CVE-2025-39945
- EPSS 0.03%
- Veröffentlicht 04.10.2025 07:31:07
- Zuletzt bearbeitet 23.01.2026 20:56:32
In the Linux kernel, the following vulnerability has been resolved: cnic: Fix use-after-free bugs in cnic_delete_task The original code uses cancel_delayed_work() in cnic_cm_stop_bnx2x_hw(), which does not guarantee that the delayed work item 'dele...
CVE-2025-39946
- EPSS 0.03%
- Veröffentlicht 04.10.2025 07:31:07
- Zuletzt bearbeitet 06.04.2026 13:30:51
In the Linux kernel, the following vulnerability has been resolved: tls: make sure to abort the stream if headers are bogus Normally we wait for the socket to buffer up the whole record before we service it. If the socket has a tiny buffer, however...
CVE-2025-39944
- EPSS 0.02%
- Veröffentlicht 04.10.2025 07:31:06
- Zuletzt bearbeitet 06.04.2026 13:31:16
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() The original code relies on cancel_delayed_work() in otx2_ptp_destroy(), which does not ensure that the delayed work ite...
CVE-2025-39943
- EPSS 0.02%
- Veröffentlicht 04.10.2025 07:31:05
- Zuletzt bearbeitet 06.04.2026 13:28:48
In the Linux kernel, the following vulnerability has been resolved: ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer If data_offset and data_length of smb_direct_data_transfer struct are invalid, out of bound...
CVE-2025-39941
- EPSS 0.01%
- Veröffentlicht 04.10.2025 07:31:04
- Zuletzt bearbeitet 23.01.2026 20:37:16
In the Linux kernel, the following vulnerability has been resolved: zram: fix slot write race condition Parallel concurrent writes to the same zram index result in leaked zsmalloc handles. Schematically we can have something like this: CPU0 ...
CVE-2025-39942
- EPSS 0.02%
- Veröffentlicht 04.10.2025 07:31:04
- Zuletzt bearbeitet 25.03.2026 00:45:27
In the Linux kernel, the following vulnerability has been resolved: ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size This is inspired by the check for data_offset + data_length.
CVE-2025-39940
- EPSS 0.01%
- Veröffentlicht 04.10.2025 07:31:03
- Zuletzt bearbeitet 23.01.2026 20:35:34
In the Linux kernel, the following vulnerability has been resolved: dm-stripe: fix a possible integer overflow There's a possible integer overflow in stripe_io_hints if we have too large chunk size. Test if the overflow happened, and if it did, don...
CVE-2025-39939
- EPSS 0.02%
- Veröffentlicht 04.10.2025 07:31:02
- Zuletzt bearbeitet 25.03.2026 00:44:47
In the Linux kernel, the following vulnerability has been resolved: iommu/s390: Fix memory corruption when using identity domain zpci_get_iommu_ctrs() returns counter information to be reported as part of device statistics; these counters are store...
CVE-2025-39938
- EPSS 0.02%
- Veröffentlicht 04.10.2025 07:31:01
- Zuletzt bearbeitet 23.01.2026 20:34:30
In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed If earlier opening of source graph fails (e.g. ADSP rejects due to incorrect audioreach topology),...
CVE-2025-39937
- EPSS 0.03%
- Veröffentlicht 04.10.2025 07:31:00
- Zuletzt bearbeitet 25.03.2026 00:46:04
In the Linux kernel, the following vulnerability has been resolved: net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer Since commit 7d5e9737efda ("net: rfkill: gpio: get the name and type from device property") rfkill_find_ty...