Latest CVE Feed
-
0.0
NACVE-2022-50423
In the Linux kernel, the following vulnerability has been resolved: ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage() There is an use-after-free reported by KASAN: BUG: KASAN: use-after-free in acpi_ut_remove_reference+0x3b/0x82 Rea... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50422
In the Linux kernel, the following vulnerability has been resolved: scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() When executing SMP task failed, the smp_execute_task_sg() calls del_timer() to delete "slow_task->timer". However, if the t... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50421
In the Linux kernel, the following vulnerability has been resolved: rpmsg: char: Avoid double destroy of default endpoint The rpmsg_dev_remove() in rpmsg_core is the place for releasing this default endpoint. So need to avoid destroying the default end... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50420
In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/hpre - fix resource leak in remove process In hpre_remove(), when the disable operation of qm sriov failed, the following logic should continue to be executed to relea... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2021-4460
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix UBSAN shift-out-of-bounds warning If get_num_sdma_queues or get_num_xgmi_sdma_queues is 0, we end up doing a shift operation where the number of bits shifted equals numb... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
-
8.4
HIGHCVE-2025-10847
DX Unified Infrastructure Management (Nimsoft/UIM) and below contains an improper ACL handling vulnerability in the robot (controller) component. A remote attacker can execute commands, read from, or write to the target system.... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-61622
Deserialization of untrusted data in python in pyfory versions 0.12.0 through 0.12.2, or the legacy pyfury versions from 0.1.0 through 0.10.3: allows arbitrary code execution. An application is vulnerable if it reads pyfory serialized data from untrusted ... Read more
Affected Products : fory- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Injection
-
0.0
NACVE-2025-39928
In the Linux kernel, the following vulnerability has been resolved: i2c: rtl9300: ensure data length is within supported range Add an explicit check for the xfer length to 'rtl9300_i2c_config_xfer' to ensure the data length isn't within the supported ra... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-39927
In the Linux kernel, the following vulnerability has been resolved: ceph: fix race condition validating r_parent before applying state Add validation to ensure the cached parent directory inode matches the directory info in MDS replies. This prevents cl... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2025-39926
In the Linux kernel, the following vulnerability has been resolved: genetlink: fix genl_bind() invoking bind() after -EPERM Per family bind/unbind callbacks were introduced to allow families to track multicast group consumer presence, e.g. to start or s... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Authorization
-
0.0
NACVE-2025-39925
In the Linux kernel, the following vulnerability has been resolved: can: j1939: implement NETDEV_UNREGISTER notification handler syzbot is reporting unregister_netdevice: waiting for vcan0 to become free. Usage count = 2 problem, for j1939 protocol ... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2025-39924
In the Linux kernel, the following vulnerability has been resolved: erofs: fix invalid algorithm for encoded extents The current algorithm sanity checks do not properly apply to new encoded extents. Unify the algorithm check with Z_EROFS_COMPRESSION(_R... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-39923
In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees When we don't have a clock specified in the device tree, we have no way to ensure the BAM is on. This is often the c... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-39922
In the Linux kernel, the following vulnerability has been resolved: ixgbe: fix incorrect map used in eee linkmode incorrectly used ixgbe_lp_map in loops intended to populate the supported and advertised EEE linkmode bitmaps based on ixgbe_ls_map. This r... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39921
In the Linux kernel, the following vulnerability has been resolved: spi: microchip-core-qspi: stop checking viability of op->max_freq in supports_op callback In commit 13529647743d9 ("spi: microchip-core-qspi: Support per spi-mem operation frequency swi... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-39920
In the Linux kernel, the following vulnerability has been resolved: pcmcia: Add error handling for add_interval() in do_validate_mem() In the do_validate_mem(), the call to add_interval() does not handle errors. If kmalloc() fails in add_interval(), it ... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39919
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7996: add missing check for rx wcid entries Non-station wcid entries must not be passed to the rx functions. In case of the global wcid entry, it could even lead to corrup... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39918
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: fix linked list corruption Never leave scheduled wcid entries on the temporary on-stack list... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39917
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt Stanislav reported that in bpf_crypto_crypt() the destination dynptr's size is not validated to be at least as large as the sourc... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39916
In the Linux kernel, the following vulnerability has been resolved: mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters() When creating a new scheme of DAMON_RECLAIM, the calculation of 'min_age_region' uses 'aggr_interval' as the d... Read more
Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Misconfiguration