Latest CVE Feed
-
0.0
NACVE-2023-53105
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix cleanup null-ptr deref on encap lock During module is unloaded while a peer tc flow is still offloaded, first the peer uplink rep profile is changed to a nic profile, and... Read more
Affected Products : linux_kernel- Published: May. 02, 2025
- Modified: May. 05, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53138
In the Linux kernel, the following vulnerability has been resolved: net: caif: Fix use-after-free in cfusbl_device_notify() syzbot reported use-after-free in cfusbl_device_notify() [1]. This causes a stack trace like below: BUG: KASAN: use-after-free ... Read more
Affected Products : linux_kernel- Published: May. 02, 2025
- Modified: May. 05, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53125
In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc75xx: Limit packet length to skb->len Packet length retrieved from skb data may be larger than the actual socket buffer length (up to 9026 bytes). In such case the cloned ... Read more
Affected Products : linux_kernel- Published: May. 02, 2025
- Modified: May. 05, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-37821
In the Linux kernel, the following vulnerability has been resolved: sched/eevdf: Fix se->slice being set to U64_MAX and resulting crash There is a code path in dequeue_entities() that can set the slice of a sched_entity to U64_MAX, which sometimes resul... Read more
Affected Products : linux_kernel- Published: May. 08, 2025
- Modified: May. 18, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-37855
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Guard Possible Null Pointer Dereference [WHY] In some situations, dc->res_pool may be null. [HOW] Check if pointer is null before dereference.... Read more
Affected Products : linux_kernel- Published: May. 09, 2025
- Modified: May. 12, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-37890
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc As described in Gerrard's report [1], we have a UAF case when an hfsc class has a netem child qdisc. The crux... Read more
Affected Products : linux_kernel- Published: May. 16, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-37885
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Reset IRTE to host control if *new* route isn't postable Restore an IRTE back to host control (remapped or posted MSI mode) if the *new* GSI route prevents posting the IRQ dir... Read more
Affected Products : linux_kernel- Published: May. 09, 2025
- Modified: May. 12, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2024-58054
In the Linux kernel, the following vulnerability has been resolved: staging: media: max96712: fix kernel oops when removing module The following kernel oops is thrown when trying to remove the max96712 module: Unable to handle kernel paging request at ... Read more
Affected Products : linux_kernel- Published: Mar. 06, 2025
- Modified: Mar. 06, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-21825
In the Linux kernel, the following vulnerability has been resolved: bpf: Cancel the running bpf_timer through kworker for PREEMPT_RT During the update procedure, when overwrite element in a pre-allocated htab, the freeing of old_element is protected by ... Read more
Affected Products : linux_kernel- Published: Mar. 06, 2025
- Modified: Mar. 06, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2025-21828
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't flush non-uploaded STAs If STA state is pre-moved to AUTHORIZED (such as in IBSS scenarios) and insertion fails, the station is freed. In this case, the driver nev... Read more
Affected Products : linux_kernel- Published: Mar. 06, 2025
- Modified: Mar. 06, 2025
- Vuln Type: Authorization
-
0.0
NACVE-2024-58085
In the Linux kernel, the following vulnerability has been resolved: tomoyo: don't emit warning in tomoyo_write_control() syzbot is reporting too large allocation warning at tomoyo_write_control(), for one can write a very very long line without new line... Read more
Affected Products : linux_kernel- Published: Mar. 06, 2025
- Modified: Mar. 13, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2024-58078
In the Linux kernel, the following vulnerability has been resolved: misc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors misc_minor_alloc was allocating id using ida for minor only in case of MISC_DYNAMIC_MINOR but misc_minor_free was a... Read more
Affected Products : linux_kernel- Published: Mar. 06, 2025
- Modified: Mar. 06, 2025
-
0.0
NACVE-2025-21830
In the Linux kernel, the following vulnerability has been resolved: landlock: Handle weird files A corrupted filesystem (e.g. bcachefs) might return weird files. Instead of throwing a warning and allowing access to such file, treat them as regular files... Read more
Affected Products : linux_kernel- Published: Mar. 06, 2025
- Modified: Mar. 13, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-21829
In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]" The Call Trace is as below: " <TASK> ? show_regs.cold+0x1a/0x1f ? __rxe_cleanup+0x12c/0x170 [rdma_rxe] ? __warn+... Read more
Affected Products : linux_kernel- Published: Mar. 06, 2025
- Modified: Mar. 06, 2025