7.8

CVSS3.1

CVE-2025-38179 - smb: client: fix max_sge overflow in smb_extract_folioq_to_rdma()

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix max_sge overflow in smb_extract_folioq_to_rdma() This fixes the following problem: [ 749.901015] [ T8673] run fstests cifs/001 at 2025-06-17 09:40:30 [ 750.346409] [ T9870] ================================…

πŸ“… Published: July 4, 2025, midnight πŸ”„ Last Modified: Nov. 19, 2025, 9:01 p.m.

5.5

CVSS3.1

CVE-2025-38214 - fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var

In the Linux kernel, the following vulnerability has been resolved: fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var If fb_add_videomode() in fb_set_var() fails to allocate memory for fb_videomode, later it may lead to a null-ptr dereference in fb_videomode_to_var(), as the …

πŸ“… Published: July 4, 2025, midnight πŸ”„ Last Modified: Dec. 18, 2025, 9:10 p.m.

5.5

CVSS3.1

CVE-2025-38181 - calipso: Fix null-ptr-deref in calipso_req_{set,del}attr().

In the Linux kernel, the following vulnerability has been resolved: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr(). syzkaller reported a null-ptr-deref in sock_omalloc() while allocating a CALIPSO option. [0] The NULL is of struct sock, which was fetched by sk_to_full_sk() in calips…

πŸ“… Published: July 4, 2025, midnight πŸ”„ Last Modified: Dec. 18, 2025, 4:49 p.m.

4.7

CVSS3.1

CVE-2025-38217 - hwmon: (ftsteutates) Fix TOCTOU race in fts_read()

In the Linux kernel, the following vulnerability has been resolved: hwmon: (ftsteutates) Fix TOCTOU race in fts_read() In the fts_read() function, when handling hwmon_pwm_auto_channels_temp, the code accesses the shared variable data->fan_source[channel] twice without holding any locks. It is fir…

πŸ“… Published: July 4, 2025, midnight πŸ”„ Last Modified: Nov. 18, 2025, 3:21 p.m.

7.8

CVSS3.1

CVE-2025-38212 - ipc: fix to protect IPCS lookups using RCU

In the Linux kernel, the following vulnerability has been resolved: ipc: fix to protect IPCS lookups using RCU syzbot reported that it discovered a use-after-free vulnerability, [0] [0]: https://lore.kernel.org/all/[email protected]/ idr_for_each() is protected by rwse…

πŸ“… Published: July 4, 2025, midnight πŸ”„ Last Modified: Dec. 18, 2025, 9:11 p.m.

5.5

CVSS3.1

CVE-2025-38192 - net: clear the dst when changing skb protocol

In the Linux kernel, the following vulnerability has been resolved: net: clear the dst when changing skb protocol A not-so-careful NAT46 BPF program can crash the kernel if it indiscriminately flips ingress packets from v4 to v6: BUG: kernel NULL pointer dereference, address: 0000000000000000 …

πŸ“… Published: July 4, 2025, midnight πŸ”„ Last Modified: March 25, 2026, 11:16 a.m.

5.5

CVSS3.1

CVE-2025-38205 - drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1 [Why] If the dummy values in `populate_dummy_dml_surface_cfg()` aren't updated then they can lead to a divide by zero in downstream callers like CalculateVMAn…

πŸ“… Published: July 4, 2025, midnight πŸ”„ Last Modified: Nov. 18, 2025, 5:08 p.m.

5.5

CVSS3.1

CVE-2025-38186 - bnxt_en: Fix double invocation of bnxt_ulp_stop()/bnxt_ulp_start()

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix double invocation of bnxt_ulp_stop()/bnxt_ulp_start() Before the commit under the Fixes tag below, bnxt_ulp_stop() and bnxt_ulp_start() were always invoked in pairs. After that commit, the new bnxt_ulp_restart() can…

πŸ“… Published: July 4, 2025, midnight πŸ”„ Last Modified: Nov. 19, 2025, 8:55 p.m.

5.5

CVSS3.1

CVE-2025-38213 - kernel: vgacon: Add check for vc_origin address range in vgacon_scroll()

This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

πŸ“… Published: July 4, 2025, midnight πŸ”„ Last Modified: Aug. 11, 2025, 4:15 p.m.

7.8

CVSS3.1

CVE-2025-52496 -

Mbed TLS before 3.6.4 has a race condition in AESNI detection if certain compiler optimizations occur. An attacker may be able to extract an AES key from a multithreaded program, or perform a GCM forgery.

πŸ“… Published: July 4, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 8:19 p.m.
Total resulsts: 346643
Page 4544 of 34,665
Β« previous page Β» next page
Filters