CVE-2025-38443
- EPSS 0.02%
- Veröffentlicht 25.07.2025 16:15:29
- Zuletzt bearbeitet 22.12.2025 21:53:18
In the Linux kernel, the following vulnerability has been resolved: nbd: fix uaf in nbd_genl_connect() error path There is a use-after-free issue in nbd: block nbd6: Receive control failed (result -104) block nbd6: shutting down sockets ==========...
CVE-2025-38444
- EPSS 0.02%
- Veröffentlicht 25.07.2025 16:15:29
- Zuletzt bearbeitet 22.12.2025 21:53:30
In the Linux kernel, the following vulnerability has been resolved: raid10: cleanup memleak at raid10_make_request If raid10_read_request or raid10_write_request registers a new request and the REQ_NOWAIT flag is set, the code does not free the mal...
CVE-2025-38445
- EPSS 0.02%
- Veröffentlicht 25.07.2025 16:15:29
- Zuletzt bearbeitet 22.12.2025 21:53:40
In the Linux kernel, the following vulnerability has been resolved: md/raid1: Fix stack memory use after return in raid1_reshape In the raid1_reshape function, newpool is allocated on the stack and assigned to conf->r1bio_pool. This results in conf...
CVE-2025-38422
- EPSS 0.02%
- Veröffentlicht 25.07.2025 15:15:27
- Zuletzt bearbeitet 23.12.2025 18:41:32
In the Linux kernel, the following vulnerability has been resolved: net: lan743x: Modify the EEPROM and OTP size for PCI1xxxx devices Maximum OTP and EEPROM size for hearthstone PCI1xxxx devices are 8 Kb and 64 Kb respectively. Adjust max size defi...
CVE-2025-38424
- EPSS 0.02%
- Veröffentlicht 25.07.2025 15:15:27
- Zuletzt bearbeitet 23.12.2025 18:35:57
In the Linux kernel, the following vulnerability has been resolved: perf: Fix sample vs do_exit() Baisheng Gao reported an ARM64 crash, which Mark decoded as being a synchronous external abort -- most likely due to trying to access MMIO in bad ways...
CVE-2025-38425
- EPSS 0.02%
- Veröffentlicht 25.07.2025 15:15:27
- Zuletzt bearbeitet 23.12.2025 18:35:09
In the Linux kernel, the following vulnerability has been resolved: i2c: tegra: check msg length in SMBUS block read For SMBUS block read, do not continue to read if the message length passed from the device is '0' or greater than the maximum allow...
CVE-2025-38428
- EPSS 0.03%
- Veröffentlicht 25.07.2025 15:15:27
- Zuletzt bearbeitet 23.12.2025 18:28:26
In the Linux kernel, the following vulnerability has been resolved: Input: ims-pcu - check record size in ims_pcu_flash_firmware() The "len" variable comes from the firmware and we generally do trust firmware, but it's always better to double check...
CVE-2025-38430
- EPSS 0.03%
- Veröffentlicht 25.07.2025 15:15:27
- Zuletzt bearbeitet 22.12.2025 21:54:56
In the Linux kernel, the following vulnerability has been resolved: nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request If the request being processed is not a v4 compound request, then examining the cstate can have undefined resu...
CVE-2025-38420
- EPSS 0.02%
- Veröffentlicht 25.07.2025 15:15:26
- Zuletzt bearbeitet 23.12.2025 18:42:01
In the Linux kernel, the following vulnerability has been resolved: wifi: carl9170: do not ping device which has failed to load firmware Syzkaller reports [1, 2] crashes caused by an attempts to ping the device which has failed to load firmware. Si...
CVE-2025-38415
- EPSS 0.03%
- Veröffentlicht 25.07.2025 14:15:33
- Zuletzt bearbeitet 23.12.2025 18:45:31
In the Linux kernel, the following vulnerability has been resolved: Squashfs: check return result of sb_min_blocksize Syzkaller reports an "UBSAN: shift-out-of-bounds in squashfs_bio_read" bug. Syzkaller forks multiple processes which after mounti...