5.5

CVSS3.1

CVE-2024-58006 - PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar()

In the Linux kernel, the following vulnerability has been resolved: PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() In commit 4284c88fff0e ("PCI: designware-ep: Allow pci_epc_set_bar() update inbound map address") set_bar() was modified to support dynamically changing the backiโ€ฆ

๐Ÿ“… Published: Feb. 27, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 23, 2025, 1:04 p.m.

7.5

CVSS3.1

CVE-2024-41336 -

Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.โ€ฆ

๐Ÿ“… Published: Feb. 27, 2025, midnight ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.5

CVSS3.1

CVE-2025-21754 - btrfs: fix assertion failure when splitting ordered extent after transaction abort

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix assertion failure when splitting ordered extent after transaction abort If while we are doing a direct IO write a transaction abort happens, we mark all existing ordered extents with the BTRFS_ORDERED_IOERR flag (done โ€ฆ

๐Ÿ“… Published: Feb. 27, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 28, 2025, 8:50 p.m.

7.8

CVSS3.1

CVE-2025-21739 - scsi: ufs: core: Fix use-after free in init error and remove paths

In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix use-after free in init error and remove paths devm_blk_crypto_profile_init() registers a cleanup handler to run when the associated (platform-) device is being released. For UFS, the crypto private data and pโ€ฆ

๐Ÿ“… Published: Feb. 27, 2025, midnight ๐Ÿ”„ Last Modified: April 18, 2026, 8:56 a.m.

7.8

CVSS3.1

CVE-2025-21796 - nfsd: clear acl_access/acl_default after releasing them

In the Linux kernel, the following vulnerability has been resolved: nfsd: clear acl_access/acl_default after releasing them If getting acl_default fails, acl_access and acl_default will be released simultaneously. However, acl_access will still retain a pointer pointing to the released posix_acl,โ€ฆ

๐Ÿ“… Published: Feb. 27, 2025, midnight ๐Ÿ”„ Last Modified: Nov. 3, 2025, 9:19 p.m.

7.1

CVSS3.1

CVE-2024-58007 - soc: qcom: socinfo: Avoid out of bounds read of serial number

In the Linux kernel, the following vulnerability has been resolved: soc: qcom: socinfo: Avoid out of bounds read of serial number On MSM8916 devices, the serial number exposed in sysfs is constant and does not change across individual devices. It's always: db410c:/sys/devices/soc0$ cat serial_โ€ฆ

๐Ÿ“… Published: Feb. 27, 2025, midnight ๐Ÿ”„ Last Modified: Nov. 3, 2025, 8:16 p.m.

7.8

CVSS3.1

CVE-2025-21764 - ndisc: use RCU protection in ndisc_alloc_skb()

In the Linux kernel, the following vulnerability has been resolved: ndisc: use RCU protection in ndisc_alloc_skb() ndisc_alloc_skb() can be called without RTNL or RCU being held. Add RCU protection to avoid possible UAF.

๐Ÿ“… Published: Feb. 27, 2025, midnight ๐Ÿ”„ Last Modified: Nov. 3, 2025, 8:17 p.m.

7.8

CVSS3.1

CVE-2025-21762 - arp: use RCU protection in arp_xmit()

In the Linux kernel, the following vulnerability has been resolved: arp: use RCU protection in arp_xmit() arp_xmit() can be called without RTNL or RCU protection. Use RCU protection to avoid potential UAF.

๐Ÿ“… Published: Feb. 27, 2025, midnight ๐Ÿ”„ Last Modified: Nov. 3, 2025, 8:17 p.m.

7.8

CVSS3.1

CVE-2025-21761 - openvswitch: use RCU protection in ovs_vport_cmd_fill_info()

In the Linux kernel, the following vulnerability has been resolved: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() ovs_vport_cmd_fill_info() can be called without RTNL or RCU. Use RCU protection and dev_net_rcu() to avoid potential UAF.

๐Ÿ“… Published: Feb. 27, 2025, midnight ๐Ÿ”„ Last Modified: Nov. 3, 2025, 8:17 p.m.

5.5

CVSS3.1

CVE-2024-57987 - Bluetooth: btrtl: check for NULL in btrtl_setup_realtek()

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: check for NULL in btrtl_setup_realtek() If insert an USB dongle which chip is not maintained in ic_id_table, it will hit the NULL point accessed. Add a null point check to avoid the Kernel Oops.

๐Ÿ“… Published: Feb. 27, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 1, 2025, 8:18 p.m.
Total resulsts: 349182
Page 6542 of 34,919
ยซ previous page ยป next page
Filters