CVE-2025-39961
- EPSS 0.01%
- Veröffentlicht 09.10.2025 12:13:22
- Zuletzt bearbeitet 26.02.2026 23:03:20
In the Linux kernel, the following vulnerability has been resolved: iommu/amd/pgtbl: Fix possible race while increase page table level The AMD IOMMU host page table implementation supports dynamic page table levels (up to 6 levels), starting with a...
CVE-2025-39958
- EPSS 0.02%
- Veröffentlicht 09.10.2025 09:47:35
- Zuletzt bearbeitet 26.02.2026 22:51:27
In the Linux kernel, the following vulnerability has been resolved: iommu/s390: Make attach succeed when the device was surprise removed When a PCI device is removed with surprise hotplug, there may still be attempts to attach the device to the def...
CVE-2025-39957
- EPSS 0.02%
- Veröffentlicht 09.10.2025 09:47:34
- Zuletzt bearbeitet 26.02.2026 22:50:44
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: increase scan_ies_len for S1G Currently the S1G capability element is not taken into account for the scan_ies_len, which leads to a buffer length validation failure...
CVE-2025-39955
- EPSS 0.02%
- Veröffentlicht 09.10.2025 09:47:33
- Zuletzt bearbeitet 26.02.2026 23:10:35
In the Linux kernel, the following vulnerability has been resolved: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). syzbot reported the splat below where a socket had tcp_sk(sk)->fastopen_rsk in the TCP_ESTABLISHED state. [0] syzbot reuse...
CVE-2022-50551
- EPSS 0.02%
- Veröffentlicht 07.10.2025 15:21:13
- Zuletzt bearbeitet 26.02.2026 23:17:54
In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Fix potential shift-out-of-bounds in brcmf_fw_alloc_request() This patch fixes a shift-out-of-bounds in brcmfmac that occurs in BIT(chiprev) when a 'chiprev' provid...
CVE-2023-53642
- EPSS 0.02%
- Veröffentlicht 07.10.2025 15:19:41
- Zuletzt bearbeitet 03.02.2026 22:29:48
In the Linux kernel, the following vulnerability has been resolved: x86: fix clear_user_rep_good() exception handling annotation This code no longer exists in mainline, because it was removed in commit d2c95f9d6802 ("x86: don't use REP_GOOD or ERMS...
CVE-2025-39953
- EPSS 0.03%
- Veröffentlicht 04.10.2025 07:31:13
- Zuletzt bearbeitet 23.01.2026 20:01:35
In the Linux kernel, the following vulnerability has been resolved: cgroup: split cgroup_destroy_wq into 3 workqueues A hung task can occur during [1] LTP cgroup testing when repeatedly mounting/unmounting perf_event and net_prio controllers with s...
CVE-2025-39952
- EPSS 0.02%
- Veröffentlicht 04.10.2025 07:31:12
- Zuletzt bearbeitet 23.01.2026 20:02:35
In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: avoid buffer overflow in WID string configuration Fix the following copy overflow warning identified by Smatch checker. drivers/net/wireless/microchip/wilc1000/wl...
CVE-2025-39951
- EPSS 0.02%
- Veröffentlicht 04.10.2025 07:31:11
- Zuletzt bearbeitet 23.01.2026 20:03:14
In the Linux kernel, the following vulnerability has been resolved: um: virtio_uml: Fix use-after-free after put_device in probe When register_virtio_device() fails in virtio_uml_probe(), the code sets vu_dev->registered = 1 even though the device ...
CVE-2025-39949
- EPSS 0.02%
- Veröffentlicht 04.10.2025 07:31:10
- Zuletzt bearbeitet 25.03.2026 00:36:02
In the Linux kernel, the following vulnerability has been resolved: qed: Don't collect too many protection override GRC elements In the protection override dump path, the firmware can return far too many GRC elements, resulting in attempting to wri...