Latest CVE Feed
-
0.0
NACVE-2025-38504
In the Linux kernel, the following vulnerability has been resolved: io_uring/zcrx: fix pp destruction warnings With multiple page pools and in some other cases we can have allocated niovs on page pool destruction. Remove a misplaced warning checking tha... Read more
Affected Products : linux_kernel- Published: Aug. 16, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-21656
In the Linux kernel, the following vulnerability has been resolved: hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur scsi_execute_cmd() function can return both negative (linux codes) and positive (scsi_cmnd result field) erro... Read more
Affected Products : linux_kernel- Published: Jan. 21, 2025
- Modified: Jan. 21, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-21832
In the Linux kernel, the following vulnerability has been resolved: block: don't revert iter for -EIOCBQUEUED blkdev_read_iter() has a few odd checks, like gating the position and count adjustment on whether or not the result is bigger-than-or-equal to ... Read more
Affected Products : linux_kernel- Published: Mar. 06, 2025
- Modified: Mar. 06, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-21648
In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: clamp maximum hashtable size to INT_MAX Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_n... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Feb. 02, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-21720
In the Linux kernel, the following vulnerability has been resolved: xfrm: delete intermediate secpath entry in packet offload mode Packets handled by hardware have added secpath as a way to inform XFRM core code that this path was already handled. That ... Read more
Affected Products : linux_kernel- Published: Feb. 27, 2025
- Modified: Feb. 27, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-38665
In the Linux kernel, the following vulnerability has been resolved: can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode Andrei Lalaev reported a NULL pointer deref when a CAN device is restarted from Bus Off and the dr... Read more
Affected Products : linux_kernel- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-38465
In the Linux kernel, the following vulnerability has been resolved: netlink: Fix wraparounds of sk->sk_rmem_alloc. Netlink has this pattern in some places if (atomic_read(&sk->sk_rmem_alloc) > sk->sk_rcvbuf) atomic_add(skb->truesize, &sk->sk_rmem_... Read more
Affected Products : linux_kernel- Published: Jul. 25, 2025
- Modified: Jul. 29, 2025
- Vuln Type: Denial of Service
-
0.0
NACVE-2025-21643
In the Linux kernel, the following vulnerability has been resolved: netfs: Fix kernel async DIO Netfslib needs to be able to handle kernel-initiated asynchronous DIO that is supplied with a bio_vec[] array. Currently, because of the async flag, this ge... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Jan. 19, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2023-52933
In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix handling and sanity checking of xattr_ids count A Sysbot [1] corrupted filesystem exposes two flaws in the handling and sanity checking of the xattr_ids count in the files... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Mar. 28, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-38640
In the Linux kernel, the following vulnerability has been resolved: bpf: Disable migration in nf_hook_run_bpf(). syzbot reported that the netfilter bpf prog can be called without migration disabled in xmit path. Then the assertion in __bpf_prog_run() f... Read more
Affected Products : linux_kernel- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2025-38659
In the Linux kernel, the following vulnerability has been resolved: gfs2: No more self recovery When a node withdraws and it turns out that it is the only node that has the filesystem mounted, gfs2 currently tries to replay the local journal to bring th... Read more
Affected Products : linux_kernel- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-21925
In the Linux kernel, the following vulnerability has been resolved: llc: do not use skb_get() before dev_queue_xmit() syzbot is able to crash hosts [1], using llc and devices not supporting IFF_TX_SKB_SHARING. In this case, e1000 driver calls eth_skb_p... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-38447
In the Linux kernel, the following vulnerability has been resolved: mm/rmap: fix potential out-of-bounds page table access during batched unmap As pointed out by David[1], the batched unmap logic in try_to_unmap_one() may read past the end of a PTE tabl... Read more
Affected Products : linux_kernel- Published: Jul. 25, 2025
- Modified: Jul. 29, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-38673
In the Linux kernel, the following vulnerability has been resolved: Revert "drm/gem-framebuffer: Use dma_buf from GEM object instance" This reverts commit cce16fcd7446dcff7480cd9d2b6417075ed81065. The dma_buf field in struct drm_gem_object is not stabl... Read more
Affected Products : linux_kernel- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-21647
In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: add bounds checks to host bulk flow fairness counts Even though we fixed a logic error in the commit cited below, syzbot still managed to trigger an underflow of the pe... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Mar. 13, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-21932
In the Linux kernel, the following vulnerability has been resolved: mm: abort vma_modify() on merge out of memory failure The remainder of vma_modify() relies upon the vmg state remaining pristine after a merge attempt. Usually this is the case, howeve... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-21704
In the Linux kernel, the following vulnerability has been resolved: usb: cdc-acm: Check control transfer buffer size before access If the first fragment is shorter than struct usb_cdc_notification, we can't calculate an expected_size. Log an error and d... Read more
Affected Products : linux_kernel- Published: Feb. 22, 2025
- Modified: Mar. 25, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-21653
In the Linux kernel, the following vulnerability has been resolved: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute syzbot found that TCA_FLOW_RSHIFT attribute was not validated. Right shitfing a 32bit integer is undefined for large shift values... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Feb. 02, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-21662
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix variable not being completed when function returns When cmd_alloc_index(), fails cmd_work_handler() needs to complete ent->slotted before returning early. Otherwise the ta... Read more
Affected Products : linux_kernel- Published: Jan. 21, 2025
- Modified: Jan. 21, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2025-38621
In the Linux kernel, the following vulnerability has been resolved: md: make rdev_addable usable for rcu mode Our testcase trigger panic: BUG: kernel NULL pointer dereference, address: 00000000000000e0 ... Oops: Oops: 0000 [#1] SMP NOPTI CPU: 2 UID: 0 ... Read more
Affected Products : linux_kernel- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Memory Corruption