- EPSS 0.04%
- Veröffentlicht 28.07.2025 11:21:52
- Zuletzt bearbeitet 03.11.2025 18:16:25
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free in crypt_message when using async crypto The CVE-2024-50047 fix removed asynchronous crypto handling from crypt_message(), assuming all crypto opera...
- EPSS 0.09%
- Veröffentlicht 28.07.2025 11:21:51
- Zuletzt bearbeitet 03.11.2025 18:16:25
In the Linux kernel, the following vulnerability has been resolved: soc: aspeed: lpc-snoop: Don't disable channels that aren't enabled Mitigate e.g. the following: # echo 1e789080.lpc-snoop > /sys/bus/platform/drivers/aspeed-lpc-snoop/unbind ...
CVE-2025-38486
- EPSS 0.03%
- Veröffentlicht 28.07.2025 11:21:50
- Zuletzt bearbeitet 19.11.2025 17:45:46
In the Linux kernel, the following vulnerability has been resolved: soundwire: Revert "soundwire: qcom: Add set_channel_map api support" This reverts commit 7796c97df6b1b2206681a07f3c80f6023a6593d5. This patch broke Dragonboard 845c (sdm845). I se...
- EPSS 0.05%
- Veröffentlicht 28.07.2025 11:21:49
- Zuletzt bearbeitet 03.11.2025 18:16:25
In the Linux kernel, the following vulnerability has been resolved: iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flush fxls8962af_fifo_flush() uses indio_dev->active_scan_mask (with iio_for_each_active_channel()) without making sur...
CVE-2025-38484
- EPSS 0.02%
- Veröffentlicht 28.07.2025 11:21:48
- Zuletzt bearbeitet 19.11.2025 17:37:19
In the Linux kernel, the following vulnerability has been resolved: iio: backend: fix out-of-bound write The buffer is set to 80 character. If a caller write more characters, count is truncated to the max available space in "simple_write_to_buffer"...
- EPSS 0.06%
- Veröffentlicht 28.07.2025 11:21:47
- Zuletzt bearbeitet 03.11.2025 18:16:24
In the Linux kernel, the following vulnerability has been resolved: comedi: das6402: Fix bit shift out of bounds When checking for a supported IRQ number, the following test is used: /* IRQs 2,3,5,6,7, 10,11,15 are valid for "enhanced" mode */ i...
- EPSS 0.06%
- Veröffentlicht 28.07.2025 11:21:47
- Zuletzt bearbeitet 03.11.2025 18:16:24
In the Linux kernel, the following vulnerability has been resolved: comedi: das16m1: Fix bit shift out of bounds When checking for a supported IRQ number, the following test is used: /* only irqs 2, 3, 4, 5, 6, 7, 10, 11, 12, 14, and 15 are valid...
- EPSS 0.06%
- Veröffentlicht 28.07.2025 11:21:46
- Zuletzt bearbeitet 03.11.2025 18:16:24
In the Linux kernel, the following vulnerability has been resolved: comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large The handling of the `COMEDI_INSNLIST` ioctl allocates a kernel buffer to hold the array of `struct comedi_insn`, getting ...
- EPSS 0.06%
- Veröffentlicht 28.07.2025 11:21:45
- Zuletzt bearbeitet 03.11.2025 18:16:24
In the Linux kernel, the following vulnerability has been resolved: comedi: Fix use of uninitialized data in insn_rw_emulate_bits() For Comedi `INSN_READ` and `INSN_WRITE` instructions on "digital" subdevices (subdevice types `COMEDI_SUBD_DI`, `COM...
CVE-2025-38478
- EPSS 0.06%
- Veröffentlicht 28.07.2025 11:21:44
- Zuletzt bearbeitet 23.12.2025 18:27:16
In the Linux kernel, the following vulnerability has been resolved: comedi: Fix initialization of data for instructions that write to subdevice Some Comedi subdevice instruction handlers are known to access instruction data elements beyond the firs...