CVE-2025-38644
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:49
- Zuletzt bearbeitet 07.01.2026 16:21:33
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211...
CVE-2025-38642
- EPSS 0.01%
- Veröffentlicht 22.08.2025 16:00:48
- Zuletzt bearbeitet 26.11.2025 16:38:47
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix WARN_ON for monitor mode on some devices On devices without WANT_MONITOR_VIF (and probably without channel context support) we get a WARN_ON for changing the pe...
CVE-2025-38641
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:47
- Zuletzt bearbeitet 26.11.2025 16:37:03
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: Fix potential NULL dereference on kmalloc failure Avoid potential NULL pointer dereference by checking the return value of kmalloc and handling allocation failure...
CVE-2025-38640
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:46
- Zuletzt bearbeitet 26.11.2025 16:36:32
In the Linux kernel, the following vulnerability has been resolved: bpf: Disable migration in nf_hook_run_bpf(). syzbot reported that the netfilter bpf prog can be called without migration disabled in xmit path. Then the assertion in __bpf_prog_ru...
CVE-2025-38639
- EPSS 0.01%
- Veröffentlicht 22.08.2025 16:00:45
- Zuletzt bearbeitet 07.01.2026 16:25:53
In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_nfacct: don't assume acct name is null-terminated BUG: KASAN: slab-out-of-bounds in .. lib/vsprintf.c:721 Read of size 1 at addr ffff88801eac95c8 by task syz-executor...
CVE-2025-38638
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:44
- Zuletzt bearbeitet 26.11.2025 16:36:16
In the Linux kernel, the following vulnerability has been resolved: ipv6: add a retry logic in net6_rt_notify() inet6_rt_notify() can be called under RCU protection only. This means the route could be changed concurrently and rt6_fill_node() could ...
CVE-2025-38635
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:43
- Zuletzt bearbeitet 07.01.2026 16:27:05
In the Linux kernel, the following vulnerability has been resolved: clk: davinci: Add NULL check in davinci_lpsc_clk_register() devm_kasprintf() returns NULL when memory allocation fails. Currently, davinci_lpsc_clk_register() does not check for th...
CVE-2025-38636
- EPSS 0.01%
- Veröffentlicht 22.08.2025 16:00:43
- Zuletzt bearbeitet 26.11.2025 17:12:06
In the Linux kernel, the following vulnerability has been resolved: rv: Use strings in da monitors tracepoints Using DA monitors tracepoints with KASAN enabled triggers the following warning: BUG: KASAN: global-out-of-bounds in do_trace_event_raw...
CVE-2025-38634
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:42
- Zuletzt bearbeitet 07.01.2026 16:28:09
In the Linux kernel, the following vulnerability has been resolved: power: supply: cpcap-charger: Fix null check for power_supply_get_by_name In the cpcap_usb_detect() function, the power_supply_get_by_name() function may return `NULL` instead of a...
CVE-2025-38633
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:00:41
- Zuletzt bearbeitet 26.11.2025 17:11:58
In the Linux kernel, the following vulnerability has been resolved: clk: spacemit: mark K1 pll1_d8 as critical The pll1_d8 clock is enabled by the boot loader, and is ultimately a parent for numerous clocks, including those used by APB and AXI buse...