CVE-2025-38653
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:57
- Zuletzt bearbeitet 07.01.2026 17:36:14
In the Linux kernel, the following vulnerability has been resolved: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al Check pde->proc_ops->proc_lseek directly may cause UAF in rmmod scenario. It's a gap in proc_reg_...
CVE-2025-38652
- EPSS 0.01%
- Veröffentlicht 22.08.2025 16:00:56
- Zuletzt bearbeitet 07.01.2026 17:36:25
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid out-of-boundary access in devs.path - touch /mnt/f2fs/012345678901234567890123456789012345678901234567890123 - truncate -s $((1024*1024*1024)) \ /mnt/f2fs/0123...
CVE-2025-38651
- EPSS 0.01%
- Veröffentlicht 22.08.2025 16:00:55
- Zuletzt bearbeitet 26.11.2025 16:31:27
In the Linux kernel, the following vulnerability has been resolved: landlock: Fix warning from KUnit tests get_id_range() expects a positive value as first argument but get_random_u8() can return 0. Fix this by clamping it. Validated by running t...
CVE-2025-38650
- EPSS 0.01%
- Veröffentlicht 22.08.2025 16:00:54
- Zuletzt bearbeitet 07.01.2026 17:36:34
In the Linux kernel, the following vulnerability has been resolved: hfsplus: remove mutex_lock check in hfsplus_free_extents Syzbot reported an issue in hfsplus filesystem: ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4400 at fs/hfspl...
CVE-2025-38649
- EPSS 0.01%
- Veröffentlicht 22.08.2025 16:00:53
- Zuletzt bearbeitet 26.11.2025 16:27:46
In the Linux kernel, the following vulnerability has been resolved: arm64: dts: qcom: qcs615: fix a crash issue caused by infinite loop for Coresight An infinite loop has been created by the Coresight devices. When only a source device is enabled, ...
CVE-2025-38647
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:52
- Zuletzt bearbeitet 15.12.2025 22:54:31
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: sar: drop lockdep assertion in rtw89_set_sar_from_acpi The following assertion is triggered on the rtw89 driver startup. It looks meaningless to hold wiphy lock on the...
CVE-2025-38648
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:52
- Zuletzt bearbeitet 26.11.2025 16:27:38
In the Linux kernel, the following vulnerability has been resolved: spi: stm32: Check for cfg availability in stm32_spi_probe The stm32_spi_probe function now includes a check to ensure that the pointer returned by of_device_get_match_data is not N...
CVE-2025-38646
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:51
- Zuletzt bearbeitet 26.11.2025 16:42:46
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band With a quite rare chance, RX report might be problematic to make SW think a packet is recei...
CVE-2025-38645
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:50
- Zuletzt bearbeitet 07.01.2026 17:36:41
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Check device memory pointer before usage Add a NULL check before accessing device memory to prevent a crash if dev->dm allocation in mlx5_init_once() fails.
CVE-2025-38643
- EPSS 0.01%
- Veröffentlicht 22.08.2025 16:00:49
- Zuletzt bearbeitet 01.12.2025 19:14:29
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() Callers of wdev_chandef() must hold the wiphy mutex. But the worker cfg80211_propagate_cac_done_wk() never takes t...