- EPSS 0.04%
- Veröffentlicht 16.12.2025 14:45:05
- Zuletzt bearbeitet 11.01.2026 17:15:54
In the Linux kernel, the following vulnerability has been resolved: ksmbd: ipc: fix use-after-free in ipc_msg_send_request ipc_msg_send_request() waits for a generic netlink reply using an ipc_msg_table_entry on the stack. The generic netlink handl...
- EPSS 0.02%
- Veröffentlicht 16.12.2025 14:45:04
- Zuletzt bearbeitet 18.12.2025 15:08:06
In the Linux kernel, the following vulnerability has been resolved: crypto: zstd - fix double-free in per-CPU stream cleanup The crypto/zstd module has a double-free bug that occurs when multiple tfms are allocated and freed. The issue happens bec...
- EPSS 0.04%
- Veröffentlicht 16.12.2025 14:45:03
- Zuletzt bearbeitet 19.01.2026 13:16:09
In the Linux kernel, the following vulnerability has been resolved: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock() Fix a race between inline data destruction and block mapping. The function ext4_destroy_inline_data_nolock() c...
- EPSS 0.03%
- Veröffentlicht 16.12.2025 14:45:02
- Zuletzt bearbeitet 18.12.2025 15:08:06
In the Linux kernel, the following vulnerability has been resolved: rust_binder: fix race condition on death_list Rust Binder contains the following unsafe operation: // SAFETY: A `NodeDeath` is never inserted into the death list // of any node ...
- EPSS 0.04%
- Veröffentlicht 16.12.2025 14:45:01
- Zuletzt bearbeitet 11.01.2026 17:15:54
In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced When re-injecting a soft interrupt from an INT3, INT0, or (select) INTn instruction, discard the exception and r...
- EPSS 0.04%
- Veröffentlicht 16.12.2025 14:45:00
- Zuletzt bearbeitet 19.01.2026 13:16:09
In the Linux kernel, the following vulnerability has been resolved: comedi: multiq3: sanitize config options in multiq3_attach() Syzbot identified an issue [1] in multiq3_attach() that induces a task timeout due to open() or COMEDI_DEVCONFIG ioctl ...
- EPSS 0.04%
- Veröffentlicht 16.12.2025 14:44:59
- Zuletzt bearbeitet 19.01.2026 13:16:09
In the Linux kernel, the following vulnerability has been resolved: comedi: check device's attached status in compat ioctls Syzbot identified an issue [1] that crashes kernel, seemingly due to unexistent callback dev->get_valid_routes(). By all mea...
- EPSS 0.05%
- Veröffentlicht 16.12.2025 14:44:58
- Zuletzt bearbeitet 19.01.2026 13:16:09
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing The Supported Rates IE length from an incoming Association Request frame was used directly as the memcpy() le...
- EPSS 0.04%
- Veröffentlicht 16.12.2025 14:44:58
- Zuletzt bearbeitet 11.01.2026 17:15:53
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser The Information Element (IE) parser rtw_get_ie() trusted the length byte of each IE without validating that the IE...
- EPSS 0.03%
- Veröffentlicht 16.12.2025 14:44:57
- Zuletzt bearbeitet 19.01.2026 13:16:08
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing The Extended Supported Rates (ESR) IE handling in OnBeacon accessed *(p + 1 + ielen) and *(p + 2 + ielen) with...