0.0

CVE-2025-68759 - wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()

In the Linux kernel, the following vulnerability has been resolved: wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() In rtl8180_init_rx_ring(), memory is allocated for skb packets and DMA allocations in a loop. When an allocation fails, the previously successful allocations areโ€ฆ

๐Ÿ“… Published: Jan. 5, 2026, midnight ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

0.0

CVE-2025-68757 - drm/vgem-fence: Fix potential deadlock on release

In the Linux kernel, the following vulnerability has been resolved: drm/vgem-fence: Fix potential deadlock on release A timer that expires a vgem fence automatically in 10 seconds is now released with timer_delete_sync() from fence->ops.release() called on last dma_fence_put(). In some scenariosโ€ฆ

๐Ÿ“… Published: Jan. 5, 2026, midnight ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.5

CVSS3.1

CVE-2025-68756 - block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock

In the Linux kernel, the following vulnerability has been resolved: block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock blk_mq_{add,del}_queue_tag_set() functions add and remove queues from tagset, the functions make sure that tagset and queues are marked as shared when twโ€ฆ

๐Ÿ“… Published: Jan. 5, 2026, midnight ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.5

CVSS3.1

CVE-2025-68753 - ALSA: firewire-motu: add bounds check in put_user loop for DSP events

In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-motu: add bounds check in put_user loop for DSP events In the DSP event handling code, a put_user() loop copies event data. When the user buffer size is not aligned to 4 bytes, it could overwrite beyond the buffer โ€ฆ

๐Ÿ“… Published: Jan. 5, 2026, midnight ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

0.0

CVE-2025-68760 - iommu/amd: Fix potential out-of-bounds read in iommu_mmio_show

In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Fix potential out-of-bounds read in iommu_mmio_show In iommu_mmio_write(), it validates the user-provided offset with the check: `iommu->dbg_mmio_offset > iommu->mmio_phys_end - 4`. This assumes a 4-byte access. Howeveโ€ฆ

๐Ÿ“… Published: Jan. 5, 2026, midnight ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

9.1

CVSS3.1

CVE-2025-67397 -

An issue in Passy v.1.6.3 allows a remote authenticated attacker to execute arbitrary commands via a crafted HTTP request using a specific payload injection.

๐Ÿ“… Published: Jan. 5, 2026, midnight ๐Ÿ”„ Last Modified: Jan. 22, 2026, 9:12 p.m.

6.5

CVSS3.1

CVE-2025-65328 -

Mega-Fence (webgate-lib.*) 25.1.914 and prior trusts the first value of the X-Forwarded-For (XFF) header as the client IP without validating a trusted proxy chain. An attacker can supply an arbitrary XFF value in a remote request to spoof the client IP, which is then propagated to security-relevantโ€ฆ

๐Ÿ“… Published: Jan. 5, 2026, midnight ๐Ÿ”„ Last Modified: Jan. 30, 2026, 1:35 a.m.

8.4

CVSS3.1

CVE-2025-53966 -

An issue was discovered in Samsung Mobile Processor Exynos 1380, 1480, 2400, and 1580. Incorrect Handling of the NL80211 vendor command leads to a buffer overflow during handling of an IOCTL message.

๐Ÿ“… Published: Jan. 5, 2026, midnight ๐Ÿ”„ Last Modified: Jan. 9, 2026, 3:18 p.m.

0.0

CVE-2025-68761 - hfs: fix potential use after free in hfs_correct_next_unused_CNID()

In the Linux kernel, the following vulnerability has been resolved: hfs: fix potential use after free in hfs_correct_next_unused_CNID() This code calls hfs_bnode_put(node) which drops the refcount and then dreferences "node" on the next line. It's only safe to use "node" when we're holding a refโ€ฆ

๐Ÿ“… Published: Jan. 5, 2026, midnight ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.0

CVSS3.1

CVE-2025-68752 - iavf: Implement settime64 with -EOPNOTSUPP

In the Linux kernel, the following vulnerability has been resolved: iavf: Implement settime64 with -EOPNOTSUPP ptp_clock_settime() assumes every ptp_clock has implemented settime64(). Stub it with -EOPNOTSUPP to prevent a NULL dereference. The fix is similar to commit 329d050bbe63 ("gve: Implemeโ€ฆ

๐Ÿ“… Published: Jan. 5, 2026, midnight ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 347919
Page 2169 of 34,792
ยซ previous page ยป next page
Filters