctp_stream_priorities, we don't need to traverse all streams to check if the prio is ...
- EPSS 0.03%
- Veröffentlicht 04.10.2025 15:44:03
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check for station first in client probe When probing a client, first check if we have it, and then check for the channel context, otherwise you can trigger the warn...
- EPSS 0.05%
- Veröffentlicht 04.10.2025 15:44:02
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Sync IRQ works before buffer destruction If something was written to the buffer just before destruction, it may be possible (maybe not in a real system, but it did hap...
- EPSS 0.04%
- Veröffentlicht 04.10.2025 15:44:01
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: bpf: reject unhashed sockets in bpf_sk_assign The semantics for bpf_sk_assign are as follows: sk = some_lookup_func() bpf_sk_assign(skb, sk) bpf_sk_release(sk) That i...
- EPSS 0.04%
- Veröffentlicht 04.10.2025 15:44:01
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: scsi: target: Fix multiple LUN_RESET handling This fixes a bug where an initiator thinks a LUN_RESET has cleaned up running commands when it hasn't. The bug was added in commit 51e...
- EPSS 0.03%
- Veröffentlicht 04.10.2025 15:43:59
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start() Since commit 096b52fd2bb4 ("perf: RISC-V: throttle perf events") the perf_sample_event_took() function was ...
- EPSS 0.03%
- Veröffentlicht 04.10.2025 15:43:59
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process There are two states for ubifs writing pages: 1. Dirty, Private 2. Not Dirty, Not Private The normal process...
- EPSS 0.04%
- Veröffentlicht 04.10.2025 15:43:58
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds Fix a stack-out-of-bounds read in brcmfmac that occurs when 'buf' that is not null-terminated i...
- EPSS 0.03%
- Veröffentlicht 04.10.2025 15:43:57
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: USB: Gadget: core: Help prevent panic during UVC unconfigure Avichal Rakesh reported a kernel panic that occurred when the UVC gadget driver was removed from a gadget's configurati...
- EPSS 0.03%
- Veröffentlicht 04.10.2025 15:43:57
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Check for NOT_READY flag state after locking Currently the check for NOT_READY flag is performed before obtaining the necessary lock. This opens a possibility for race c...