Latest CVE Feed
-
7.8
HIGHCVE-2025-40114
In the Linux kernel, the following vulnerability has been resolved: iio: light: Add check for array bounds in veml6075_read_int_time_ms The array contains only 5 elements, but the index calculated by veml6075_read_int_time_index can range from 0 to 7, w... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Apr. 29, 2025
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2025-40014
In the Linux kernel, the following vulnerability has been resolved: objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() If speed_hz < AMD_SPI_MIN_HZ, amd_set_spi_freq() iterates over the entire amd_spi_freq array without breaking out... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Apr. 29, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39989
In the Linux kernel, the following vulnerability has been resolved: x86/mce: use is_copy_from_user() to determine copy-from-user context Patch series "mm/hwpoison: Fix regressions in memory failure handling", v4. ## 1. What am I trying to do: This pat... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: May. 02, 2025
-
0.0
NACVE-2025-39930
In the Linux kernel, the following vulnerability has been resolved: ASoC: simple-card-utils: Don't use __free(device_node) at graph_util_parse_dai() commit 419d1918105e ("ASoC: simple-card-utils: use __free(device_node) for device node") uses __free(dev... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Memory Corruption
-
7.1
HIGHCVE-2025-39778
In the Linux kernel, the following vulnerability has been resolved: objtool, nvmet: Fix out-of-bounds stack access in nvmet_ctrl_state_show() The csts_state_names[] array only has six sparse entries, but the iteration code in nvmet_ctrl_state_show() ite... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Apr. 28, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-39755
In the Linux kernel, the following vulnerability has been resolved: staging: gpib: Fix cb7210 pcmcia Oops The pcmcia_driver struct was still only using the old .name initialization in the drv field. This led to a NULL pointer deref Oops in strcmp calle... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Apr. 28, 2025
- Vuln Type: Memory Corruption
-
7.1
HIGHCVE-2025-39735
In the Linux kernel, the following vulnerability has been resolved: jfs: fix slab-out-of-bounds read in ea_get() During the "size_check" label in ea_get(), the code checks if the extended attribute list (xattr) size matches ea_size. If not, it logs "ea_... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Apr. 28, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-39728
In the Linux kernel, the following vulnerability has been resolved: clk: samsung: Fix UBSAN panic in samsung_clk_init() With UBSAN_ARRAY_BOUNDS=y, I'm hitting the below panic due to dereferencing `ctx->clk_data.hws` before setting `ctx->clk_data.num = n... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Apr. 29, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-39688
In the Linux kernel, the following vulnerability has been resolved: nfsd: allow SC_STATUS_FREEABLE when searching via nfs4_lookup_stateid() The pynfs DELEG8 test fails when run against nfsd. It acquires a delegation and then lets the lease time out. It ... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Authorization
-
0.0
NACVE-2025-38637
In the Linux kernel, the following vulnerability has been resolved: net_sched: skbprio: Remove overly strict queue assertions In the current implementation, skbprio enqueue/dequeue contains an assertion that fails under certain conditions when SKBPRIO i... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2025-38575
In the Linux kernel, the following vulnerability has been resolved: ksmbd: use aead_request_free to match aead_request_alloc Use aead_request_free() instead of kfree() to properly free memory allocated by aead_request_alloc(). This ensures sensitive cry... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-38479
In the Linux kernel, the following vulnerability has been resolved: dmaengine: fsl-edma: free irq correctly in remove path Add fsl_edma->txirq/errirq check to avoid below warning because no errirq at i.MX9 platform. Otherwise there will be kernel dump: ... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-38240
In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr The function mtk_dp_wait_hpd_asserted() may be called before the `mtk_dp->drm_dev` pointer is assigned in mtk_dp_bridg... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-38152
In the Linux kernel, the following vulnerability has been resolved: remoteproc: core: Clear table_sz when rproc_shutdown There is case as below could trigger kernel dump: Use U-Boot to start remote processor(rproc) with resource table published to a fix... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Apr. 29, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-38104
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV RLCG Register Access is a way for virtual functions to safely access GPU registers ... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Race Condition
-
5.5
MEDIUMCVE-2025-38049
In the Linux kernel, the following vulnerability has been resolved: x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no monitors Commit 6eac36bb9eb0 ("x86/resctrl: Allocate the cleanest CLOSID by searching closid_num_dirty_rmid") add... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Apr. 29, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-37925
In the Linux kernel, the following vulnerability has been resolved: jfs: reject on-disk inodes of an unsupported type Syzbot has reported the following BUG: kernel BUG at fs/inode.c:668! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 3 UID:... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Aug. 28, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-37893
In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Fix off-by-one error in build_prologue() Vincent reported that running BPF progs with tailcalls on LoongArch causes kernel hard lockup. Debugging the issues shows that t... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Apr. 29, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-37860
In the Linux kernel, the following vulnerability has been resolved: sfc: fix NULL dereferences in ef100_process_design_param() Since cited commit, ef100_probe_main() and hence also ef100_check_design_params() run before efx->net_dev is created; conseq... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Apr. 29, 2025
- Vuln Type: Misconfiguration
-
7.1
HIGHCVE-2025-37785
In the Linux kernel, the following vulnerability has been resolved: ext4: fix OOB read when checking dotdot dir Mounting a corrupted filesystem with directory which contains '.' dir entry with rec_len == block size results in out-of-bounds read (later o... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: May. 02, 2025
- Vuln Type: Memory Corruption