5.5

CVSS3.1

CVE-2025-23141 - KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses Acquire a lock on kvm->srcu when userspace is getting MP state to handle a rather extreme edge case where "accepting" APIC events, i.e. processing pendin…

πŸ“… Published: May 1, 2025, midnight πŸ”„ Last Modified: May 4, 2025, 7:30 a.m.

5.5

CVSS3.1

CVE-2025-23143 - net: Fix null-ptr-deref by sock_lock_init_class_and_name() and rmmod.

In the Linux kernel, the following vulnerability has been resolved: net: Fix null-ptr-deref by sock_lock_init_class_and_name() and rmmod. When I ran the repro [0] and waited a few seconds, I observed two LOCKDEP splats: a warning immediately followed by a null-ptr-deref. [1] Reproduction Steps: …

πŸ“… Published: May 1, 2025, midnight πŸ”„ Last Modified: May 4, 2025, 7:30 a.m.

5.5

CVSS3.1

CVE-2025-23144 - backlight: led_bl: Hold led_access lock when calling led_sysfs_disable()

In the Linux kernel, the following vulnerability has been resolved: backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() Lockdep detects the following issue on led-backlight removal: [ 142.315935] ------------[ cut here ]------------ [ 142.315954] WARNING: CPU: 2 PID: 29…

πŸ“… Published: May 1, 2025, midnight πŸ”„ Last Modified: May 4, 2025, 7:30 a.m.

5.5

CVSS3.1

CVE-2025-23149 - tpm: do not start chip while suspended

In the Linux kernel, the following vulnerability has been resolved: tpm: do not start chip while suspended Checking TPM_CHIP_FLAG_SUSPENDED after the call to tpm_find_get_ops() can lead to a spurious tpm_chip_start() call: [35985.503771] i2c i2c-1: Transfer while suspended [35985.503796] WARNING…

πŸ“… Published: May 1, 2025, midnight πŸ”„ Last Modified: May 4, 2025, 1:07 p.m.

5.5

CVSS3.1

CVE-2025-23150 - ext4: fix off-by-one error in do_split

In the Linux kernel, the following vulnerability has been resolved: ext4: fix off-by-one error in do_split Syzkaller detected a use-after-free issue in ext4_insert_dentry that was caused by out-of-bounds access due to incorrect splitting in do_split. BUG: KASAN: use-after-free in ext4_insert_den…

πŸ“… Published: May 1, 2025, midnight πŸ”„ Last Modified: May 4, 2025, 1:07 p.m.

5.5

CVSS3.1

CVE-2025-23148 - soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe()

In the Linux kernel, the following vulnerability has been resolved: soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe() soc_dev_attr->revision could be NULL, thus, a pointer check is added to prevent potential NULL pointer dereference. This is similar to the fix in commit…

πŸ“… Published: May 1, 2025, midnight πŸ”„ Last Modified: May 4, 2025, 7:30 a.m.

5.5

CVSS3.1

CVE-2025-23153 - arm/crc-t10dif: fix use of out-of-scope array in crc_t10dif_arch()

In the Linux kernel, the following vulnerability has been resolved: arm/crc-t10dif: fix use of out-of-scope array in crc_t10dif_arch() Fix a silly bug where an array was used outside of its scope.

πŸ“… Published: May 1, 2025, midnight πŸ”„ Last Modified: May 4, 2025, 7:30 a.m.

5.5

CVSS3.1

CVE-2025-23155 - net: stmmac: Fix accessing freed irq affinity_hint

In the Linux kernel, the following vulnerability has been resolved: net: stmmac: Fix accessing freed irq affinity_hint The cpumask should not be a local variable, since its pointer is saved to irq_desc and may be accessed from procfs. To fix it, use the persistent mask cpumask_of(cpu#).

πŸ“… Published: May 1, 2025, midnight πŸ”„ Last Modified: May 4, 2025, 7:31 a.m.

5.5

CVSS3.1

CVE-2025-37738 - ext4: ignore xattrs past end

In the Linux kernel, the following vulnerability has been resolved: ext4: ignore xattrs past end Once inside 'ext4_xattr_inode_dec_ref_all' we should ignore xattrs entries past the 'end' entry. This fixes the following KASAN reported issue: ======================================================…

πŸ“… Published: May 1, 2025, midnight πŸ”„ Last Modified: May 4, 2025, 7:31 a.m.

5.5

CVSS3.1

CVE-2025-37739 - f2fs: fix to avoid out-of-bounds access in f2fs_truncate_inode_blocks()

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid out-of-bounds access in f2fs_truncate_inode_blocks() syzbot reports an UBSAN issue as below: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in fs/f2fs/node.h:381:10 index 184467440737095…

πŸ“… Published: May 1, 2025, midnight πŸ”„ Last Modified: May 4, 2025, 7:31 a.m.
Total resulsts: 292923
Page 101 of 29,293
Β« previous page Β» next page
Filters