CVE-2025-38684
- EPSS 0.02%
- Veröffentlicht 04.09.2025 15:32:38
- Zuletzt bearbeitet 12.05.2026 13:16:54
In the Linux kernel, the following vulnerability has been resolved: net/sched: ets: use old 'nbands' while purging unused classes Shuang reported sch_ets test-case [1] crashing in ets_class_qlen_notify() after recent changes from Lion [2]. The prob...
CVE-2025-38681
- EPSS 0.01%
- Veröffentlicht 04.09.2025 15:32:36
- Zuletzt bearbeitet 12.05.2026 13:16:54
In the Linux kernel, the following vulnerability has been resolved: mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() Memory hot remove unmaps and tears down various kernel page table regions as required. The ptdump code can race wi...
CVE-2025-38679
- EPSS 0.01%
- Veröffentlicht 04.09.2025 15:32:35
- Zuletzt bearbeitet 12.05.2026 13:16:54
In the Linux kernel, the following vulnerability has been resolved: media: venus: Fix OOB read due to missing payload bound check Currently, The event_seq_changed() handler processes a variable number of properties sent by the firmware. The number ...
CVE-2025-38680
- EPSS 0.02%
- Veröffentlicht 04.09.2025 15:32:35
- Zuletzt bearbeitet 12.05.2026 13:16:54
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() The buffer length check before calling uvc_parse_format() only ensured that the buffer has at least 3 bytes (bu...
CVE-2025-38677
- EPSS 0.02%
- Veröffentlicht 30.08.2025 09:19:02
- Zuletzt bearbeitet 12.05.2026 13:16:53
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid out-of-boundary access in dnode page As Jiaming Zhang reported: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x1c1/0x2a0 lib/dump_stack.c:...
CVE-2024-58240
- EPSS 0.02%
- Veröffentlicht 28.08.2025 10:15:31
- Zuletzt bearbeitet 12.05.2026 13:16:27
In the Linux kernel, the following vulnerability has been resolved: tls: separate no-async decryption request handling from async If we're not doing async, the handling is much simpler. There's no reference counting, we just need to wait for the co...
CVE-2025-38676
- EPSS 0.03%
- Veröffentlicht 26.08.2025 13:15:32
- Zuletzt bearbeitet 12.05.2026 13:16:52
In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Avoid stack buffer overflow from kernel cmdline While the kernel command line is considered trusted in most environments, avoid writing 1 byte past the end of "acpiid" i...
CVE-2025-38671
- EPSS 0.03%
- Veröffentlicht 22.08.2025 16:03:02
- Zuletzt bearbeitet 08.01.2026 22:30:42
In the Linux kernel, the following vulnerability has been resolved: i2c: qup: jump out of the loop in case of timeout Original logic only sets the return value but doesn't jump out of the loop if the bus is kept active by a client. This is not expe...
CVE-2025-38670
- EPSS 0.02%
- Veröffentlicht 22.08.2025 16:03:01
- Zuletzt bearbeitet 12.05.2026 13:16:52
In the Linux kernel, the following vulnerability has been resolved: arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() `cpu_switch_to()` and `call_on_irq_stack()` manipulate SP to change to different stacks along with the Shadow Call St...
CVE-2025-38668
- EPSS 0.03%
- Veröffentlicht 22.08.2025 16:02:59
- Zuletzt bearbeitet 08.01.2026 22:30:50
In the Linux kernel, the following vulnerability has been resolved: regulator: core: fix NULL dereference on unbind due to stale coupling data Failing to reset coupling_desc.n_coupled after freeing coupled_rdevs can lead to NULL pointer dereference...