CVE-2025-38344
- EPSS 0.01%
- Veröffentlicht 10.07.2025 08:15:12
- Zuletzt bearbeitet 16.12.2025 17:47:14
In the Linux kernel, the following vulnerability has been resolved: ACPICA: fix acpi parse and parseext cache leaks ACPICA commit 8829e70e1360c81e7a5a901b5d4f48330e021ea5 I'm Seunghun Han, and I work for National Security Research Institute of Sou...
CVE-2025-38342
- EPSS 0.02%
- Veröffentlicht 10.07.2025 08:15:11
- Zuletzt bearbeitet 16.12.2025 17:48:15
In the Linux kernel, the following vulnerability has been resolved: software node: Correct a OOB check in software_node_get_reference_args() software_node_get_reference_args() wants to get @index-th element, so the property value requires at least ...
CVE-2025-38337
- EPSS 0.03%
- Veröffentlicht 10.07.2025 08:15:08
- Zuletzt bearbeitet 16.12.2025 17:49:12
In the Linux kernel, the following vulnerability has been resolved: jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() Since handle->h_transaction may be a NULL pointer, so we should change it to call is_handle_aborted(handle) ...
CVE-2025-38335
- EPSS 0.02%
- Veröffentlicht 10.07.2025 08:15:07
- Zuletzt bearbeitet 16.12.2025 17:51:51
In the Linux kernel, the following vulnerability has been resolved: Input: gpio-keys - fix a sleep while atomic with PREEMPT_RT When enabling PREEMPT_RT, the gpio_keys_irq_timer() callback runs in hard irq context, but the input_event() takes a spi...
CVE-2025-38336
- EPSS 0.03%
- Veröffentlicht 10.07.2025 08:15:07
- Zuletzt bearbeitet 16.12.2025 17:50:25
In the Linux kernel, the following vulnerability has been resolved: ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330 The controller has a hardware bug that can hard hang the system when doing ATAPI DMAs without any trace of what happened...
CVE-2025-38334
- EPSS 0.02%
- Veröffentlicht 10.07.2025 08:15:06
- Zuletzt bearbeitet 16.12.2025 17:55:43
In the Linux kernel, the following vulnerability has been resolved: x86/sgx: Prevent attempts to reclaim poisoned pages TL;DR: SGX page reclaim touches the page to copy its contents to secondary storage. SGX instructions do not gracefully handle ma...
CVE-2025-38332
- EPSS 0.01%
- Veröffentlicht 10.07.2025 08:15:05
- Zuletzt bearbeitet 19.12.2025 16:56:27
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buf...
CVE-2025-38331
- EPSS 0.02%
- Veröffentlicht 10.07.2025 08:15:04
- Zuletzt bearbeitet 19.12.2025 16:56:03
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: cortina: Use TOE/TSO on all TCP It is desireable to push the hardware accelerator to also process non-segmented TCP frames: we pass the skb->len to the "TOE/TSO" off...
CVE-2025-38328
- EPSS 0.01%
- Veröffentlicht 10.07.2025 08:15:02
- Zuletzt bearbeitet 16.12.2025 17:56:47
In the Linux kernel, the following vulnerability has been resolved: jffs2: check jffs2_prealloc_raw_node_refs() result in few other places Fuzzing hit another invalid pointer dereference due to the lack of checking whether jffs2_prealloc_raw_node_r...
CVE-2025-38326
- EPSS 0.02%
- Veröffentlicht 10.07.2025 08:15:00
- Zuletzt bearbeitet 19.12.2025 16:55:45
In the Linux kernel, the following vulnerability has been resolved: aoe: clean device rq_list in aoedev_downdev() An aoe device's rq_list contains accepted block requests that are waiting to be transmitted to the aoe target. This queue was added as...