5.5

CVSS3.1

CVE-2025-21873 - scsi: ufs: core: bsg: Fix crash when arpmb command fails

In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: bsg: Fix crash when arpmb command fails If the device doesn't support arpmb we'll crash due to copying user data in bsg_transport_sg_io_fn(). In the case where ufs_bsg_exec_advanced_rpmb_req() returns an error, …

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: Oct. 30, 2025, 4:19 p.m.

5.5

CVSS3.1

CVE-2024-58091 - drm/fbdev-dma: Add shadow buffering for deferred I/O

In the Linux kernel, the following vulnerability has been resolved: drm/fbdev-dma: Add shadow buffering for deferred I/O DMA areas are not necessarily backed by struct page, so we cannot rely on it for deferred I/O. Allocate a shadow buffer for drivers that require deferred I/O and use it as fram…

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: Oct. 31, 2025, 4:21 p.m.

5.5

CVSS3.1

CVE-2023-53015 - HID: betop: check shape of output reports

In the Linux kernel, the following vulnerability has been resolved: HID: betop: check shape of output reports betopff_init() only checks the total sum of the report counts for each report field to be at least 4, but hid_betopff_play() expects 4 report fields. A device advertising an output report…

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: Oct. 1, 2025, 6:15 p.m.

7.5

CVSS3.1

CVE-2025-29487 -

An out-of-memory error in the parseABC_STRING_INFO function of libming v0.4.8 allows attackers to cause a Denial of Service (DoS) due to allocator exhaustion.

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: April 1, 2025, 6:39 p.m.

7.5

CVSS3.1

CVE-2025-29072 -

An integer overflow in Nethermind Juno before v.12.05 within the Sierra bytecode decompression logic within the "cairo-lang-starknet-classes" library could allow remote attackers to trigger an infinite loop (and high CPU usage) by submitting a malicious Declare v2/v3 transaction. This results in a …

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: April 11, 2025, 5:20 p.m.

4.3

CVSS3.1

CVE-2025-2842 - Tempo-operator: tempo operator token exposition lead to read sensitive data

A flaw was found in the Tempo Operator. When the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Tempo Operator, the Operator creates a ClusterRoleBinding for the Service Account of the Tempo instance to grant the cluster-monitoring-view ClusterRole. This can be ex…

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.5

CVSS3.1

CVE-2023-53028 - Revert "wifi: mac80211: fix memory leak in ieee80211_if_add()"

In the Linux kernel, the following vulnerability has been resolved: Revert "wifi: mac80211: fix memory leak in ieee80211_if_add()" This reverts commit 13e5afd3d773c6fc6ca2b89027befaaaa1ea7293. ieee80211_if_free() is already called from free_netdev(ndev) because ndev->priv_destructor == ieee80211…

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: Oct. 1, 2025, 6:15 p.m.

5.5

CVSS3.1

CVE-2023-52997 - ipv4: prevent potential spectre v1 gadget in ip_metrics_convert()

In the Linux kernel, the following vulnerability has been resolved: ipv4: prevent potential spectre v1 gadget in ip_metrics_convert() if (!type) continue; if (type > RTAX_MAX) return -EINVAL; ... metrics[type - 1] = val; @type being used as an array index, we need to prevent cpu speculati…

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: Oct. 30, 2025, 4:40 p.m.

5.5

CVSS3.1

CVE-2023-52929 - nvmem: core: fix cleanup after dev_set_name()

In the Linux kernel, the following vulnerability has been resolved: nvmem: core: fix cleanup after dev_set_name() If dev_set_name() fails, we leak nvmem->wp_gpio as the cleanup does not put this. While a minimal fix for this would be to add the gpiod_put() call, we can do better if we split devic…

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: Oct. 28, 2025, 6:30 p.m.

5.5

CVSS3.1

CVE-2022-49760 - mm/hugetlb: fix PTE marker handling in hugetlb_change_protection()

In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix PTE marker handling in hugetlb_change_protection() Patch series "mm/hugetlb: uffd-wp fixes for hugetlb_change_protection()". Playing with virtio-mem and background snapshots (using uffd-wp) on hugetlb in QEMU, I …

πŸ“… Published: March 27, 2025, midnight πŸ”„ Last Modified: Oct. 29, 2025, 5:16 p.m.
Total resulsts: 349182
Page 6183 of 34,919
Β« previous page Β» next page
Filters