Latest CVE Feed
-
0.0
NACVE-2022-50422
In the Linux kernel, the following vulnerability has been resolved: scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() When executing SMP task failed, the smp_execute_task_sg() calls del_timer() to delete "slow_task->timer". However, if the t... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50421
In the Linux kernel, the following vulnerability has been resolved: rpmsg: char: Avoid double destroy of default endpoint The rpmsg_dev_remove() in rpmsg_core is the place for releasing this default endpoint. So need to avoid destroying the default end... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50420
In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/hpre - fix resource leak in remove process In hpre_remove(), when the disable operation of qm sriov failed, the following logic should continue to be executed to relea... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2021-4460
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix UBSAN shift-out-of-bounds warning If get_num_sdma_queues or get_num_xgmi_sdma_queues is 0, we end up doing a shift operation where the number of bits shifted equals numb... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
5.2
MEDIUMCVE-2025-57852
A container privilege escalation flaw was found in KServe ModelMesh container images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands w... Read more
Affected Products :- Published: Sep. 30, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Misconfiguration
-
5.9
MEDIUMCVE-2025-58674
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an... Read more
Affected Products : wordpress- Published: Sep. 23, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Cross-Site Scripting
-
4.3
MEDIUMCVE-2025-58246
Insertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor... Read more
Affected Products : wordpress- Published: Sep. 23, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Information Disclosure
-
9.9
CRITICALCVE-2025-10725
A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, for example as a data scientist using a standard Jupyter notebook, can escalate their privileges to a full cluster administrator. This all... Read more
Affected Products :- Published: Sep. 30, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Authorization
-
0.0
NACVE-2025-39928
In the Linux kernel, the following vulnerability has been resolved: i2c: rtl9300: ensure data length is within supported range Add an explicit check for the xfer length to 'rtl9300_i2c_config_xfer' to ensure the data length isn't within the supported ra... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-39927
In the Linux kernel, the following vulnerability has been resolved: ceph: fix race condition validating r_parent before applying state Add validation to ensure the cached parent directory inode matches the directory info in MDS replies. This prevents cl... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2025-39926
In the Linux kernel, the following vulnerability has been resolved: genetlink: fix genl_bind() invoking bind() after -EPERM Per family bind/unbind callbacks were introduced to allow families to track multicast group consumer presence, e.g. to start or s... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Authorization
-
0.0
NACVE-2025-39925
In the Linux kernel, the following vulnerability has been resolved: can: j1939: implement NETDEV_UNREGISTER notification handler syzbot is reporting unregister_netdevice: waiting for vcan0 to become free. Usage count = 2 problem, for j1939 protocol ... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2025-39924
In the Linux kernel, the following vulnerability has been resolved: erofs: fix invalid algorithm for encoded extents The current algorithm sanity checks do not properly apply to new encoded extents. Unify the algorithm check with Z_EROFS_COMPRESSION(_R... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-39923
In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees When we don't have a clock specified in the device tree, we have no way to ensure the BAM is on. This is often the c... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-39922
In the Linux kernel, the following vulnerability has been resolved: ixgbe: fix incorrect map used in eee linkmode incorrectly used ixgbe_lp_map in loops intended to populate the supported and advertised EEE linkmode bitmaps based on ixgbe_ls_map. This r... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39921
In the Linux kernel, the following vulnerability has been resolved: spi: microchip-core-qspi: stop checking viability of op->max_freq in supports_op callback In commit 13529647743d9 ("spi: microchip-core-qspi: Support per spi-mem operation frequency swi... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-39920
In the Linux kernel, the following vulnerability has been resolved: pcmcia: Add error handling for add_interval() in do_validate_mem() In the do_validate_mem(), the call to add_interval() does not handle errors. If kmalloc() fails in add_interval(), it ... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39919
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7996: add missing check for rx wcid entries Non-station wcid entries must not be passed to the rx functions. In case of the global wcid entry, it could even lead to corrup... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39918
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: fix linked list corruption Never leave scheduled wcid entries on the temporary on-stack list... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39917
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt Stanislav reported that in bpf_crypto_crypt() the destination dynptr's size is not validated to be at least as large as the sourc... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption