- EPSS 0.05%
- Veröffentlicht 04.09.2025 15:33:02
- Zuletzt bearbeitet 03.11.2025 18:16:36
In the Linux kernel, the following vulnerability has been resolved: hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file() When the volume header contains erroneous values that do not reflect the actual state of the filesystem, hfsplus_fil...
- EPSS 0.04%
- Veröffentlicht 04.09.2025 15:33:01
- Zuletzt bearbeitet 03.11.2025 18:16:36
In the Linux kernel, the following vulnerability has been resolved: smb/server: avoid deadlock when linking with ReplaceIfExists If smb2_create_link() is called with ReplaceIfExists set and the name does exist then a deadlock will happen. ksmbd_vf...
CVE-2025-38710
- EPSS 0.02%
- Veröffentlicht 04.09.2025 15:33:00
- Zuletzt bearbeitet 25.11.2025 22:07:05
In the Linux kernel, the following vulnerability has been resolved: gfs2: Validate i_depth for exhash directories A fuzzer test introduced corruption that ends up with a depth of 0 in dir_e_read(), causing an undefined shift by 32 at: index = ha...
- EPSS 0.07%
- Veröffentlicht 04.09.2025 15:32:59
- Zuletzt bearbeitet 03.11.2025 18:16:36
In the Linux kernel, the following vulnerability has been resolved: drbd: add missing kref_get in handle_write_conflicts With `two-primaries` enabled, DRBD tries to detect "concurrent" writes and handle write conflicts, so that even if you write to...
CVE-2025-38709
- EPSS 0.02%
- Veröffentlicht 04.09.2025 15:32:59
- Zuletzt bearbeitet 03.12.2025 20:00:20
In the Linux kernel, the following vulnerability has been resolved: loop: Avoid updating block size under exclusive owner Syzbot came up with a reproducer where a loop device block size is changed underneath a mounted filesystem. This causes a mism...
- EPSS 0.04%
- Veröffentlicht 04.09.2025 15:32:58
- Zuletzt bearbeitet 03.11.2025 18:16:36
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Add sanity check for file name The length of the file name should be smaller than the directory entry size.
- EPSS 0.05%
- Veröffentlicht 04.09.2025 15:32:57
- Zuletzt bearbeitet 03.11.2025 18:16:36
In the Linux kernel, the following vulnerability has been resolved: ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() snd_soc_remove_pcm_runtime() might be called with rtd == NULL which will leads to null pointer dereference. This w...
CVE-2025-38705
- EPSS 0.02%
- Veröffentlicht 04.09.2025 15:32:56
- Zuletzt bearbeitet 24.11.2025 19:43:18
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: fix null pointer access Writing a string without delimiters (' ', '\n', '\0') to the under gpu_od/fan_ctrl sysfs or pp_power_profile_mode for the CUSTOM profile will re...
CVE-2025-38704
- EPSS 0.02%
- Veröffentlicht 04.09.2025 15:32:55
- Zuletzt bearbeitet 24.11.2025 19:50:25
In the Linux kernel, the following vulnerability has been resolved: rcu/nocb: Fix possible invalid rdp's->nocb_cb_kthread pointer access In the preparation stage of CPU online, if the corresponding the rdp's->nocb_cb_kthread does not exist, will be...
CVE-2025-38703
- EPSS 0.02%
- Veröffentlicht 04.09.2025 15:32:54
- Zuletzt bearbeitet 24.11.2025 19:45:00
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Make dma-fences compliant with the safe access rules Xe can free some of the data pointed to by the dma-fences it exports. Most notably the timeline name can get freed if u...