Latest CVE Feed
-
0.0
NACVE-2022-50534
In the Linux kernel, the following vulnerability has been resolved: dm thin: Use last transaction's pmd->root when commit failed Recently we found a softlock up problem in dm thin pool btree lookup code due to corrupted metadata: Kernel panic - not sy... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Denial of Service
-
0.0
NACVE-2023-53733
In the Linux kernel, the following vulnerability has been resolved: net: sched: cls_u32: Undo tcf_bind_filter if u32_replace_hw_knode When u32_replace_hw_knode fails, we need to undo the tcf_bind_filter operation done at u32_set_parms.... Read more
Affected Products : linux_kernel- Published: Oct. 24, 2025
- Modified: Oct. 27, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2022-50527
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix size validation for non-exclusive domains (v4) Fix amdgpu_bo_validate_size() to check whether the TTM domain manager for the requested memory exists, else we get a kerne... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2023-53686
In the Linux kernel, the following vulnerability has been resolved: net/handshake: fix null-ptr-deref in handshake_nl_done_doit() We should not call trace_handshake_cmd_done_err() if socket lookup has failed. Also we should call trace_handshake_cmd_don... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39965
In the Linux kernel, the following vulnerability has been resolved: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI x->id.spi == 0 means "no SPI assigned", but since commit 94f39804d891 ("xfrm: Duplicate SPI Handling"), we now create states and add them to ... Read more
Affected Products : linux_kernel- Published: Oct. 13, 2025
- Modified: Oct. 14, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53668
In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Fix deadloop issue on reading trace_pipe Soft lockup occurs when reading file 'trace_pipe': watchdog: BUG: soft lockup - CPU#6 stuck for 22s! [cat:4488] [...] RIP: 0... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Denial of Service
-
0.0
NACVE-2023-53667
In the Linux kernel, the following vulnerability has been resolved: net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize Currently in cdc_ncm_check_tx_max(), if dwNtbOutMaxSize is lower than the calculated "min" value, but greater than zero, the lo... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39964
In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg Issuing two writes to the same af_alg socket is bogus as the data will be interleaved in an unpredictable fashion. Further... Read more
Affected Products : linux_kernel- Published: Oct. 13, 2025
- Modified: Oct. 14, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2023-53660
In the Linux kernel, the following vulnerability has been resolved: bpf, cpumap: Handle skb as well when clean up ptr_ring The following warning was reported when running xdp_redirect_cpu with both skb-mode and stress-mode enabled: ------------[ cut ... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
-
0.0
NACVE-2023-53680
In the Linux kernel, the following vulnerability has been resolved: NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL OPDESC() simply indexes into nfsd4_ops[] by the op's operation number, without range checking that value. It assumes callers a... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53634
In the Linux kernel, the following vulnerability has been resolved: bpf, arm64: Fixed a BTI error on returning to patched function When BPF_TRAMP_F_CALL_ORIG is set, BPF trampoline uses BLR to jump back to the instruction next to call site to call the p... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2023-53630
In the Linux kernel, the following vulnerability has been resolved: iommufd: Fix unpinning of pages when an access is present syzkaller found that the calculation of batch_last_index should use 'start_index' since at input to this function the batch is ... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53658
In the Linux kernel, the following vulnerability has been resolved: spi: bcm-qspi: return error if neither hif_mspi nor mspi is available If neither a "hif_mspi" nor "mspi" resource is present, the driver will just early exit in probe but still return s... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2023-53655
In the Linux kernel, the following vulnerability has been resolved: rcu: Avoid stack overflow due to __rcu_irq_enter_check_tick() being kprobe-ed Registering a kprobe on __rcu_irq_enter_check_tick() can cause kernel stack overflow as shown below. This i... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-40083
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix null-deref in agg_dequeue To prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c) when cl->qdisc->ops->peek(cl->qdisc) returns NULL, we check the retur... Read more
Affected Products : linux_kernel- Published: Oct. 29, 2025
- Modified: Nov. 02, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-40107
In the Linux kernel, the following vulnerability has been resolved: can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled This issue is similar to the vulnerability in the `mcp251x` driver, which was fixed in co... Read more
Affected Products : linux_kernel- Published: Nov. 03, 2025
- Modified: Nov. 04, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53653
In the Linux kernel, the following vulnerability has been resolved: media: amphion: fix REVERSE_INULL issues reported by coverity null-checking of a pointor is suggested before dereferencing it... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
-
0.0
NACVE-2025-40021
In the Linux kernel, the following vulnerability has been resolved: tracing: dynevent: Add a missing lockdown check on dynevent Since dynamic_events interface on tracefs is compatible with kprobe_events and uprobe_events, it should also check the lockdo... Read more
Affected Products : linux_kernel- Published: Oct. 24, 2025
- Modified: Oct. 27, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2023-53651
In the Linux kernel, the following vulnerability has been resolved: Input: exc3000 - properly stop timer on shutdown We need to stop the timer on driver unbind or probe failures, otherwise we get UAF/Oops.... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53618
In the Linux kernel, the following vulnerability has been resolved: btrfs: reject invalid reloc tree root keys with stack dump [BUG] Syzbot reported a crash that an ASSERT() got triggered inside prepare_to_merge(). That ASSERT() makes sure the reloc tr... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Misconfiguration