CVE-2025-37901
- EPSS 0.03%
- Veröffentlicht 20.05.2025 15:21:36
- Zuletzt bearbeitet 17.11.2025 18:08:31
In the Linux kernel, the following vulnerability has been resolved: irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs On Qualcomm chipsets not all GPIOs are wakeup capable. Those GPIOs do not have a corresponding MPM pin and shou...
- EPSS 0.02%
- Veröffentlicht 20.05.2025 15:21:36
- Zuletzt bearbeitet 26.05.2025 11:15:24
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2025-37900
- EPSS 0.01%
- Veröffentlicht 20.05.2025 15:21:35
- Zuletzt bearbeitet 19.11.2025 14:43:49
In the Linux kernel, the following vulnerability has been resolved: iommu: Fix two issues in iommu_copy_struct_from_user() In the review for iommu_copy_struct_to_user() helper, Matt pointed out that a NULL pointer should be rejected prior to derefe...
CVE-2025-37898
- EPSS 0.02%
- Veröffentlicht 20.05.2025 15:21:34
- Zuletzt bearbeitet 19.11.2025 14:39:34
In the Linux kernel, the following vulnerability has been resolved: powerpc64/ftrace: fix module loading without patchable function entries get_stubs_size assumes that there must always be at least one patchable function entry, which is not always ...
CVE-2025-37899
- EPSS 0.01%
- Veröffentlicht 20.05.2025 15:21:34
- Zuletzt bearbeitet 06.12.2025 22:15:50
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in session logoff The sess->user object can currently be in use by another thread, for example if another connection has sent a session setup request to b...
CVE-2025-37897
- EPSS 0.02%
- Veröffentlicht 20.05.2025 15:21:33
- Zuletzt bearbeitet 19.11.2025 14:37:37
In the Linux kernel, the following vulnerability has been resolved: wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release plfxlc_mac_release() asserts that mac->lock is held. This assertion is incorrect, because even if it was possible, it wo...
CVE-2025-37895
- EPSS 0.01%
- Veröffentlicht 20.05.2025 15:21:32
- Zuletzt bearbeitet 18.11.2025 13:42:21
In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix error handling path in bnxt_init_chip() WARN_ON() is triggered in __flush_work() if bnxt_init_chip() fails because we call cancel_work_sync() on dim work that has not ...
CVE-2025-37896
- EPSS 0.02%
- Veröffentlicht 20.05.2025 15:21:32
- Zuletzt bearbeitet 17.11.2025 19:31:17
In the Linux kernel, the following vulnerability has been resolved: spi: spi-mem: Add fix to avoid divide error For some SPI flash memory operations, dummy bytes are not mandatory. For example, in Winbond SPINAND flash memory devices, the `write_ca...
CVE-2025-37894
- EPSS 0.01%
- Veröffentlicht 20.05.2025 15:21:31
- Zuletzt bearbeitet 12.11.2025 20:37:14
In the Linux kernel, the following vulnerability has been resolved: net: use sock_gen_put() when sk_state is TCP_TIME_WAIT It is possible for a pointer of type struct inet_timewait_sock to be returned from the functions __inet_lookup_established() ...
CVE-2025-37892
- EPSS 0.01%
- Veröffentlicht 20.05.2025 11:15:48
- Zuletzt bearbeitet 12.11.2025 20:35:43
In the Linux kernel, the following vulnerability has been resolved: mtd: inftlcore: Add error check for inftl_read_oob() In INFTL_findwriteunit(), the return value of inftl_read_oob() need to be checked. A proper implementation can be found in INFT...