- EPSS 0.04%
- Veröffentlicht 15.10.2025 07:55:58
- Zuletzt bearbeitet 16.10.2025 15:29:11
In the Linux kernel, the following vulnerability has been resolved: futex: Prevent use-after-free during requeue-PI syzbot managed to trigger the following race: T1 T2 futex_wait_requeue_pi() futex_do_wait() ...
- EPSS 0.04%
- Veröffentlicht 15.10.2025 07:55:58
- Zuletzt bearbeitet 16.10.2025 15:29:11
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node" and then dereferences it on the next line...
- EPSS 0.03%
- Veröffentlicht 15.10.2025 07:55:57
- Zuletzt bearbeitet 16.10.2025 15:29:11
In the Linux kernel, the following vulnerability has been resolved: futex: Use correct exit on failure from futex_hash_allocate_default() copy_process() uses the wrong error exit path from futex_hash_allocate_default(). After exiting from futex_has...
- EPSS 0.03%
- Veröffentlicht 15.10.2025 07:55:56
- Zuletzt bearbeitet 16.10.2025 15:29:11
In the Linux kernel, the following vulnerability has been resolved: tracing/osnoise: Fix slab-out-of-bounds in _parse_integer_limit() When config osnoise cpus by write() syscall, the following KASAN splat may be observed: BUG: KASAN: slab-out-of-b...
- EPSS 0.03%
- Veröffentlicht 15.10.2025 07:55:56
- Zuletzt bearbeitet 16.10.2025 15:29:11
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix wrong index reference in smb2_compound_op() In smb2_compound_op(), the loop that processes each command's response uses wrong indices when accessing response buffe...
- EPSS 0.05%
- Veröffentlicht 15.10.2025 07:55:55
- Zuletzt bearbeitet 16.10.2025 15:29:11
In the Linux kernel, the following vulnerability has been resolved: i40e: add validation for ring_len param The `ring_len` parameter provided by the virtual function (VF) is assigned directly to the hardware memory context (HMC) without any validat...
- EPSS 0.05%
- Veröffentlicht 15.10.2025 07:55:54
- Zuletzt bearbeitet 16.10.2025 15:29:11
In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in config queues msg Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_vc_config_queues_msg().
- EPSS 0.05%
- Veröffentlicht 15.10.2025 07:55:54
- Zuletzt bearbeitet 16.10.2025 15:29:11
In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in i40e_validate_queue_map Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_validate_queue_map().
- EPSS 0.05%
- Veröffentlicht 15.10.2025 07:55:53
- Zuletzt bearbeitet 16.10.2025 15:29:11
In the Linux kernel, the following vulnerability has been resolved: i40e: fix input validation logic for action_meta Fix condition to check 'greater or equal' to prevent OOB dereference.
- EPSS 0.05%
- Veröffentlicht 15.10.2025 07:55:52
- Zuletzt bearbeitet 16.10.2025 15:29:11
In the Linux kernel, the following vulnerability has been resolved: i40e: add max boundary check for VF filters There is no check for max filters that VF can request. Add it.