5.5

CVSS3.1

CVE-2022-49751 - w1: fix WARNING after calling w1_process()

In the Linux kernel, the following vulnerability has been resolved: w1: fix WARNING after calling w1_process() I got the following WARNING message while removing driver(ds2482): ------------[ cut here ]------------ do not call blocking ops when !TASK_RUNNING; state=1 set at [<000000002d50bfb6>] โ€ฆ

๐Ÿ“… Published: March 27, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 1, 2025, 8:17 p.m.

7.8

CVSS3.1

CVE-2022-49753 - dmaengine: Fix double increment of client_count in dma_chan_get()

In the Linux kernel, the following vulnerability has been resolved: dmaengine: Fix double increment of client_count in dma_chan_get() The first time dma_chan_get() is called for a channel the channel client_count is incorrectly incremented twice for public channels, first in balance_ref_count(), โ€ฆ

๐Ÿ“… Published: March 27, 2025, midnight ๐Ÿ”„ Last Modified: May 4, 2025, 8:44 a.m.

5.5

CVSS3.1

CVE-2022-49757 - EDAC/highbank: Fix memory leak in highbank_mc_probe()

In the Linux kernel, the following vulnerability has been resolved: EDAC/highbank: Fix memory leak in highbank_mc_probe() When devres_open_group() fails, it returns -ENOMEM without freeing memory allocated by edac_mc_alloc(). Call edac_mc_free() on the error handling path to avoid a memory leak.โ€ฆ

๐Ÿ“… Published: March 27, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 1, 2025, 6:15 p.m.

5.5

CVSS3.1

CVE-2023-53011 - net: stmmac: enable all safety features by default

In the Linux kernel, the following vulnerability has been resolved: net: stmmac: enable all safety features by default In the original implementation of dwmac5 commit 8bf993a5877e ("net: stmmac: Add support for DWMAC5 and implement Safety Features") all safety features were enabled by default. Lโ€ฆ

๐Ÿ“… Published: March 27, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 1, 2025, 9:15 p.m.

7.8

CVSS3.1

CVE-2023-52987 - ASoC: SOF: ipc4-mtrace: prevent underflow in sof_ipc4_priority_mask_dfs_write()

In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: ipc4-mtrace: prevent underflow in sof_ipc4_priority_mask_dfs_write() The "id" comes from the user. Change the type to unsigned to prevent an array underflow.

๐Ÿ“… Published: March 27, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 29, 2025, 5:08 p.m.

5.5

CVSS3.1

CVE-2023-52991 - net: fix NULL pointer in skb_segment_list

In the Linux kernel, the following vulnerability has been resolved: net: fix NULL pointer in skb_segment_list Commit 3a1296a38d0c ("net: Support GRO/GSO fraglist chaining.") introduced UDP listifyed GRO. The segmentation relies on frag_list being untouched when passing through the network stack. โ€ฆ

๐Ÿ“… Published: March 27, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 1, 2025, 9:15 p.m.

7.8

CVSS3.1

CVE-2023-53000 - netlink: prevent potential spectre v1 gadgets

In the Linux kernel, the following vulnerability has been resolved: netlink: prevent potential spectre v1 gadgets Most netlink attributes are parsed and validated from __nla_validate_parse() or validate_nla() u16 type = nla_type(nla); if (type == 0 || type > maxtype) { /* error โ€ฆ

๐Ÿ“… Published: March 27, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 30, 2025, 4:40 p.m.

4.3

CVSS3.1

CVE-2025-20230 - Missing Access Control and Incorrect Ownership of Data in App Key Value Store (KVStore) collectionsโ€ฆ

In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the โ€œadminโ€œ or โ€œpowerโ€œ Splunk roles could edit and delete other user data in App Key Value Stoโ€ฆ

๐Ÿ“… Published: March 26, 2025, 10:24 p.m. ๐Ÿ”„ Last Modified: Aug. 1, 2025, 6:01 p.m.

2.5

CVSS3.1

CVE-2025-20233 - Incorrect permissions set by the โ€œchmodโ€œ and โ€œmakedirsโ€œ Python functions in Splunk App for Lookup Fโ€ฆ

In the Splunk App for Lookup File Editing versions below 4.0.5, a script in the app used the `chmod` and `makedirs` Python functions in a way that resulted in overly broad read and execute permissions. This could lead to improper access control for a low-privileged user.

๐Ÿ“… Published: March 26, 2025, 10:06 p.m. ๐Ÿ”„ Last Modified: Aug. 1, 2025, 6:03 p.m.

5.7

CVSS3.1

CVE-2025-20232 - Risky Command Safeguards Bypass in โ€œ/app/search/searchโ€œ endpoint through โ€œsโ€œ parameter in Splunk Enโ€ฆ

In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.3.2408.103, 9.2.2406.108, 9.2.2403.113, 9.1.2312.208 and 9.1.2308.212, a low-privileged user that does not hold the โ€œadminโ€œ or โ€œpowerโ€œ Splunk roles could run a saved search with a risky command usโ€ฆ

๐Ÿ“… Published: March 26, 2025, 10:06 p.m. ๐Ÿ”„ Last Modified: July 21, 2025, 8:45 p.m.
Total resulsts: 349182
Page 6198 of 34,919
ยซ previous page ยป next page
Filters