Latest CVE Feed
-
0.0
NACVE-2025-21651
In the Linux kernel, the following vulnerability has been resolved: net: hns3: don't auto enable misc vector Currently, there is a time window between misc irq enabled and service task inited. If an interrupte is reported at this time, it will cause war... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Jan. 19, 2025
- Vuln Type: Race Condition
-
7.8
HIGHCVE-2025-21650
In the Linux kernel, the following vulnerability has been resolved: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue The TQP BAR space is divided into two segments. TQPs 0-1023 and TQPs 1024-1279 are in different BAR space addr... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Feb. 27, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-21649
In the Linux kernel, the following vulnerability has been resolved: net: hns3: fix kernel crash when 1588 is sent on HIP08 devices Currently, HIP08 devices does not register the ptp devices, so the hdev->ptp is NULL. But the tx process would still try t... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Jan. 31, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-21648
In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: clamp maximum hashtable size to INT_MAX Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_n... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Feb. 02, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-21647
In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: add bounds checks to host bulk flow fairness counts Even though we fixed a logic error in the commit cited below, syzbot still managed to trigger an underflow of the pe... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Mar. 13, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-21646
In the Linux kernel, the following vulnerability has been resolved: afs: Fix the maximum cell name length The kafs filesystem limits the maximum length of a cell to 256 bytes, but a problem occurs if someone actually does that: kafs tries to create a di... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Feb. 02, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-21645
In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it Wakeup for IRQ1 should be disabled only in cases where i8042 had actually enabled it, otherwise "wake_dept... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: May. 22, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-21644
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix tlb invalidation when wedging If GuC fails to load, the driver wedges, but in the process it tries to do stuff that may not be initialized yet. This moves the xe_gt_tlb_inva... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Jan. 31, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-21643
In the Linux kernel, the following vulnerability has been resolved: netfs: Fix kernel async DIO Netfslib needs to be able to handle kernel-initiated asynchronous DIO that is supplied with a bio_vec[] array. Currently, because of the async flag, this ge... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Jan. 19, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-21642
In the Linux kernel, the following vulnerability has been resolved: mptcp: sysctl: sched: avoid using current->nsproxy Using the 'net' structure via 'current' is not recommended for different reasons. First, if the goal is to use it to read or write pe... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Jan. 19, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-21641
In the Linux kernel, the following vulnerability has been resolved: mptcp: sysctl: blackhole timeout: avoid using current->nsproxy As mentioned in the previous commit, using the 'net' structure via 'current' is not recommended for different reasons: - ... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Jan. 19, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-21640
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different re... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Apr. 10, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-21639
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: rto_min/max: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reason... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Feb. 27, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-21638
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: auth_enable: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reason... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Apr. 10, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-21637
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: udp_port: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: ... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Feb. 27, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-21636
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for diffe... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Feb. 27, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-21635
In the Linux kernel, the following vulnerability has been resolved: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for differen... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Jan. 19, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-21634
In the Linux kernel, the following vulnerability has been resolved: cgroup/cpuset: remove kernfs active break A warning was found: WARNING: CPU: 10 PID: 3486953 at fs/kernfs/file.c:828 CPU: 10 PID: 3486953 Comm: rmdir Kdump: loaded Tainted: G RIP: 0010... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Feb. 03, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2025-21632
In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Ensure shadow stack is active before "getting" registers The x86 shadow stack support has its own set of registers. Those registers are XSAVE-managed, but they are "supervisor ... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Jan. 19, 2025
- Vuln Type: Misconfiguration
-
7.8
HIGHCVE-2025-21631
In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() Our syzkaller report a following UAF for v6.6: BUG: KASAN: slab-use-after-free in bfq_init_rq+0x175d/0x17a0 block/bfq-iosched.c:69... Read more
Affected Products : linux_kernel- Published: Jan. 19, 2025
- Modified: Feb. 10, 2025
- Vuln Type: Memory Corruption