Latest CVE Feed
-
0.0
NACVE-2022-50421
In the Linux kernel, the following vulnerability has been resolved: rpmsg: char: Avoid double destroy of default endpoint The rpmsg_dev_remove() in rpmsg_core is the place for releasing this default endpoint. So need to avoid destroying the default end... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50420
In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/hpre - fix resource leak in remove process In hpre_remove(), when the disable operation of qm sriov failed, the following logic should continue to be executed to relea... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2021-4460
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix UBSAN shift-out-of-bounds warning If get_num_sdma_queues or get_num_xgmi_sdma_queues is 0, we end up doing a shift operation where the number of bits shifted equals numb... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
-
8.4
HIGHCVE-2025-10847
DX Unified Infrastructure Management (Nimsoft/UIM) and below contains an improper ACL handling vulnerability in the robot (controller) component. A remote attacker can execute commands, read from, or write to the target system.... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-61622
Deserialization of untrusted data in python in pyfory versions 0.12.0 through 0.12.2, or the legacy pyfury versions from 0.1.0 through 0.10.3: allows arbitrary code execution. An application is vulnerable if it reads pyfory serialized data from untrusted ... Read more
Affected Products : fory- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Injection
-
0.0
NACVE-2025-39928
In the Linux kernel, the following vulnerability has been resolved: i2c: rtl9300: ensure data length is within supported range Add an explicit check for the xfer length to 'rtl9300_i2c_config_xfer' to ensure the data length isn't within the supported ra... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-39927
In the Linux kernel, the following vulnerability has been resolved: ceph: fix race condition validating r_parent before applying state Add validation to ensure the cached parent directory inode matches the directory info in MDS replies. This prevents cl... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2025-39926
In the Linux kernel, the following vulnerability has been resolved: genetlink: fix genl_bind() invoking bind() after -EPERM Per family bind/unbind callbacks were introduced to allow families to track multicast group consumer presence, e.g. to start or s... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Authorization
-
0.0
NACVE-2025-39925
In the Linux kernel, the following vulnerability has been resolved: can: j1939: implement NETDEV_UNREGISTER notification handler syzbot is reporting unregister_netdevice: waiting for vcan0 to become free. Usage count = 2 problem, for j1939 protocol ... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2025-39924
In the Linux kernel, the following vulnerability has been resolved: erofs: fix invalid algorithm for encoded extents The current algorithm sanity checks do not properly apply to new encoded extents. Unify the algorithm check with Z_EROFS_COMPRESSION(_R... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-39923
In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees When we don't have a clock specified in the device tree, we have no way to ensure the BAM is on. This is often the c... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-39922
In the Linux kernel, the following vulnerability has been resolved: ixgbe: fix incorrect map used in eee linkmode incorrectly used ixgbe_lp_map in loops intended to populate the supported and advertised EEE linkmode bitmaps based on ixgbe_ls_map. This r... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39921
In the Linux kernel, the following vulnerability has been resolved: spi: microchip-core-qspi: stop checking viability of op->max_freq in supports_op callback In commit 13529647743d9 ("spi: microchip-core-qspi: Support per spi-mem operation frequency swi... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-39920
In the Linux kernel, the following vulnerability has been resolved: pcmcia: Add error handling for add_interval() in do_validate_mem() In the do_validate_mem(), the call to add_interval() does not handle errors. If kmalloc() fails in add_interval(), it ... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39919
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7996: add missing check for rx wcid entries Non-station wcid entries must not be passed to the rx functions. In case of the global wcid entry, it could even lead to corrup... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39918
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: fix linked list corruption Never leave scheduled wcid entries on the temporary on-stack list... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39917
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt Stanislav reported that in bpf_crypto_crypt() the destination dynptr's size is not validated to be at least as large as the sourc... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39916
In the Linux kernel, the following vulnerability has been resolved: mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters() When creating a new scheme of DAMON_RECLAIM, the calculation of 'min_age_region' uses 'aggr_interval' as the d... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-39915
In the Linux kernel, the following vulnerability has been resolved: net: phy: transfer phy_config_inband() locking responsibility to phylink Problem description =================== Lockdep reports a possible circular locking dependency (AB/BA) between ... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2025-39914
In the Linux kernel, the following vulnerability has been resolved: tracing: Silence warning when chunk allocation fails in trace_pid_write Syzkaller trigger a fault injection warning: WARNING: CPU: 1 PID: 12326 at tracepoint_add_func+0xbfc/0xeb0 Modul... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Misconfiguration