- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:09
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: spi: qup: Don't skip cleanup in remove's error path Returning early in a platform driver's remove callback is wrong. In this case the dma resources are not released in the error pa...
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:08
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: fix null deref on element insertion There is no guarantee that rb_prev() will not return NULL in nft_rbtree_gc_elem(): general protection fault, probabl...
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:07
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Check for probe() id argument being NULL The probe() id argument may be NULL in 2 scenarios: 1. brcmf_pcie_pm_leave_D3() calling brcmf_pcie_probe() to reprobe t...
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:07
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix defrag path triggering jbd2 ASSERT code path: ocfs2_ioctl_move_extents ocfs2_move_extents ocfs2_defrag_extent __ocfs2_move_extent + ocfs2_journal_access_di ...
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:06
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: cpufreq: amd-pstate-ut: Fix kernel panic when loading the driver After loading the amd-pstate-ut driver, amd_pstate_ut_check_perf() and amd_pstate_ut_check_freq() use cpufreq_cpu_g...
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:05
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: drm/msm: fix vram leak on bind errors Make sure to release the VRAM buffer also in a case a subcomponent fails to bind. Patchwork: https://patchwork.freedesktop.org/patch/525094/
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:05
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: net: wwan: iosm: fix NULL pointer dereference when removing device In suspend and resume cycle, the removal and rescan of device ends up in NULL pointer dereference. During driver...
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:04
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: tracing/histograms: Add histograms to hist_vars if they have referenced variables Hist triggers can have referenced variables without having direct variables fields. This can be th...
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:03
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: ip_vti: fix potential slab-use-after-free in decode_session6 When ip_vti device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuing. ...
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:02
- Zuletzt bearbeitet 06.10.2025 14:56:21
In the Linux kernel, the following vulnerability has been resolved: rcu-tasks: Avoid pr_info() with spin lock in cblist_init_generic() pr_info() is called with rtp->cbs_gbl_lock spin lock locked. Because pr_info() calls printk() that might sleep, ...