Latest CVE Feed
-
0.0
NACVE-2022-50543
In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix mr->map double free rxe_mr_cleanup() which tries to free mr->map again will be called when rxe_mr_init_user() fails: CPU: 0 PID: 4917 Comm: rdma_flush_serv Kdump: load... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53669
In the Linux kernel, the following vulnerability has been resolved: tcp: fix skb_copy_ubufs() vs BIG TCP David Ahern reported crashes in skb_copy_ubufs() caused by TCP tx zerocopy using hugepages, and skb length bigger than ~68 KB. skb_copy_ubufs() ass... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53664
In the Linux kernel, the following vulnerability has been resolved: OPP: Fix potential null ptr dereference in dev_pm_opp_get_required_pstate() "opp" pointer is dereferenced before the IS_ERR_OR_NULL() check. Fix it by removing the dereference to cache ... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50549
In the Linux kernel, the following vulnerability has been resolved: dm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata Following concurrent processes: P1(drop cache) P2(kworker) drop_caches_sysctl_handler... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2023-53663
In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Check instead of asserting on nested TSC scaling support Check for nested TSC scaling support on nested SVM VMRUN instead of asserting that TSC scaling is exposed to L1 if L1... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2023-53652
In the Linux kernel, the following vulnerability has been resolved: vdpa: Add features attr to vdpa_nl_policy for nlattr length check The vdpa_nl_policy structure is used to validate the nlattr when parsing the incoming nlmsg. It will ensure the attribu... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2023-53650
In the Linux kernel, the following vulnerability has been resolved: fbdev: omapfb: lcd_mipid: Fix an error handling path in mipid_spi_probe() If 'mipid_detect()' fails, we must free 'md' to avoid a memory leak.... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50517
In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: do not clobber swp_entry_t during THP split The following has been observed when running stressng mmap since commit b653db77350c ("mm: Clear page->private when splitting... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53640
In the Linux kernel, the following vulnerability has been resolved: ASoC: lpass: Fix for KASAN use_after_free out of bounds When we run syzkaller we get below Out of Bounds error. "KASAN: slab-out-of-bounds Read in regcache_flat_read" Below is the bac... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50516
In the Linux kernel, the following vulnerability has been resolved: fs: dlm: fix invalid derefence of sb_lvbptr I experience issues when putting a lkbsb on the stack and have sb_lvbptr field to a dangled pointer while not using DLM_LKF_VALBLK. It will c... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53639
In the Linux kernel, the following vulnerability has been resolved: wifi: ath6kl: reduce WARN to dev_dbg() in callback The warn is triggered on a known race condition, documented in the code above the test, that is correctly handled. Using WARN() hinde... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2023-53626
In the Linux kernel, the following vulnerability has been resolved: ext4: fix possible double unlock when moving a directory... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2023-53623
In the Linux kernel, the following vulnerability has been resolved: mm/swap: fix swap_info_struct race between swapoff and get_swap_pages() The si->lock must be held when deleting the si from the available list. Otherwise, another thread can re-add the... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2022-50540
In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom-adm: fix wrong sizeof config in slave_config Fix broken slave_config function that uncorrectly compare the peripheral_size with the size of the config pointer instead of... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39987
In the Linux kernel, the following vulnerability has been resolved: can: hi311x: populate ndo_change_mtu() to prevent buffer overflow Sending an PF_PACKET allows to bypass the CAN framework logic and to directly reach the xmit() function of a CAN driver... Read more
Affected Products : linux_kernel- Published: Oct. 15, 2025
- Modified: Oct. 16, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-39991
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load() If ab->fw.m3_data points to data, then fw pointer remains null. Further, if m3_mem is not allocated, then fw is dereferenced t... Read more
Affected Products : linux_kernel- Published: Oct. 15, 2025
- Modified: Oct. 16, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-40000
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait() There is a bug observed when rtw89_core_tx_kick_off_and_wait() tries to access already freed skb_data: BUG: KFENCE... Read more
Affected Products : linux_kernel- Published: Oct. 15, 2025
- Modified: Oct. 16, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39972
In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in i40e_validate_queue_map Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_validate_queue_map().... Read more
Affected Products : linux_kernel- Published: Oct. 15, 2025
- Modified: Oct. 16, 2025
-
0.0
NACVE-2025-39973
In the Linux kernel, the following vulnerability has been resolved: i40e: add validation for ring_len param The `ring_len` parameter provided by the virtual function (VF) is assigned directly to the hardware memory context (HMC) without any validation. ... Read more
Affected Products : linux_kernel- Published: Oct. 15, 2025
- Modified: Oct. 16, 2025
-
0.0
NACVE-2025-39975
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix wrong index reference in smb2_compound_op() In smb2_compound_op(), the loop that processes each command's response uses wrong indices when accessing response bufferes. ... Read more
Affected Products : linux_kernel- Published: Oct. 15, 2025
- Modified: Oct. 16, 2025
- Vuln Type: Memory Corruption