CVE-2025-21739
- EPSS 0.01%
- Veröffentlicht 27.02.2025 03:15:14
- Zuletzt bearbeitet 18.04.2026 09:16:09
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix use-after free in init error and remove paths devm_blk_crypto_profile_init() registers a cleanup handler to run when the associated (platform-) device is being...
CVE-2025-21732
- EPSS 0.01%
- Veröffentlicht 27.02.2025 03:15:13
- Zuletzt bearbeitet 28.10.2025 20:41:47
In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error This patch addresses a race condition for an ODP MR that can result in a CQE with an error on the UMR QP. During ...
CVE-2024-58011
- EPSS 0.01%
- Veröffentlicht 27.02.2025 03:15:12
- Zuletzt bearbeitet 03.11.2025 20:16:58
In the Linux kernel, the following vulnerability has been resolved: platform/x86: int3472: Check for adev == NULL Not all devices have an ACPI companion fwnode, so adev might be NULL. This can e.g. (theoretically) happen when a user manually binds ...
CVE-2024-58012
- EPSS 0.01%
- Veröffentlicht 27.02.2025 03:15:12
- Zuletzt bearbeitet 01.10.2025 21:16:40
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params Each cpu DAI should associate with a widget. However, the topology might not create the right number of DAI widg...
CVE-2024-58013
- EPSS 0.01%
- Veröffentlicht 27.02.2025 03:15:12
- Zuletzt bearbeitet 03.11.2025 20:16:58
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync This fixes the following crash: ================================================================== BU...
CVE-2024-58014
- EPSS 0.01%
- Veröffentlicht 27.02.2025 03:15:12
- Zuletzt bearbeitet 12.05.2026 13:16:26
In the Linux kernel, the following vulnerability has been resolved: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() In 'wlc_phy_iqcal_gainparams_nphy()', add gain range check to WARN() instead of possible out-of-bounds 'tbl_...
CVE-2024-58016
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:12
- Zuletzt bearbeitet 12.05.2026 13:16:26
In the Linux kernel, the following vulnerability has been resolved: safesetid: check size of policy writes syzbot attempts to write a buffer with a large size to a sysfs entry with writes handled by handle_policy_update(), triggering a warning in k...
CVE-2024-58017
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:12
- Zuletzt bearbeitet 12.05.2026 13:16:26
In the Linux kernel, the following vulnerability has been resolved: printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX Shifting 1 << 31 on a 32-bit int causes signed integer overflow, which leads to undefined behavior. To prevent thi...
CVE-2024-58020
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:12
- Zuletzt bearbeitet 12.05.2026 13:16:26
In the Linux kernel, the following vulnerability has been resolved: HID: multitouch: Add NULL check in mt_input_configured devm_kasprintf() can return a NULL pointer on failure,but this returned value in mt_input_configured() is not checked. Add NU...
CVE-2024-58001
- EPSS 0.02%
- Veröffentlicht 27.02.2025 03:15:11
- Zuletzt bearbeitet 03.11.2025 20:16:57
In the Linux kernel, the following vulnerability has been resolved: ocfs2: handle a symlink read error correctly Patch series "Convert ocfs2 to use folios". Mark did a conversion of ocfs2 to use folios and sent it to me as a giant patch for review...