Latest CVE Feed
-
5.5
MEDIUMCVE-2025-21918
In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: Fix NULL pointer access Resources should be released only after all threads that utilize them have been destroyed. This commit ensures that resources are not released ... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 11, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-21859
In the Linux kernel, the following vulnerability has been resolved: USB: gadget: f_midi: f_midi_complete to call queue_work When using USB MIDI, a lock is attempted to be acquired twice through a re-entrant call to f_midi_transmit, causing a deadlock. ... Read more
Affected Products : linux_kernel- Published: Mar. 12, 2025
- Modified: Mar. 13, 2025
- Vuln Type: Race Condition
-
5.5
MEDIUMCVE-2025-21959
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree() Since commit b36e4523d4d5 ("netfilter: nf_conncount: fix garbage collection confirm race"), `cpu` an... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 14, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-21949
In the Linux kernel, the following vulnerability has been resolved: LoongArch: Set hugetlb mmap base address aligned with pmd size With ltp test case "testcases/bin/hugefork02", there is a dmesg error report message such as: kernel BUG at mm/hugetlb.c... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 11, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-21865
In the Linux kernel, the following vulnerability has been resolved: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). Brad Spengler reported the list_del() corruption splat in gtp_net_exit_batch_rtnl(). [0] Commit eb28fd76c0a0 ("gtp: De... Read more
Affected Products : linux_kernel- Published: Mar. 12, 2025
- Modified: Mar. 13, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-21853
In the Linux kernel, the following vulnerability has been resolved: bpf: avoid holding freeze_mutex during mmap operation We use map->freeze_mutex to prevent races between map_freeze() and memory mapping BPF map contents with writable permissions. The w... Read more
Affected Products : linux_kernel- Published: Mar. 12, 2025
- Modified: May. 02, 2025
- Vuln Type: Race Condition
-
5.5
MEDIUMCVE-2025-21962
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing closetimeo mount option User-provided mount parameter closetimeo of type u32 is intended to have an upper limit, but before it is validated, ... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 14, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-21901
In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Add sanity checks on rdev validity There is a possibility that ulp_irq_stop and ulp_irq_start callbacks will be called when the device is in detached state. This can cause... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-21864
In the Linux kernel, the following vulnerability has been resolved: tcp: drop secpath at the same time as we currently drop dst Xiumei reported hitting the WARN in xfrm6_tunnel_net_exit while running tests that boil down to: - create a pair of netns -... Read more
Affected Products : linux_kernel- Published: Mar. 12, 2025
- Modified: Mar. 13, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-21847
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() The nullity of sps->cstream should be checked similarly as it is done in sof_set_stream_data_offset() function. As... Read more
Affected Products : linux_kernel- Published: Mar. 12, 2025
- Modified: Mar. 13, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-21936
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected() Add check for the return value of mgmt_alloc_skb() in mgmt_device_connected() to prevent null pointer dereference.... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 10, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-21849
In the Linux kernel, the following vulnerability has been resolved: drm/i915/gt: Use spin_lock_irqsave() in interruptible context spin_lock/unlock() functions used in interrupt contexts could result in a deadlock, as seen in GitLab issue #13399, which o... Read more
Affected Products : linux_kernel- Published: Mar. 12, 2025
- Modified: Mar. 13, 2025
- Vuln Type: Race Condition
-
5.5
MEDIUMCVE-2025-21792
In the Linux kernel, the following vulnerability has been resolved: ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt If an AX25 device is bound to a socket by setting the SO_BINDTODEVICE socket option, a refcount leak will occur in ax25... Read more
Affected Products : linux_kernel- Published: Feb. 27, 2025
- Modified: Feb. 27, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-21820
In the Linux kernel, the following vulnerability has been resolved: tty: xilinx_uartps: split sysrq handling lockdep detects the following circular locking dependency: CPU 0 CPU 1 ========================== ========================... Read more
Affected Products : linux_kernel- Published: Feb. 27, 2025
- Modified: Mar. 13, 2025
- Vuln Type: Race Condition
-
5.5
MEDIUMCVE-2025-21787
In the Linux kernel, the following vulnerability has been resolved: team: better TEAM_OPTION_TYPE_STRING validation syzbot reported following splat [1] Make sure user-provided data contains one nul byte. [1] BUG: KMSAN: uninit-value in string_nocheck... Read more
Affected Products : linux_kernel- Published: Feb. 27, 2025
- Modified: Mar. 13, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-21846
In the Linux kernel, the following vulnerability has been resolved: acct: perform last write from workqueue In [1] it was reported that the acct(2) system call can be used to trigger NULL deref in cases where it is set to write to a file that triggers a... Read more
Affected Products : linux_kernel- Published: Mar. 12, 2025
- Modified: Mar. 13, 2025
- Vuln Type: Information Disclosure
-
5.5
MEDIUMCVE-2025-21814
In the Linux kernel, the following vulnerability has been resolved: ptp: Ensure info->enable callback is always set The ioctl and sysfs handlers unconditionally call the ->enable callback. Not all drivers implement that callback, leading to NULL derefer... Read more
Affected Products : linux_kernel- Published: Feb. 27, 2025
- Modified: Mar. 13, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-21845
In the Linux kernel, the following vulnerability has been resolved: mtd: spi-nor: sst: Fix SST write failure 'commit 18bcb4aa54ea ("mtd: spi-nor: sst: Factor out common write operation to `sst_nor_write_data()`")' introduced a bug where only one byte of... Read more
Affected Products : linux_kernel- Published: Mar. 12, 2025
- Modified: Mar. 13, 2025
- Vuln Type: Denial of Service
-
5.5
MEDIUMCVE-2025-21908
In the Linux kernel, the following vulnerability has been resolved: NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback Add PF_KCOMPACTD flag and current_is_kcompactd() helper to check for it so nfs_release_folio() can skip calling nfs_... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Race Condition
-
5.5
MEDIUMCVE-2025-21773
In the Linux kernel, the following vulnerability has been resolved: can: etas_es58x: fix potential NULL pointer dereference on udev->serial The driver assumed that es58x_dev->udev->serial could never be NULL. While this is true on commercially available... Read more
Affected Products : linux_kernel- Published: Feb. 27, 2025
- Modified: Mar. 05, 2025
- Vuln Type: Memory Corruption