CVE-2025-38334
- EPSS 0.07%
- Veröffentlicht 10.07.2025 08:15:06
- Zuletzt bearbeitet 16.12.2025 17:55:43
In the Linux kernel, the following vulnerability has been resolved: x86/sgx: Prevent attempts to reclaim poisoned pages TL;DR: SGX page reclaim touches the page to copy its contents to secondary storage. SGX instructions do not gracefully handle ma...
CVE-2025-38332
- EPSS 0.05%
- Veröffentlicht 10.07.2025 08:15:05
- Zuletzt bearbeitet 19.12.2025 16:56:27
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buf...
CVE-2025-38331
- EPSS 0.07%
- Veröffentlicht 10.07.2025 08:15:04
- Zuletzt bearbeitet 19.12.2025 16:56:03
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: cortina: Use TOE/TSO on all TCP It is desireable to push the hardware accelerator to also process non-segmented TCP frames: we pass the skb->len to the "TOE/TSO" off...
CVE-2025-38328
- EPSS 0.06%
- Veröffentlicht 10.07.2025 08:15:02
- Zuletzt bearbeitet 16.12.2025 17:56:47
In the Linux kernel, the following vulnerability has been resolved: jffs2: check jffs2_prealloc_raw_node_refs() result in few other places Fuzzing hit another invalid pointer dereference due to the lack of checking whether jffs2_prealloc_raw_node_r...
CVE-2025-38326
- EPSS 0.07%
- Veröffentlicht 10.07.2025 08:15:00
- Zuletzt bearbeitet 19.12.2025 16:55:45
In the Linux kernel, the following vulnerability has been resolved: aoe: clean device rq_list in aoedev_downdev() An aoe device's rq_list contains accepted block requests that are waiting to be transmitted to the aoe target. This queue was added as...
CVE-2025-38323
- EPSS 0.05%
- Veröffentlicht 10.07.2025 08:14:58
- Zuletzt bearbeitet 19.12.2025 16:49:58
In the Linux kernel, the following vulnerability has been resolved: net: atm: add lec_mutex syzbot found its way in net/atm/lec.c, and found an error path in lecd_attach() could leave a dangling pointer in dev_lec[]. Add a mutex to protect dev_lec...
CVE-2025-38324
- EPSS 0.07%
- Veröffentlicht 10.07.2025 08:14:58
- Zuletzt bearbeitet 19.12.2025 16:55:13
In the Linux kernel, the following vulnerability has been resolved: mpls: Use rcu_dereference_rtnl() in mpls_route_input_rcu(). As syzbot reported [0], mpls_route_input_rcu() can be called from mpls_getroute(), where is under RTNL. net->mpls.platf...
CVE-2025-38322
- EPSS 0.1%
- Veröffentlicht 10.07.2025 08:14:57
- Zuletzt bearbeitet 12.05.2026 13:16:47
In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel: Fix crash in icl_update_topdown_event() The perf_fuzzer found a hard-lockup crash on a RaptorLake machine: Oops: general protection fault, maybe for address 0xff...
CVE-2025-38320
- EPSS 0.07%
- Veröffentlicht 10.07.2025 08:14:56
- Zuletzt bearbeitet 19.12.2025 16:44:34
In the Linux kernel, the following vulnerability has been resolved: arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth() KASAN reports a stack-out-of-bounds read in regs_get_kernel_stack_nth(). Call Trace: [ 97.283505] BUG: ...
CVE-2025-38319
- EPSS 0.07%
- Veröffentlicht 10.07.2025 07:42:25
- Zuletzt bearbeitet 19.12.2025 16:44:27
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table The function atomctrl_initialize_mc_reg_table() and atomctrl_initialize_mc_reg_table_v2_2() d...