7.8

CVSS3.1

CVE-2022-50164 - wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue After successfull station association, if station queues are disabled for some reason, the related lists are not emptied. So if some new element is added to the…

πŸ“… Published: June 18, 2025, midnight πŸ”„ Last Modified: Nov. 18, 2025, 9:18 p.m.

5.5

CVSS3.1

CVE-2022-50124 - ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe

In the Linux kernel, the following vulnerability has been resolved: ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid re…

πŸ“… Published: June 18, 2025, midnight πŸ”„ Last Modified: Nov. 18, 2025, 6:12 p.m.

5.5

CVSS3.1

CVE-2022-49942 - wifi: mac80211: Don't finalize CSA in IBSS mode if state is disconnected

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Don't finalize CSA in IBSS mode if state is disconnected When we are not connected to a channel, sending channel "switch" announcement doesn't make any sense. The BSS list is empty in that case. This causes the f…

πŸ“… Published: June 18, 2025, midnight πŸ”„ Last Modified: Nov. 14, 2025, 7:40 p.m.

7.1

CVSS3.1

CVE-2022-50094 - spmi: trace: fix stack-out-of-bound access in SPMI tracing functions

In the Linux kernel, the following vulnerability has been resolved: spmi: trace: fix stack-out-of-bound access in SPMI tracing functions trace_spmi_write_begin() and trace_spmi_read_end() both call memcpy() with a length of "len + 1". This leads to one extra byte being read beyond the end of the…

πŸ“… Published: June 18, 2025, midnight πŸ”„ Last Modified: Nov. 18, 2025, 2:45 a.m.

5.5

CVSS3.1

CVE-2025-38080 - drm/amd/display: Increase block_sequence array size

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Increase block_sequence array size [Why] It's possible to generate more than 50 steps in hwss_build_fast_sequence, for example with a 6-pipe asic where all pipes are in one MPC chain. This overflows the block_seq…

πŸ“… Published: June 18, 2025, midnight πŸ”„ Last Modified: Nov. 14, 2025, 8:18 p.m.

5.5

CVSS3.1

CVE-2025-38067 - rseq: Fix segfault on registration when rseq_cs is non-zero

In the Linux kernel, the following vulnerability has been resolved: rseq: Fix segfault on registration when rseq_cs is non-zero The rseq_cs field is documented as being set to 0 by user-space prior to registration, however this is not currently enforced by the kernel. This can result in a segfaul…

πŸ“… Published: June 18, 2025, midnight πŸ”„ Last Modified: Dec. 17, 2025, 6:52 p.m.

5.5

CVSS3.1

CVE-2025-38057 - espintcp: fix skb leaks

In the Linux kernel, the following vulnerability has been resolved: espintcp: fix skb leaks A few error paths are missing a kfree_skb.

πŸ“… Published: June 18, 2025, midnight πŸ”„ Last Modified: March 17, 2026, 1:22 p.m.

7.8

CVSS3.1

CVE-2022-49975 - bpf: Don't redirect packets with invalid pkt_len

In the Linux kernel, the following vulnerability has been resolved: bpf: Don't redirect packets with invalid pkt_len Syzbot found an issue [1]: fq_codel_drop() try to drop a flow whitout any skbs, that is, the flow->head is null. The root cause, as the [2] says, is because that bpf_prog_test_run_…

πŸ“… Published: June 18, 2025, midnight πŸ”„ Last Modified: Dec. 23, 2025, 1:26 p.m.

5.5

CVSS3.1

CVE-2025-38006 - net: mctp: Don't access ifa_index when missing

In the Linux kernel, the following vulnerability has been resolved: net: mctp: Don't access ifa_index when missing In mctp_dump_addrinfo, ifa_index can be used to filter interfaces, but only when the struct ifaddrmsg is provided. Otherwise it will be comparing to uninitialised memory - reproducib…

πŸ“… Published: June 18, 2025, midnight πŸ”„ Last Modified: Nov. 14, 2025, 4:42 p.m.

5.5

CVSS3.1

CVE-2025-38016 - HID: bpf: abort dispatch if device destroyed

In the Linux kernel, the following vulnerability has been resolved: HID: bpf: abort dispatch if device destroyed The current HID bpf implementation assumes no output report/request will go through it after hid_bpf_destroy_device() has been called. This leads to a bug that unplugging certain types…

πŸ“… Published: June 18, 2025, midnight πŸ”„ Last Modified: Nov. 14, 2025, 7:01 p.m.
Total resulsts: 343923
Page 4455 of 34,393
Β« previous page Β» next page
Filters