5.5

CVSS3.1

CVE-2024-52560 - fs/ntfs3: Mark inode as bad as soon as error detected in mi_enum_attr()

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Mark inode as bad as soon as error detected in mi_enum_attr() Extended the `mi_enum_attr()` function interface with an additional parameter, `struct ntfs_inode *ni`, to allow marking the inode as bad as soon as an error…

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: Oct. 23, 2025, 1:05 p.m.

7.8

CVSS3.1

CVE-2025-21753 - btrfs: fix use-after-free when attempting to join an aborted transaction

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix use-after-free when attempting to join an aborted transaction When we are trying to join the current transaction and if it's aborted, we read its 'aborted' field after unlocking fs_info->trans_lock and without holding …

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 8:17 p.m.

7.8

CVSS3.1

CVE-2024-54458 - scsi: ufs: bsg: Set bsg_queue to NULL after removal

In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: bsg: Set bsg_queue to NULL after removal Currently, this does not cause any issues, but I believe it is necessary to set bsg_queue to NULL after removing it to prevent potential use-after-free (UAF) access.

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 8:16 p.m.

5.5

CVSS3.1

CVE-2025-21752 - btrfs: don't use btrfs_set_item_key_safe on RAID stripe-extents

In the Linux kernel, the following vulnerability has been resolved: btrfs: don't use btrfs_set_item_key_safe on RAID stripe-extents Don't use btrfs_set_item_key_safe() to modify the keys in the RAID stripe-tree, as this can lead to corruption of the tree, which is caught by the checks in btrfs_se…

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: March 25, 2026, 10:19 a.m.

5.5

CVSS3.1

CVE-2025-21814 - ptp: Ensure info->enable callback is always set

In the Linux kernel, the following vulnerability has been resolved: ptp: Ensure info->enable callback is always set The ioctl and sysfs handlers unconditionally call the ->enable callback. Not all drivers implement that callback, leading to NULL dereferences. Example of affected drivers: ptp_s390…

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:19 p.m.

5.5

CVSS3.1

CVE-2025-25334 -

An issue in Suning Commerce Group Suning EMall iOS 9.5.198 allows attackers to access sensitive user information via supplying a crafted link.

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.1

CVSS3.1

CVE-2025-21815 - mm/compaction: fix UBSAN shift-out-of-bounds warning

In the Linux kernel, the following vulnerability has been resolved: mm/compaction: fix UBSAN shift-out-of-bounds warning syzkaller reported a UBSAN shift-out-of-bounds warning of (1UL << order) in isolate_freepages_block(). The bogus compound_order can be any value because it is union with flags…

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: Oct. 28, 2025, 2:53 a.m.

5.5

CVSS3.1

CVE-2025-21802 - net: hns3: fix oops when unload drivers paralleling

In the Linux kernel, the following vulnerability has been resolved: net: hns3: fix oops when unload drivers paralleling When unload hclge driver, it tries to disable sriov first for each ae_dev node from hnae3_ae_dev_list. If user unloads hns3 driver at the time, because it removes all the ae_dev…

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:19 p.m.

5.5

CVSS3.1

CVE-2025-21799 - net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns()

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns() When getting the IRQ we use k3_udma_glue_tx_get_irq() which returns negative error value on error. So not NULL check is not sufficient to deteremine…

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:19 p.m.

7.8

CVSS3.1

CVE-2025-21759 - ipv6: mcast: extend RCU protection in igmp6_send()

In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called without RTNL or RCU being held. Extend RCU protection so that we can safely fetch the net pointer and avoid a potential UAF. Note that we no longer c…

πŸ“… Published: Feb. 27, 2025, midnight πŸ”„ Last Modified: May 4, 2025, 7:20 a.m.
Total resulsts: 349182
Page 6547 of 34,919
Β« previous page Β» next page
Filters