- EPSS 0.05%
- Veröffentlicht 24.12.2025 12:23:00
- Zuletzt bearbeitet 15.04.2026 00:35:42
In the Linux kernel, the following vulnerability has been resolved: ubifs: Fix memleak when insert_old_idx() failed Following process will cause a memleak for copied up znode: dirty_cow_znode zn = copy_znode(c, znode); err = insert_old_idx(c, ...
- EPSS 0.06%
- Veröffentlicht 24.12.2025 12:22:59
- Zuletzt bearbeitet 15.04.2026 00:35:42
In the Linux kernel, the following vulnerability has been resolved: rpmsg: glink: Add check for kstrdup Add check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference.
- EPSS 0.03%
- Veröffentlicht 24.12.2025 12:22:58
- Zuletzt bearbeitet 15.04.2026 00:35:42
In the Linux kernel, the following vulnerability has been resolved: drm/rockchip: dw_hdmi: cleanup drm encoder during unbind This fixes a use-after-free crash during rmmod. The DRM encoder is embedded inside the larger rockchip_hdmi, which is allo...
- EPSS 0.03%
- Veröffentlicht 24.12.2025 12:22:58
- Zuletzt bearbeitet 15.04.2026 00:35:42
In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Prevent handling any completions after qp destroy HW may generate completions that indicates QP is destroyed. Driver should not be scheduling any more completion hand...
- EPSS 0.06%
- Veröffentlicht 24.12.2025 12:22:56
- Zuletzt bearbeitet 15.04.2026 00:35:42
In the Linux kernel, the following vulnerability has been resolved: spmi: Add a check for remove callback when removing a SPMI driver When removing a SPMI driver, there can be a crash due to NULL pointer dereference if it does not have a remove cal...
- EPSS 0.06%
- Veröffentlicht 24.12.2025 12:22:56
- Zuletzt bearbeitet 15.04.2026 00:35:42
In the Linux kernel, the following vulnerability has been resolved: audit: fix possible soft lockup in __audit_inode_child() Tracefs or debugfs maybe cause hundreds to thousands of PATH records, too many PATH records maybe cause soft lockup. For e...
- EPSS 0.03%
- Veröffentlicht 24.12.2025 12:22:54
- Zuletzt bearbeitet 15.04.2026 00:35:42
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: do not run mt76u_status_worker if the device is not running Fix the following NULL pointer dereference avoiding to run mt76u_status_worker thread if the device is not r...
- EPSS 0.05%
- Veröffentlicht 24.12.2025 12:22:46
- Zuletzt bearbeitet 15.04.2026 00:35:42
In the Linux kernel, the following vulnerability has been resolved: regulator: core: fix resource leak in regulator_register() I got some resource leak reports while doing fault injection test: OF: ERROR: memory leak, expected refcount 1 instead...
- EPSS 0.03%
- Veröffentlicht 24.12.2025 12:22:43
- Zuletzt bearbeitet 15.04.2026 00:35:42
In the Linux kernel, the following vulnerability has been resolved: x86/apic: Don't disable x2APIC if locked The APIC supports two modes, legacy APIC (or xAPIC), and Extended APIC (or x2APIC). X2APIC mode is mostly compatible with legacy APIC, but...
- EPSS 0.05%
- Veröffentlicht 24.12.2025 12:22:41
- Zuletzt bearbeitet 15.04.2026 00:35:42
In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds check on Transfer Tag ttag is used as an index to get cmd in nvmet_tcp_handle_h2c_data_pdu(), add a bounds check to avoid out-of-bounds access.