CVE-2025-38066
- EPSS 0.02%
- Veröffentlicht 18.06.2025 09:33:44
- Zuletzt bearbeitet 17.12.2025 19:18:44
In the Linux kernel, the following vulnerability has been resolved: dm cache: prevent BUG_ON by blocking retries on failed device resumes A cache device failing to resume due to mapping errors should not be retried, as the failure leaves a partiall...
CVE-2025-38062
- EPSS 0.03%
- Veröffentlicht 18.06.2025 09:33:41
- Zuletzt bearbeitet 18.12.2025 21:31:24
In the Linux kernel, the following vulnerability has been resolved: genirq/msi: Store the IOMMU IOVA directly in msi_desc instead of iommu_cookie The IOMMU translation for MSI message addresses has been a 2-step process, separated in time: 1) iom...
CVE-2025-38063
- EPSS 0.02%
- Veröffentlicht 18.06.2025 09:33:41
- Zuletzt bearbeitet 17.12.2025 19:18:05
In the Linux kernel, the following vulnerability has been resolved: dm: fix unconditional IO throttle caused by REQ_PREFLUSH When a bio with REQ_PREFLUSH is submitted to dm, __send_empty_flush() generates a flush_bio with REQ_OP_WRITE | REQ_PREFLUS...
CVE-2025-38061
- EPSS 0.03%
- Veröffentlicht 18.06.2025 09:33:40
- Zuletzt bearbeitet 18.12.2025 21:31:45
In the Linux kernel, the following vulnerability has been resolved: net: pktgen: fix access outside of user given buffer in pktgen_thread_write() Honour the user given buffer size for the strn_len() calls (otherwise strn_len() will access memory ou...
CVE-2025-38058
- EPSS 0.02%
- Veröffentlicht 18.06.2025 09:33:38
- Zuletzt bearbeitet 18.12.2025 21:32:24
In the Linux kernel, the following vulnerability has been resolved: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock ... or we risk stealing final mntput from sync umount - raising mnt_count after umount(2) has verified that...
CVE-2025-38052
- EPSS 0.02%
- Veröffentlicht 18.06.2025 09:33:33
- Zuletzt bearbeitet 17.12.2025 18:27:06
In the Linux kernel, the following vulnerability has been resolved: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done Syzbot reported a slab-use-after-free with the following call trace: ===========================================...
- EPSS 0.02%
- Veröffentlicht 18.06.2025 09:33:32
- Zuletzt bearbeitet 12.01.2026 13:11:24
In the Linux kernel, the following vulnerability has been resolved: smb: client: Fix use-after-free in cifs_fill_dirent There is a race condition in the readdir concurrency process, which may access the rsp buffer after it has been released, trigge...
CVE-2025-38048
- EPSS 0.02%
- Veröffentlicht 18.06.2025 09:33:31
- Zuletzt bearbeitet 17.12.2025 18:17:05
In the Linux kernel, the following vulnerability has been resolved: virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN syzbot reports a data-race when accessing the event_triggered, here is the simplified stack when the issue o...
CVE-2025-38044
- EPSS 0.03%
- Veröffentlicht 18.06.2025 09:33:28
- Zuletzt bearbeitet 17.12.2025 18:15:57
In the Linux kernel, the following vulnerability has been resolved: media: cx231xx: set device_caps for 417 The video_device for the MPEG encoder did not set device_caps. Add this, otherwise the video device can't be registered (you get a WARN_ON ...
CVE-2025-38043
- EPSS 0.03%
- Veröffentlicht 18.06.2025 09:33:27
- Zuletzt bearbeitet 17.12.2025 18:11:32
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_ffa: Set dma_mask for ffa devices Set dma_mask for FFA devices, otherwise DMA allocation using the device pointer lead to following warning: WARNING: CPU: 1 PID: 1 a...