7.1

CVSS3.1

CVE-2024-58015 - wifi: ath12k: Fix for out-of bound access error

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible out-of bound memory e…

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: Oct. 22, 2025, 7:37 p.m.

7.8

CVSS3.1

CVE-2025-21722 - nilfs2: do not force clear folio if buffer is referenced

In the Linux kernel, the following vulnerability has been resolved: nilfs2: do not force clear folio if buffer is referenced Patch series "nilfs2: protect busy buffer heads from being force-cleared". This series fixes the buffer head state inconsistency issues reported by syzbot that occurs when…

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 8:17 p.m.

7.8

CVSS3.1

CVE-2024-54456 - NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client()

In the Linux kernel, the following vulnerability has been resolved: NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client() name is char[64] where the size of clnt->cl_program->name remains unknown. Invoking strcat() directly will also lead to potential buffer overflow. Change them to st…

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: Oct. 23, 2025, 1:05 p.m.

7.8

CVSS3.1

CVE-2025-21780 - drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() It malicious user provides a small pptable through sysfs and then a bigger pptable, it may cause buffer overflow attack in function smu_sys_set_pp_table().

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:19 p.m.

7.1

CVSS3.1

CVE-2024-58014 - wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()

In the Linux kernel, the following vulnerability has been resolved: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() In 'wlc_phy_iqcal_gainparams_nphy()', add gain range check to WARN() instead of possible out-of-bounds 'tbl_iqcal_gainparams_nphy' access. Compile tested onl…

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 8:16 p.m.

5.5

CVSS3.1

CVE-2025-21795 - NFSD: fix hang in nfsd4_shutdown_callback

In the Linux kernel, the following vulnerability has been resolved: NFSD: fix hang in nfsd4_shutdown_callback If nfs4_client is in courtesy state then there is no point to send the callback. This causes nfsd4_shutdown_callback to hang since cl_cb_inflight is not 0. This hang lasts about 15 minute…

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:19 p.m.

7.1

CVSS3.1

CVE-2025-21741 - usbnet: ipheth: fix DPE OoB read

In the Linux kernel, the following vulnerability has been resolved: usbnet: ipheth: fix DPE OoB read Fix an out-of-bounds DPE read, limit the number of processed DPEs to the amount that fits into the fixed-size NDP16 header.

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: Oct. 1, 2025, 8:18 p.m.

5.5

CVSS3.1

CVE-2024-57973 - rdma/cxgb4: Prevent potential integer overflow on 32bit

In the Linux kernel, the following vulnerability has been resolved: rdma/cxgb4: Prevent potential integer overflow on 32bit The "gl->tot_len" variable is controlled by the user. It comes from process_responses(). On 32bit systems, the "gl->tot_len + sizeof(struct cpl_pass_accept_req) + sizeof(s…

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 8:16 p.m.

5.5

CVSS3.1

CVE-2025-21779 - KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel Advertise support for Hyper-V's SEND_IPI and SEND_IPI_EX hypercalls if and only if the local API is emulated/virtualized by KVM, and explicitly reject s…

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:19 p.m.

5.5

CVSS3.1

CVE-2024-58008 - KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y

In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y With vmalloc stack addresses enabled (CONFIG_VMAP_STACK=y) DCP trusted keys can crash during en- and decryption of the blob encryption key via the DCP crypto driver…

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: Oct. 23, 2025, 1:03 p.m.
Total resulsts: 345135
Page 6135 of 34,514
Β« previous page Β» next page
Filters