Latest CVE Feed
-
5.5
MEDIUMCVE-2025-21936
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected() Add check for the return value of mgmt_alloc_skb() in mgmt_device_connected() to prevent null pointer dereference.... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 10, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-21935
In the Linux kernel, the following vulnerability has been resolved: rapidio: add check for rio_add_net() in rio_scan_alloc_net() The return value of rio_add_net() should be checked. If it fails, put_device() should be called to free the memory and give... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Misconfiguration
-
7.8
HIGHCVE-2025-21934
In the Linux kernel, the following vulnerability has been resolved: rapidio: fix an API misues when rio_add_net() fails rio_add_net() calls device_register() and fails when device_register() fails. Thus, put_device() should be used rather than kfree().... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 10, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-21933
In the Linux kernel, the following vulnerability has been resolved: arm: pgtable: fix NULL pointer dereference issue When update_mmu_cache_range() is called by update_mmu_cache(), the vmf parameter is NULL, which will cause a NULL pointer dereference is... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 10, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-21932
In the Linux kernel, the following vulnerability has been resolved: mm: abort vma_modify() on merge out of memory failure The remainder of vma_modify() relies upon the vmg state remaining pristine after a merge attempt. Usually this is the case, howeve... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-21931
In the Linux kernel, the following vulnerability has been resolved: hwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio Commit b15c87263a69 ("hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined) add page poison checks in do_mi... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: May. 22, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-21930
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't try to talk to a dead firmware This fixes: bad state = 0 WARNING: CPU: 10 PID: 702 at drivers/net/wireless/inel/iwlwifi/iwl-trans.c:178 iwl_trans_send_cmd+0... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 10, 2025
- Vuln Type: Misconfiguration
-
7.8
HIGHCVE-2025-21929
In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() During the `rmmod` operation for the `intel_ishtp_hid` driver, a use-after-free issue can occur in the hid_ishtp_cl... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2025-21928
In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() The system can experience a random crash a few minutes after the driver is removed. This issue occurs due to improper ... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2025-21927
In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() nvme_tcp_recv_pdu() doesn't check the validity of the header length. When header digests are enabled, a target might sen... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 11, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-21926
In the Linux kernel, the following vulnerability has been resolved: net: gso: fix ownership in __udp_gso_segment In __udp_gso_segment the skb destructor is removed before segmenting the skb but the socket reference is kept as-is. This is an issue if the... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-21925
In the Linux kernel, the following vulnerability has been resolved: llc: do not use skb_get() before dev_queue_xmit() syzbot is able to crash hosts [1], using llc and devices not supporting IFF_TX_SKB_SHARING. In this case, e1000 driver calls eth_skb_p... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-21924
In the Linux kernel, the following vulnerability has been resolved: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error During the initialization of ptp, hclge_ptp_get_cycle might return an error and returned d... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 01, 2025
-
7.8
HIGHCVE-2025-21923
In the Linux kernel, the following vulnerability has been resolved: HID: hid-steam: Fix use-after-free when detaching device When a hid-steam device is removed it must clean up the client_hdev used for intercepting hidraw access. This can lead to schedu... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-21922
In the Linux kernel, the following vulnerability has been resolved: ppp: Fix KMSAN uninit-value warning with bpf Syzbot caught an "KMSAN: uninit-value" warning [1], which is caused by the ppp driver not initializing a 2-byte header when using socket fil... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 11, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-21921
In the Linux kernel, the following vulnerability has been resolved: net: ethtool: netlink: Allow NULL nlattrs when getting a phy_device ethnl_req_get_phydev() is used to lookup a phy_device, in the case an ethtool netlink command targets a specific phyd... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Misconfiguration
-
7.1
HIGHCVE-2025-21920
In the Linux kernel, the following vulnerability has been resolved: vlan: enforce underlying device type Currently, VLAN devices can be created on top of non-ethernet devices. Besides the fact that it doesn't make much sense, this also causes a bug whi... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 11, 2025
- Vuln Type: Information Disclosure
-
7.8
HIGHCVE-2025-21919
In the Linux kernel, the following vulnerability has been resolved: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list child_cfs_rq_on_list attempts to convert a 'prev' pointer to a cfs_rq. This 'prev' pointer can originate from struct ... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 11, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-21918
In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: Fix NULL pointer access Resources should be released only after all threads that utilize them have been destroyed. This commit ensures that resources are not released ... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 11, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-21917
In the Linux kernel, the following vulnerability has been resolved: usb: renesas_usbhs: Flush the notify_hotplug_work When performing continuous unbind/bind operations on the USB drivers available on the Renesas RZ/G2L SoC, a kernel crash with the messa... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Apr. 11, 2025
- Vuln Type: Misconfiguration