- EPSS 0.03%
- Veröffentlicht 24.12.2025 12:22:55
- Zuletzt bearbeitet 29.12.2025 15:58:34
In the Linux kernel, the following vulnerability has been resolved: iommufd: Do not add the same hwpt to the ioas->hwpt_list twice The hwpt is added to the hwpt_list only during its creation, it is never added again. This hunk is some missed leftov...
- EPSS 0.03%
- Veröffentlicht 24.12.2025 12:22:54
- Zuletzt bearbeitet 29.12.2025 15:58:34
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: do not run mt76u_status_worker if the device is not running Fix the following NULL pointer dereference avoiding to run mt76u_status_worker thread if the device is not r...
- EPSS 0.04%
- Veröffentlicht 24.12.2025 12:22:54
- Zuletzt bearbeitet 29.12.2025 15:58:34
In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: Fix immediate work request flush to completion queue Correctly set send queue element opcode during immediate work request flushing in post sendqueue operation, if the QP...
- EPSS 0.03%
- Veröffentlicht 24.12.2025 12:22:53
- Zuletzt bearbeitet 29.12.2025 15:58:34
In the Linux kernel, the following vulnerability has been resolved: nvmem: core: Fix memleak in nvmem_register() dev_set_name will alloc memory for nvmem->dev.kobj.name in nvmem_register, when nvmem_validate_keepouts failed, nvmem's memory will be ...
- EPSS 0.05%
- Veröffentlicht 24.12.2025 12:22:52
- Zuletzt bearbeitet 29.12.2025 15:58:34
In the Linux kernel, the following vulnerability has been resolved: usb: idmouse: fix an uninit-value in idmouse_open In idmouse_create_image, if any ftip_command fails, it will go to the reset label. However, this leads to the data in bulk_in_buff...
- EPSS 0.04%
- Veröffentlicht 24.12.2025 12:22:51
- Zuletzt bearbeitet 29.12.2025 15:58:34
In the Linux kernel, the following vulnerability has been resolved: crypto: akcipher - default implementation for setting a private key Changes from v1: * removed the default implementation from set_pub_key: it is assumed that an implementati...
- EPSS 0.05%
- Veröffentlicht 24.12.2025 12:22:51
- Zuletzt bearbeitet 29.12.2025 15:58:34
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8192u: Fix use after free in ieee80211_rx() We cannot dereference the "skb" pointer after calling ieee80211_monitor_rx(), because it is a use after free.
- EPSS 0.03%
- Veröffentlicht 24.12.2025 12:22:50
- Zuletzt bearbeitet 29.12.2025 15:58:34
In the Linux kernel, the following vulnerability has been resolved: ext4: silence the warning when evicting inode with dioread_nolock When evicting an inode with default dioread_nolock, it could be raced by the unwritten extents converting kworker ...
- EPSS 0.05%
- Veröffentlicht 24.12.2025 12:22:49
- Zuletzt bearbeitet 29.12.2025 15:58:34
In the Linux kernel, the following vulnerability has been resolved: s390/lcs: Fix return type of lcs_start_xmit() With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG), indirect call targets are validated against the expected function...
- EPSS 0.03%
- Veröffentlicht 24.12.2025 12:22:49
- Zuletzt bearbeitet 29.12.2025 15:58:34
In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix resource leak in ksmbd_session_rpc_open() When ksmbd_rpc_open() fails then it must call ksmbd_rpc_id_free() to undo the result of ksmbd_ipc_id_alloc().