This page lists Common Vulnerabilities and Exposures (CVE) that may affect the Amazon Linux operating system.
| CVE ID | Description | Public Date |
|---|---|---|
| CVE-2026-2780 |
Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2757 |
Incorrect boundary conditions in the WebRTC: Audio/Video component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2778 |
Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2784 |
Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2789 |
Use-after-free in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2771 |
Undefined behavior in the DOM: Core & HTML component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2781 |
Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2804 |
Use-after-free in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148.
|
2026-02-24 |
| CVE-2026-2765 |
Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2807 |
Memory safety bugs present in Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148.
|
2026-02-24 |
| CVE-2026-2758 |
Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2785 |
Invalid pointer in the JavaScript Engine component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2634 |
Malicious scripts could cause desynchronization between the address bar and web content before a response is received in Firefox iOS, allowing attacker-controlled pages to be presented under spoofed domains. This vulnerability affects Firefox for iOS < 147.4.
|
2026-02-24 |
| CVE-2026-2783 |
Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2793 |
Memory safety bugs present in Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2760 |
Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2800 |
Spoofing issue in the WebAuthn component in Firefox for Android. This vulnerability affects Firefox < 148.
|
2026-02-24 |
| CVE-2026-2761 |
Sandbox escape in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2764 |
JIT miscompilation, use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2772 |
Use-after-free in the Audio/Video: Playback component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2782 |
Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2775 |
Mitigation bypass in the DOM: HTML Parser component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2796 |
JIT miscompilation in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148.
|
2026-02-24 |
| CVE-2026-2792 |
Memory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2776 |
Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2795 |
Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148.
|
2026-02-24 |
| CVE-2026-2801 |
Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148.
|
2026-02-24 |
| CVE-2026-2797 |
Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148.
|
2026-02-24 |
| CVE-2026-2774 |
Integer overflow in the Audio/Video component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2802 |
Race condition in the JavaScript: GC component. This vulnerability affects Firefox < 148.
|
2026-02-24 |
| CVE-2026-2799 |
Use-after-free in the DOM: Core & HTML component. This vulnerability affects Firefox < 148.
|
2026-02-24 |
| CVE-2026-2788 |
Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2794 |
Information disclosure due to uninitialized memory in Firefox and Firefox Focus for Android. This vulnerability affects Firefox < 148.
|
2026-02-24 |
| CVE-2026-2766 |
Use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2767 |
Use-after-free in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2787 |
Use-after-free in the DOM: Window and Location component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2786 |
Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2803 |
Information disclosure, mitigation bypass in the Settings UI component. This vulnerability affects Firefox < 148.
|
2026-02-24 |
| CVE-2026-2762 |
Integer overflow in the JavaScript: Standard Library component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2791 |
Mitigation bypass in the Networking: Cache component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2769 |
Use-after-free in the Storage: IndexedDB component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2759 |
Incorrect boundary conditions in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2777 |
Privilege escalation in the Messaging System component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2798 |
Use-after-free in the DOM: Core & HTML component. This vulnerability affects Firefox < 148.
|
2026-02-24 |
| CVE-2026-2805 |
Invalid pointer in the DOM: Core & HTML component. This vulnerability affects Firefox < 148.
|
2026-02-24 |
| CVE-2026-2773 |
Incorrect boundary conditions in the Web Audio component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2768 |
Sandbox escape in the Storage: IndexedDB component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2806 |
Uninitialized memory in the Graphics: Text component. This vulnerability affects Firefox < 148.
|
2026-02-24 |
| CVE-2026-2790 |
Same-origin policy bypass in the Networking: JAR component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2779 |
Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2026-2770 |
Use-after-free in the DOM: Bindings (WebIDL) component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
|
2026-02-24 |
| CVE-2025-61145 |
libtiff up to v4.7.1 was discovered to contain a double free via the component tools/tiffcrop.c.
|
2026-02-23 |
| CVE-2026-2903 |
A flaw has been found in skvadrik re2c up to 4.4. Impacted is the function check_and_merge_special_rules of the file src/parse/ast.cc. This manipulation causes null pointer dereference. The attack can only be executed locally. The exploit has been published and may be used. Patch name: febeb977936f9519a25d9fbd10ff8256358cdb97. It is suggested to install a patch to address this issue.
|
2026-02-22 |
| CVE-2026-27199 |
Werkzeug is a comprehensive WSGI web application library. Versions 3.1.5 and below, the safe_join function allows Windows device names as filenames if preceded by other path segments. This was previously reported as GHSA-hgf8-39gv-g3f2, but the added filtering failed to account for the fact that safe_join accepts paths with multiple segments, such as example/NUL. The function send_from_directory uses safe_join to safely serve files at user-specified paths under a directory. If the application is running on Windows, and the requested path ends with a special device name, the file will be opened successfully, but reading will hang indefinitely. This issue has been fixed in version 3.1.6.
|
2026-02-21 |
| CVE-2026-27205 |
Flask is a web server gateway interface (WSGI) web application framework. In versions 3.1.2 and below, when the session object is accessed, Flask should set the Vary: Cookie header., resulting in a Use of Cache Containing Sensitive Information vulnerability. The logic instructs caches not to cache the response, as it may contain information specific to a logged in user. This is handled in most cases, but some forms of access such as the Python in operator were overlooked. The severity and risk depend on the application being hosted behind a caching proxy that doesn't ignore responses with cookies, not setting a Cache-Control header to mark pages as private or non-cacheable, and accessing the session in a way that only touches keys without reading values or mutating the session. The issue has been fixed in version 3.1.3.
|
2026-02-21 |
| CVE-2026-26960 |
node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.
|
2026-02-20 |
| CVE-2026-2708 |
libsoup includes an embedded HTTP/1 server. When a server sits behind a proxy / load balancer, it’s critical that every hop agrees on how request bodies are framed.
In the affected code path, libsoup accepted HTTP/1 requests with ambiguous body framing:
multiple Content-Length headers (CL.CL)
Transfer-Encoding: chunked together with Content-Length (TE+CL)
Different intermediaries pick different framing rules in these cases. If a front-end and back-end disagree, an attacker can desynchronize the connection and “smuggle” an extra request through the chain. Depending on deployment, this can lead to routing/ACL bypass, cache poisoning, or reaching internal-only endpoints.
|
2026-02-20 |
| CVE-2026-2049 |
The `rgbe_read_new_rle` function in `gegl/libs/rgbe/rgbe.c` has a heap buffer overflow vulnerability during HDR image parsing that may allow remote code execution.
|
2026-02-19 |
| CVE-2026-2243 |
A flaw was found in QEMU. A specially crafted VMDK image could trigger an out-of-bounds read vulnerability, potentially leading to a 12-byte leak of sensitive information or a denial of service condition (DoS).
|
2026-02-19 |
| CVE-2026-2050 |
When parsing an HDR image file, the function [rgbe_read_new_rle gegl/libs/rgbe/rgbe.c] contains HEAP Based Buffer Overflow vulnerability that can lead to remote code execution.
|
2026-02-19 |
| CVE-2026-23212 |
In the Linux kernel, the following vulnerability has been resolved:
bonding: annotate data-races around slave->last_rx
|
2026-02-18 |
| CVE-2026-23215 |
In the Linux kernel, the following vulnerability has been resolved:
x86/vmware: Fix hypercall clobbers
|
2026-02-18 |
| CVE-2026-23218 |
In the Linux kernel, the following vulnerability has been resolved:
gpio: loongson-64bit: Fix incorrect NULL check after devm_kcalloc()
|
2026-02-18 |
| CVE-2025-71225 |
In the Linux kernel, the following vulnerability has been resolved:
md: suspend array while updating raid_disks via sysfs
|
2026-02-18 |
| CVE-2025-71226 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP
|
2026-02-18 |
| CVE-2026-2604 |
The Evolution backend server exposes the D-Bus service org.gnome.evolution.dataserver.AddressBook, that can be used in order to manage contacts. A Flatpak application with access to this D-Bus service can exploit this issue in order to gain arbitrary file deletion on the host filesystem.
|
2026-02-18 |
| CVE-2026-23216 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()
|
2026-02-18 |
| CVE-2026-23211 |
In the Linux kernel, the following vulnerability has been resolved:
mm, swap: restore swap_space attr aviod kernel panic
|
2026-02-18 |
| CVE-2026-27171 |
A flaw was found in zlib. An attacker providing specially crafted input to the crc32_combine64 or crc32_combine_gen64 functions could trigger an infinite loop within the x2nmodp function. This leads to excessive CPU consumption, which can result in a Denial of Service (DoS) for the affected system.
|
2026-02-18 |
| CVE-2025-71227 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: don't WARN for connections on invalid channels
|
2026-02-18 |
| CVE-2026-25500 |
Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, `Rack::Directory` generates an HTML directory index where each file entry is rendered as a clickable link. If a file exists on disk whose basename starts with the `javascript:` scheme (e.g. `javascript:alert(1)`), the generated index contains an anchor whose `href` is exactly `javascript:alert(1)`. Clicking the entry executes JavaScript in the browser (demonstrated with `alert(1)`). Versions 2.2.22, 3.1.20, and 3.2.5 fix the issue.
|
2026-02-18 |
| CVE-2026-22860 |
Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, `Rack::Directory`’s path check used a string prefix match on the expanded path. A request like `/../root_example/` can escape the configured root if the target path starts with the root string, allowing directory listing outside the intended root. Versions 2.2.22, 3.1.20, and 3.2.5 fix the issue.
|
2026-02-18 |
| CVE-2026-2641 |
A weakness has been identified in universal-ctags ctags up to 6.2.1. The affected element is the function parseExpression/parseExprList of the file parsers/v.c of the component V Language Parser. Executing a manipulation can lead to uncontrolled recursion. It is possible to launch the attack on the local host. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
|
2026-02-18 |
| CVE-2026-23214 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: reject new transactions if the fs is fully read-only
|
2026-02-18 |
| CVE-2025-71228 |
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: Set correct protection_map[] for VM_NONE/VM_SHARED
|
2026-02-18 |
| CVE-2026-24733 |
A flaw was found in Tomcat. An improper input validation vulnerability allows an attacker to bypass security constraints. Specifically, if a security constraint is configured to permit HEAD requests to a URI but deny GET requests, a malformed or specification invalid HEAD request using the HTTP/0.9 protocol can bypass the intended denial rule, enabling an attacker to access resources that should be protected.
|
2026-02-17 |
| CVE-2025-66614 |
mproper Input Validation vulnerability. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected. Tomcat did not validate that the host name provided via the SNI extension was the same as the host name provided in the HTTP host header field. If Tomcat was configured with more than one virtual host and the TLS configuration for one of those hosts did not require client certificate authentication but another one did, it was possible for a client to bypass the client certificate authentication by sending different host names in the SNI extension and the HTTP host header field. The vulnerability only applies if client certificate authentication is only enforced at the Connector. It does not apply if client certificate authentication is enforced at the web application. Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue.
|
2026-02-17 |
| CVE-2026-24734 |
Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat.
When using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed.
This issue affects Apache Tomcat Native: from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat: from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114.
The following versions were EOL at the time the CVE was created but are
known to be affected: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected.
Apache Tomcat Native users are recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue.
Apache Tomcat users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which fix the issue.
|
2026-02-17 |
| CVE-2026-2447 |
Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, Firefox ESR < 115.32.1, Thunderbird < 140.7.2, and Thunderbird < 147.0.2.
|
2026-02-16 |
| CVE-2026-2574 |
A flaw was found in glib-networking. A malicious Transport Layer Security (TLS) server can exploit an out-of-bounds read and invalid free vulnerability when a client using the OpenSSL backend connects. By advertising a specially crafted client-CA list, the server can trigger an issue where memory is accessed outside of its allocated buffer and subsequently freed incorrectly. This can lead to a denial-of-service and potentially disclose limited heap memory.
|
2026-02-16 |
| CVE-2026-2032 |
Malicious scripts that interrupt new tab page loading could cause desynchronization between the address bar and page content, allowing the attacker to spoof arbitrary HTML under a trusted domain. This vulnerability affects Firefox for iOS < 147.2.1.
|
2026-02-16 |
| CVE-2026-2474 |
Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom().
The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) is supplied, the expression length + 1u causes an integer wraparound, resulting in a zero-byte allocation. The subsequent call to getrandom(data, length, GRND_NONBLOCK) passes the original negative value, which is implicitly converted to a large unsigned value (typically SIZE_MAX). This can result in writes beyond the allocated buffer, leading to heap memory corruption and application crash (denial of service).
In common usage, the length argument is typically hardcoded by the caller, which reduces the likelihood of attacker-controlled exploitation. Applications that pass untrusted input to this parameter may be affected.
|
2026-02-16 |
| CVE-2026-23148 |
In the Linux kernel, the following vulnerability has been resolved:
nvmet: fix race in nvmet_bio_done() leading to NULL pointer dereference
|
2026-02-14 |
| CVE-2026-23200 |
In the Linux kernel, the following vulnerability has been resolved:
ipv6: Fix ECMP sibling count mismatch when clearing RTF_ADDRCONF
|
2026-02-14 |
| CVE-2026-23170 |
In the Linux kernel, the following vulnerability has been resolved:
drm/imx/tve: fix probe device leak
|
2026-02-14 |
| CVE-2026-23176 |
In the Linux kernel, the following vulnerability has been resolved:
platform/x86: toshiba_haps: Fix memory leaks in add/remove routines
|
2026-02-14 |
| CVE-2026-23185 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: mld: cancel mlo_scan_start_wk
|
2026-02-14 |
| CVE-2026-23137 |
In the Linux kernel, the following vulnerability has been resolved:
of: unittest: Fix memory leak in unittest_data_add()
|
2026-02-14 |
| CVE-2026-23160 |
In the Linux kernel, the following vulnerability has been resolved:
octeon_ep: Fix memory leak in octep_device_setup()
|
2026-02-14 |
| CVE-2026-23199 |
In the Linux kernel, the following vulnerability has been resolved:
procfs: avoid fetching build ID while holding VMA lock
|
2026-02-14 |
| CVE-2026-23143 |
In the Linux kernel, the following vulnerability has been resolved:
virtio_net: Fix misalignment bug in struct virtnet_info
|
2026-02-14 |
| CVE-2026-23150 |
In the Linux kernel, the following vulnerability has been resolved:
nfc: llcp: Fix memleak in nfc_llcp_send_ui_frame().
|
2026-02-14 |
| CVE-2026-23195 |
In the Linux kernel, the following vulnerability has been resolved:
cgroup/dmem: avoid pool UAF
|
2026-02-14 |
| CVE-2026-23207 |
In the Linux kernel, the following vulnerability has been resolved:
spi: tegra210-quad: Protect curr_xfer check in IRQ handler
|
2026-02-14 |
| CVE-2026-23180 |
In the Linux kernel, the following vulnerability has been resolved:
dpaa2-switch: add bounds check for if_id in IRQ handler
|
2026-02-14 |
| CVE-2026-23127 |
In the Linux kernel, the following vulnerability has been resolved:
perf: Fix refcount warning on event->mmap_count increment
|
2026-02-14 |
| CVE-2026-23114 |
In the Linux kernel, the following vulnerability has been resolved:
arm64/fpsimd: ptrace: Fix SVE writes on !SME systems
|
2026-02-14 |
| CVE-2025-71221 |
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: mmp_pdma: Fix race condition in mmp_pdma_residue()
|
2026-02-14 |
| CVE-2026-23142 |
In the Linux kernel, the following vulnerability has been resolved:
mm/damon/sysfs-scheme: cleanup access_pattern subdirs on scheme dir setup failure
|
2026-02-14 |
| CVE-2026-23167 |
In the Linux kernel, the following vulnerability has been resolved:
nfc: nci: Fix race between rfkill and nci_unregister_device().
|
2026-02-14 |
| CVE-2026-23115 |
In the Linux kernel, the following vulnerability has been resolved:
serial: Fix not set tty->port race condition
|
2026-02-14 |
| CVE-2026-23119 |
In the Linux kernel, the following vulnerability has been resolved:
bonding: provide a net pointer to __skb_flow_dissect()
|
2026-02-14 |
| CVE-2026-23157 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: do not strictly require dirty metadata threshold for metadata writepages
|
2026-02-14 |
| CVE-2026-23187 |
In the Linux kernel, the following vulnerability has been resolved:
pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc->domains
|
2026-02-14 |
| CVE-2026-23139 |
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_conncount: update last_gc only when GC has been performed
|
2026-02-14 |
| CVE-2026-23121 |
In the Linux kernel, the following vulnerability has been resolved:
mISDN: annotate data-race around dev->work
|
2026-02-14 |
| CVE-2026-23196 |
In the Linux kernel, the following vulnerability has been resolved:
HID: Intel-thc-hid: Intel-thc: Add safety check for reading DMA buffer
|
2026-02-14 |
| CVE-2025-71202 |
In the Linux kernel, the following vulnerability has been resolved:
iommu/sva: invalidate stale IOTLB entries for kernel address space
|
2026-02-14 |
| CVE-2026-23131 |
In the Linux kernel, the following vulnerability has been resolved:
platform/x86: hp-bioscfg: Fix kobject warnings for empty attribute names
|
2026-02-14 |
| CVE-2025-71203 |
In the Linux kernel, the following vulnerability has been resolved:
riscv: Sanitize syscall table indexing under speculation
|
2026-02-14 |
| CVE-2026-23113 |
In the Linux kernel, the following vulnerability has been resolved:
io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop
|
2026-02-14 |
| CVE-2025-71204 |
In the Linux kernel, the following vulnerability has been resolved:
smb/server: fix refcount leak in parse_durable_handle_context()
|
2026-02-14 |
| CVE-2025-71222 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: wlcore: ensure skb headroom before skb_push
|
2026-02-14 |
| CVE-2026-23202 |
In the Linux kernel, the following vulnerability has been resolved:
spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer
|
2026-02-14 |
| CVE-2026-23158 |
In the Linux kernel, the following vulnerability has been resolved:
gpio: virtuser: fix UAF in configfs release path
|
2026-02-14 |
| CVE-2026-23197 |
In the Linux kernel, the following vulnerability has been resolved:
i2c: imx: preserve error state in block data length handler
|
2026-02-14 |
| CVE-2025-71220 |
In the Linux kernel, the following vulnerability has been resolved:
smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe()
|
2026-02-14 |
| CVE-2025-71201 |
In the Linux kernel, the following vulnerability has been resolved:
netfs: Fix early read unlock of page with EOF in middle
|
2026-02-14 |
| CVE-2026-23130 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix dead lock while flushing management frames
|
2026-02-14 |
| CVE-2026-23134 |
In the Linux kernel, the following vulnerability has been resolved:
slab: fix kmalloc_nolock() context check for PREEMPT_RT
|
2026-02-14 |
| CVE-2026-23133 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath10k: fix dma_free_coherent() pointer
|
2026-02-14 |
| CVE-2026-23166 |
In the Linux kernel, the following vulnerability has been resolved:
ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues
|
2026-02-14 |
| CVE-2026-23209 |
In the Linux kernel, the following vulnerability has been resolved:
macvlan: fix error recovery in macvlan_common_newlink()
|
2026-02-14 |
| CVE-2026-23124 |
In the Linux kernel, the following vulnerability has been resolved:
ipv6: annotate data-race in ndisc_router_discovery()
|
2026-02-14 |
| CVE-2026-23193 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()
|
2026-02-14 |
| CVE-2026-23188 |
In the Linux kernel, the following vulnerability has been resolved:
net: usb: r8152: fix resume reset deadlock
|
2026-02-14 |
| CVE-2026-23140 |
In the Linux kernel, the following vulnerability has been resolved:
bpf, test_run: Subtract size of xdp_frame from allowed metadata size
|
2026-02-14 |
| CVE-2026-23168 |
In the Linux kernel, the following vulnerability has been resolved:
flex_proportions: make fprop_new_period() hardirq safe
|
2026-02-14 |
| CVE-2026-23153 |
In the Linux kernel, the following vulnerability has been resolved:
firewire: core: fix race condition against transaction list
|
2026-02-14 |
| CVE-2026-23138 |
In the Linux kernel, the following vulnerability has been resolved:
tracing: Add recursion protection in kernel stack trace recording
|
2026-02-14 |
| CVE-2026-23156 |
In the Linux kernel, the following vulnerability has been resolved:
efivarfs: fix error propagation in efivar_entry_get()
|
2026-02-14 |
| CVE-2026-23164 |
In the Linux kernel, the following vulnerability has been resolved:
rocker: fix memory leak in rocker_world_port_post_fini()
|
2026-02-14 |
| CVE-2026-23203 |
In the Linux kernel, the following vulnerability has been resolved:
net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue
|
2026-02-14 |
| CVE-2026-23181 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: sync read disk super and set block size
|
2026-02-14 |
| CVE-2026-23186 |
In the Linux kernel, the following vulnerability has been resolved:
hwmon: (acpi_power_meter) Fix deadlocks related to acpi_power_meter_notify()
|
2026-02-14 |
| CVE-2026-23141 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: send: check for inline extents in range_is_hole_in_parent()
|
2026-02-14 |
| CVE-2025-71200 |
In the Linux kernel, the following vulnerability has been resolved:
mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode
|
2026-02-14 |
| CVE-2026-23179 |
In the Linux kernel, the following vulnerability has been resolved:
nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready()
|
2026-02-14 |
| CVE-2026-23162 |
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/nvm: Fix double-free on aux add failure
|
2026-02-14 |
| CVE-2026-23155 |
In the Linux kernel, the following vulnerability has been resolved:
can: gs_usb: gs_usb_receive_bulk_callback(): fix error message
|
2026-02-14 |
| CVE-2026-23128 |
In the Linux kernel, the following vulnerability has been resolved:
arm64: Set __nocfi on swsusp_arch_resume()
|
2026-02-14 |
| CVE-2026-23161 |
In the Linux kernel, the following vulnerability has been resolved:
mm/shmem, swap: fix race of truncate and swap entry split
|
2026-02-14 |
| CVE-2026-23125 |
In the Linux kernel, the following vulnerability has been resolved:
sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT
|
2026-02-14 |
| CVE-2026-23147 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: zlib: fix the folio leak on S390 hardware acceleration
|
2026-02-14 |
| CVE-2026-23189 |
In the Linux kernel, the following vulnerability has been resolved:
ceph: fix NULL pointer dereference in ceph_mds_auth_match()
|
2026-02-14 |
| CVE-2026-23132 |
In the Linux kernel, the following vulnerability has been resolved:
drm/bridge: synopsys: dw-dp: fix error paths of dw_dp_bind
|
2026-02-14 |
| CVE-2026-23172 |
In the Linux kernel, the following vulnerability has been resolved:
net: wwan: t7xx: fix potential skb->frags overflow in RX path
|
2026-02-14 |
| CVE-2026-23154 |
In the Linux kernel, the following vulnerability has been resolved:
net: fix segmentation of forwarding fraglist GRO
|
2026-02-14 |
| CVE-2026-23178 |
In the Linux kernel, the following vulnerability has been resolved:
HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()
|
2026-02-14 |
| CVE-2026-23198 |
In the Linux kernel, the following vulnerability has been resolved:
KVM: Don't clobber irqfd routing type when deassigning irqfd
|
2026-02-14 |
| CVE-2026-23144 |
In the Linux kernel, the following vulnerability has been resolved:
mm/damon/sysfs: cleanup attrs subdirs on context dir setup failure
|
2026-02-14 |
| CVE-2026-23123 |
In the Linux kernel, the following vulnerability has been resolved:
interconnect: debugfs: initialize src_node and dst_node to empty strings
|
2026-02-14 |
| CVE-2026-23177 |
In the Linux kernel, the following vulnerability has been resolved:
mm, shmem: prevent infinite loop on truncate race
|
2026-02-14 |
| CVE-2026-23135 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix dma_free_coherent() pointer
|
2026-02-14 |
| CVE-2026-23173 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: TC, delete flows only for existing peers
|
2026-02-14 |
| CVE-2026-23149 |
In the Linux kernel, the following vulnerability has been resolved:
drm: Do not allow userspace to trigger kernel warnings in drm_gem_change_handle_ioctl()
|
2026-02-14 |
| CVE-2026-23208 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Prevent excessive number of frames
|
2026-02-14 |
| CVE-2026-23136 |
In the Linux kernel, the following vulnerability has been resolved:
libceph: reset sparse-read state in osd_fault()
|
2026-02-14 |
| CVE-2026-23205 |
In the Linux kernel, the following vulnerability has been resolved:
smb/client: fix memory leak in smb2_open_file()
|
2026-02-14 |
| CVE-2025-71223 |
In the Linux kernel, the following vulnerability has been resolved:
smb/server: fix refcount leak in smb2_open()
|
2026-02-14 |
| CVE-2026-23145 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref
|
2026-02-14 |
| CVE-2026-23190 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: amd: fix memory leak in acp3x pdm dma ops
|
2026-02-14 |
| CVE-2026-23171 |
In the Linux kernel, the following vulnerability has been resolved:
bonding: fix use-after-free due to enslave fail after slave array update
|
2026-02-14 |
| CVE-2026-23126 |
In the Linux kernel, the following vulnerability has been resolved:
netdevsim: fix a race issue related to the operation on bpf_bound_progs list
|
2026-02-14 |
| CVE-2026-23183 |
In the Linux kernel, the following vulnerability has been resolved:
cgroup/dmem: fix NULL pointer dereference when setting max
|
2026-02-14 |
| CVE-2026-23165 |
In the Linux kernel, the following vulnerability has been resolved:
sfc: fix deadlock in RSS config read
|
2026-02-14 |
| CVE-2026-23169 |
In the Linux kernel, the following vulnerability has been resolved:
mptcp: fix race in mptcp_pm_nl_flush_addrs_doit()
|
2026-02-14 |
| CVE-2026-23159 |
In the Linux kernel, the following vulnerability has been resolved:
perf: sched: Fix perf crash with new is_user_task() helper
|
2026-02-14 |
| CVE-2026-23122 |
In the Linux kernel, the following vulnerability has been resolved:
igc: Reduce TSN TX packet buffer from 7KB to 5KB per queue
|
2026-02-14 |
| CVE-2026-23151 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: MGMT: Fix memory leak in set_ssp_complete
|
2026-02-14 |
| CVE-2026-23129 |
In the Linux kernel, the following vulnerability has been resolved:
dpll: Prevent duplicate registrations
|
2026-02-14 |
| CVE-2026-23118 |
In the Linux kernel, the following vulnerability has been resolved:
rxrpc: Fix data-race warning and potential load/store tearing
|
2026-02-14 |
| CVE-2026-23191 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: aloop: Fix racy access at PCM trigger
|
2026-02-14 |
| CVE-2026-23120 |
In the Linux kernel, the following vulnerability has been resolved:
l2tp: avoid one data-race in l2tp_tunnel_del_work()
|
2026-02-14 |
| CVE-2026-23204 |
In the Linux kernel, the following vulnerability has been resolved:
net/sched: cls_u32: use skb_header_pointer_careful()
|
2026-02-14 |
| CVE-2026-23192 |
In the Linux kernel, the following vulnerability has been resolved:
linkwatch: use __dev_put() in callers to prevent UAF
|
2026-02-14 |
| CVE-2026-23184 |
In the Linux kernel, the following vulnerability has been resolved:
binder: fix UAF in binder_netlink_report()
|
2026-02-14 |
| CVE-2026-23146 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work
|
2026-02-14 |
| CVE-2026-23182 |
In the Linux kernel, the following vulnerability has been resolved:
spi: tegra: Fix a memory leak in tegra_slink_probe()
|
2026-02-14 |
| CVE-2025-71224 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: ocb: skip rx_no_sta when interface is not joined
|
2026-02-14 |
| CVE-2026-23206 |
In the Linux kernel, the following vulnerability has been resolved:
dpaa2-switch: prevent ZERO_SIZE_PTR dereference when num_ifs is zero
|
2026-02-14 |
| CVE-2026-23117 |
In the Linux kernel, the following vulnerability has been resolved:
ice: add missing ice_deinit_hw() in devlink reinit path
|
2026-02-14 |
| CVE-2026-23210 |
In the Linux kernel, the following vulnerability has been resolved:
ice: Fix PTP NULL pointer dereference during VSI rebuild
|
2026-02-14 |
| CVE-2026-23163 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove
|
2026-02-14 |
| CVE-2026-23201 |
In the Linux kernel, the following vulnerability has been resolved:
ceph: fix oops due to invalid pointer for kfree() in parse_longname()
|
2026-02-14 |
| CVE-2026-23152 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: correctly decode TTLM with default link map
|
2026-02-14 |
| CVE-2026-23116 |
In the Linux kernel, the following vulnerability has been resolved:
pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu
|
2026-02-14 |
| CVE-2026-26081 |
haproxy: Token parsing code on INITIAL packet for the NEW_TOKEN format is not
robust enough and may even crash on some rare malformed packets.
|
2026-02-13 |
| CVE-2026-2443 |
A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processing specially crafted HTTP Range headers, the library may improperly validate requested byte ranges. In certain build configurations, this could allow a remote attacker to access portions of server memory beyond the intended response. Exploitation requires a vulnerable configuration and access to a server using the embedded SoupServer component.
|
2026-02-13 |
| CVE-2026-26080 |
haproxy: BUG/MAJOR: quic: fix parsing frame type
|
2026-02-13 |
| CVE-2026-26269 |
Vim is an open source, command line text editor. Prior to 9.1.2148, a stack buffer overflow vulnerability exists in Vim's NetBeans integration when processing the specialKeys command, affecting Vim builds that enable and use the NetBeans feature. The Stack buffer overflow exists in special_keys() (in src/netbeans.c). The while (*tok) loop writes two bytes per iteration into a 64-byte stack buffer (keybuf) with no bounds check. A malicious NetBeans server can overflow keybuf with a single specialKeys command. The issue has been fixed as of Vim patch v9.1.2148.
|
2026-02-13 |
| CVE-2026-23112 |
In the Linux kernel, the following vulnerability has been resolved:
nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec
|
2026-02-13 |
| CVE-2026-2369 |
libsoup: heap buffer overflow in soup_content_sniffer_sniff
|
2026-02-13 |
| CVE-2026-23111 |
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()
|
2026-02-13 |
| CVE-2026-2003 |
Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viability of attacks that arrange for presence of confidential information in disclosed bytes, but they seem unlikely. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.
|
2026-02-12 |
| CVE-2026-2004 |
Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.
|
2026-02-12 |
| CVE-2026-2006 |
Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffer overrun. That suffices to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.
|
2026-02-12 |
| CVE-2026-2005 |
Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.
|
2026-02-12 |
| CVE-2020-37167 |
ClamAV ClamBC bytecode interpreter contains a vulnerability in function name processing that allows attackers to manipulate bytecode function names. Attackers can exploit the weak input validation in function name encoding to potentially execute malicious bytecode or cause unexpected behavior in the ClamAV engine.
|
2026-02-12 |
| CVE-2026-2007 |
Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of attacks that lead to privilege escalation. PostgreSQL 18.1 and 18.0 are affected.
|
2026-02-12 |
| CVE-2026-0968 |
libssh OOB Read in sftp_parse_longname()
|
2026-02-11 |
| CVE-2026-0964 |
libssh: SCP Protocol Path Traversal in ssh_scp_pull_request()
|
2026-02-11 |
| CVE-2026-25990 |
Pillow is a Python imaging library. From 10.3.0 to before 12.1.1, n out-of-bounds write may be triggered when loading a specially crafted PSD image. This vulnerability is fixed in 12.1.1.
|
2026-02-11 |
| CVE-2026-0967 |
libssh: Specially crafted patterns could cause DoS
|
2026-02-11 |
| CVE-2026-0966 |
libssh: Buffer underflow in ssh_get_hexa() on invalid input
|
2026-02-11 |
| CVE-2026-1837 |
A specially-crafted file can cause libjxl's decoder to write pixel data to uninitialized unallocated memory. Soon after that data from another uninitialized unallocated region is copied to pixel data.
This can be done by requesting color transformation of grayscale images to another grayscale color space. Buffers allocated for 1-float-per-pixel are used as if they are allocated for 3-float-per-pixel. That happens only if LCMS2 is used as CMS engine. There is another CMS engine available (selected by build flags).
|
2026-02-11 |
| CVE-2026-2272 |
GIMP: ICO import integer overflow bypass leads to heap buffer overflow
|
2026-02-11 |
| CVE-2026-2271 |
An integer overflow vulnerability has been identified in the PSP (Paint Shop Pro) file parser of GIMP. The issue occurs in the read_creator_block() function, where the Creator metadata block is processed. Specifically, a 32-bit length value read from the file is used directly for memory allocation without proper validation.
|
2026-02-11 |
| CVE-2026-0965 |
libssh Possible Denial of Service when parsing unexpected configuration files
|
2026-02-11 |
| CVE-2025-12474 |
A specially-crafted file can cause libjxl's decoder to read pixel data from uninitialized (but allocated) memory.
This can be done by causing the decoder to reference an outside-image-bound area in a subsequent patches. An incorrect optimization causes the decoder to omit populating those areas.
|
2026-02-11 |
| CVE-2025-14821 |
A flaw was found in libssh. This vulnerability allows local man-in-the-middle attacks, security downgrades of SSH (Secure Shell) connections, and manipulation of trusted host information, posing a significant risk to the confidentiality, integrity, and availability of SSH communications via an insecure default configuration on Windows systems where the library automatically loads configuration files from the C:\etc directory, which can be created and modified by unprivileged local users.
|
2026-02-11 |
| CVE-2026-25506 |
MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, local attacker can exploit a buffer overflow vulnerability in munged (the MUNGE authentication daemon) to leak cryptographic key material from process memory. With the leaked key material, the attacker could forge arbitrary MUNGE credentials to impersonate any user (including root) to services that rely on MUNGE for authentication. The vulnerability allows a buffer overflow by sending a crafted message with an oversized address length field, corrupting munged's internal state and enabling extraction of the MAC subkey used for credential verification. This vulnerability is fixed in 0.5.18.
|
2026-02-10 |
| CVE-2025-52534 |
Improper bound check within AMD CPU microcode can allow a malicious guest to write to host memory, potentially resulting in loss of integrity.
|
2026-02-10 |
| CVE-2026-26007 |
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Prior to 46.0.5, the public_key_from_numbers (or EllipticCurvePublicNumbers.public_key()), EllipticCurvePublicNumbers.public_key(), load_der_public_key() and load_pem_public_key() functions do not verify that the point belongs to the expected prime-order subgroup of the curve. This missing validation allows an attacker to provide a public key point P from a small-order subgroup. This can lead to security issues in various situations, such as the most commonly used signature verification (ECDSA) and shared key negotiation (ECDH). When the victim computes the shared secret as S = [victim_private_key]P via ECDH, this leaks information about victim_private_key mod (small_subgroup_order). For curves with cofactor > 1, this reveals the least significant bits of the private key. When these weak public keys are used in ECDSA , it's easy to forge signatures on the small subgroup. Only SECT curves are impacted by this. This vulnerability is fixed in 46.0.5.
|
2026-02-10 |
| CVE-2025-54514 |
Improper isolation of shared resources on a system on a chip by a malicious local attacker with high privileges could potentially lead to a partial loss of integrity.
|
2026-02-10 |
| CVE-2026-1584 |
A flaw was found in gnutls. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake. This can lead to a NULL pointer dereference, causing the server to crash and resulting in a remote Denial of Service (DoS) condition.
|
2026-02-10 |
| CVE-2026-25646 |
libpng: An out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user's display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer.
The images that trigger this vulnerability are valid per the PNG specification.
|
2026-02-10 |
| CVE-2025-35998 |
Missing protection mechanism for alternate hardware interface in the Intel(R) Quick Assist Technology for some Intel(R) Platforms within Ring 0: Kernel may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
|
2026-02-10 |
| CVE-2026-2239 |
GIMP: PSD loader: heap-buffer-overflow in fread_pascal_string() (no null terminator)
|
2026-02-10 |
| CVE-2025-31648 |
Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts.
|
2026-02-10 |
| CVE-2025-32735 |
Improper conditions check in some firmware for some Intel(R) NPU Drivers within Ring 1: Device Drivers may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
|
2026-02-10 |
| CVE-2026-25934 |
go-git is a highly extensible git implementation library written in pure Go. Prior to 5.16.5, a vulnerability was discovered in go-git whereby data integrity values for .pack and .idx files were not properly verified. This resulted in go-git potentially consuming corrupted files, which would likely result in unexpected errors such as object not found. For context, clients fetch packfiles from upstream Git servers. Those files contain a checksum of their contents, so that clients can perform integrity checks before consuming it. The pack indexes (.idx) are generated locally by go-git, or the git cli, when new .pack files are received and processed. The integrity checks for both files were not being verified correctly. This vulnerability is fixed in 5.16.5.
|
2026-02-09 |
| CVE-2026-23948 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, a NULL pointer dereference vulnerability in rdp_write_logon_info_v2() allows a malicious RDP server to crash FreeRDP proxy by sending a specially crafted LogonInfoV2 PDU with cbDomain=0 or cbUserName=0. This vulnerability is fixed in 3.22.0.
|
2026-02-09 |
| CVE-2025-14831 |
A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).
|
2026-02-09 |
| CVE-2026-25749 |
Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.
|
2026-02-06 |
| CVE-2026-2100 |
This MODERATE impact flaw in p11-kit allows a remote attacker to cause an application level denial of service or unpredictable system states. Exploitation occurs when the C_DeriveKey function is called on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL.
|
2026-02-06 |
| CVE-2026-25727 |
time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.
|
2026-02-06 |
| CVE-2025-61732 |
A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.
|
2026-02-05 |
| CVE-2025-58190 |
The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.
|
2026-02-05 |
| CVE-2020-37127 |
Dnsmasq-utils 2.79-1 contains a buffer overflow vulnerability in the dhcp_release utility that allows attackers to cause a denial of service by supplying excessive input. Attackers can trigger a core dump and terminate the dhcp_release process by sending a crafted input string longer than 16 characters.
|
2026-02-05 |
| CVE-2025-47911 |
The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.
|
2026-02-05 |
| CVE-2026-23108 |
In the Linux kernel, the following vulnerability has been resolved:
can: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak
|
2026-02-04 |
| CVE-2025-71196 |
In the Linux kernel, the following vulnerability has been resolved:
phy: stm32-usphyc: Fix off by one in probe()
|
2026-02-04 |
| CVE-2026-23077 |
In the Linux kernel, the following vulnerability has been resolved:
mm/vma: fix anon_vma UAF on mremap() faulted, unfaulted merge
|
2026-02-04 |
| CVE-2026-23094 |
In the Linux kernel, the following vulnerability has been resolved:
uacce: fix isolate sysfs check condition
|
2026-02-04 |
| CVE-2026-23057 |
In the Linux kernel, the following vulnerability has been resolved:
vsock/virtio: Coalesce only linear skb
|
2026-02-04 |
| CVE-2026-23051 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: fix drm panic null pointer when driver not support atomic
|
2026-02-04 |
| CVE-2026-23045 |
In the Linux kernel, the following vulnerability has been resolved:
net/ena: fix missing lock when update devlink params
|
2026-02-04 |
| CVE-2025-71194 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix deadlock in wait_current_trans() due to ignored transaction type
|
2026-02-04 |
| CVE-2026-23110 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: core: Wake up the error handler when final completions race against each other
|
2026-02-04 |
| CVE-2026-23046 |
In the Linux kernel, the following vulnerability has been resolved:
virtio_net: fix device mismatch in devm_kzalloc/devm_kfree
|
2026-02-04 |
| CVE-2025-71192 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: ac97: fix a double free in snd_ac97_controller_register()
|
2026-02-04 |
| CVE-2026-23109 |
In the Linux kernel, the following vulnerability has been resolved:
fs/writeback: skip AS_NO_DATA_INTEGRITY mappings in wait_sb_inodes()
|
2026-02-04 |
| CVE-2026-23097 |
In the Linux kernel, the following vulnerability has been resolved:
migrate: correct lock ordering for hugetlb file folios
|
2026-02-04 |
| CVE-2026-23066 |
In the Linux kernel, the following vulnerability has been resolved:
rxrpc: Fix recvmsg() unconditional requeue
|
2026-02-04 |
| CVE-2026-23095 |
In the Linux kernel, the following vulnerability has been resolved:
gue: Fix skb memleak with inner IP protocol 0.
|
2026-02-04 |
| CVE-2026-23089 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free()
|
2026-02-04 |
| CVE-2026-23100 |
In the Linux kernel, the following vulnerability has been resolved:
mm/hugetlb: fix hugetlb_pmd_shared()
|
2026-02-04 |
| CVE-2026-23074 |
In the Linux kernel, the following vulnerability has been resolved:
net/sched: Enforce that teql can only be used as root qdisc
|
2026-02-04 |
| CVE-2026-23054 |
In the Linux kernel, the following vulnerability has been resolved:
net: hv_netvsc: reject RSS hash key programming without RX indirection table
|
2026-02-04 |
| CVE-2026-23055 |
In the Linux kernel, the following vulnerability has been resolved:
i2c: riic: Move suspend handling to NOIRQ phase
|
2026-02-04 |
| CVE-2026-23069 |
In the Linux kernel, the following vulnerability has been resolved:
vsock/virtio: fix potential underflow in virtio_transport_get_credit()
|
2026-02-04 |
| CVE-2025-71193 |
In the Linux kernel, the following vulnerability has been resolved:
phy: qcom-qusb2: Fix NULL pointer dereference on early suspend
|
2026-02-04 |
| CVE-2026-23098 |
In the Linux kernel, the following vulnerability has been resolved:
netrom: fix double-free in nr_route_frame()
|
2026-02-04 |
| CVE-2026-23041 |
In the Linux kernel, the following vulnerability has been resolved:
bnxt_en: Fix NULL pointer crash in bnxt_ptp_enable during error cleanup
|
2026-02-04 |
| CVE-2026-23053 |
In the Linux kernel, the following vulnerability has been resolved:
NFS: Fix a deadlock involving nfs_release_folio()
|
2026-02-04 |
| CVE-2026-23049 |
In the Linux kernel, the following vulnerability has been resolved:
drm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel
|
2026-02-04 |
| CVE-2026-23059 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Sanitize payload size to prevent member overflow
|
2026-02-04 |
| CVE-2026-23087 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: xen: scsiback: Fix potential memory leak in scsiback_remove()
|
2026-02-04 |
| CVE-2026-23090 |
In the Linux kernel, the following vulnerability has been resolved:
slimbus: core: fix device reference leak on report present
|
2026-02-04 |
| CVE-2026-23102 |
In the Linux kernel, the following vulnerability has been resolved:
arm64/fpsimd: signal: Fix restoration of SVE context
|
2026-02-04 |
| CVE-2026-1764 |
A flaw was found in GNOME localsearch MP3 Extractor. When processing specially crafted MP3 files containing ID3v2.4 tags, a missing bounds check in the `extract_performers_tags` function can lead to a heap buffer overflow. This vulnerability allows a remote attacker to cause a Denial of Service (DoS) by triggering a read of unmapped memory. In some cases, it could also lead to information disclosure by reading visible heap data.
|
2026-02-04 |
| CVE-2026-1642 |
A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
2026-02-04 |
| CVE-2026-23082 |
In the Linux kernel, the following vulnerability has been resolved:
can: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on usb_submit_urb() error
|
2026-02-04 |
| CVE-2026-23079 |
In the Linux kernel, the following vulnerability has been resolved:
gpio: cdev: Fix resource leaks on errors in lineinfo_changed_notify()
|
2026-02-04 |
| CVE-2026-23105 |
In the Linux kernel, the following vulnerability has been resolved:
net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag
|
2026-02-04 |
| CVE-2026-23067 |
In the Linux kernel, the following vulnerability has been resolved:
iommu/io-pgtable-arm: fix size_t signedness bug in unmap path
|
2026-02-04 |
| CVE-2026-23060 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec
|
2026-02-04 |
| CVE-2026-23103 |
In the Linux kernel, the following vulnerability has been resolved:
ipvlan: Make the addrs_lock be per port
|
2026-02-04 |
| CVE-2026-1766 |
A flaw was found in GNOME localsearch MP3 Extractor, specifically within the tracker-extract-mp3 component. This heap buffer overflow vulnerability occurs when processing specially crafted MP3 files containing malformed ID3v2.3 COMM (Comment) tags. An attacker could exploit this by providing a malicious MP3 file, leading to a denial of service (DoS), which causes an application crash, and potentially disclosing sensitive information from the heap memory.
|
2026-02-04 |
| CVE-2026-23063 |
In the Linux kernel, the following vulnerability has been resolved:
uacce: ensure safe queue release with state management
|
2026-02-04 |
| CVE-2026-23065 |
In the Linux kernel, the following vulnerability has been resolved:
platform/x86/amd: Fix memory leak in wbrf_record()
|
2026-02-04 |
| CVE-2026-23085 |
In the Linux kernel, the following vulnerability has been resolved:
irqchip/gic-v3-its: Avoid truncating memory addresses
|
2026-02-04 |
| CVE-2026-1767 |
A flaw was found in the GNOME localsearch MP3 Extractor `tracker-extract-mp3` component. A remote attacker could exploit this heap buffer overflow vulnerability by providing a specially crafted MP3 file containing malformed ID3 tags. This incorrect length calculation during the parsing of performer tags can lead to a read beyond the allocated buffer, potentially causing a Denial of Service (DoS) due to a crash or enabling information disclosure.
|
2026-02-04 |
| CVE-2026-23073 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: rsi: Fix memory corruption due to not set vif driver data size
|
2026-02-04 |
| CVE-2026-23076 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: ctxfi: Fix potential OOB access in audio mixer handling
|
2026-02-04 |
| CVE-2025-71198 |
In the Linux kernel, the following vulnerability has been resolved:
iio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection
|
2026-02-04 |
| CVE-2025-71197 |
In the Linux kernel, the following vulnerability has been resolved:
w1: therm: Fix off-by-one buffer overflow in alarms_store
|
2026-02-04 |
| CVE-2026-23093 |
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: smbd: fix dma_unmap_sg() nents
|
2026-02-04 |
| CVE-2026-23068 |
In the Linux kernel, the following vulnerability has been resolved:
spi: spi-sprd-adi: Fix double free in probe error path
|
2026-02-04 |
| CVE-2026-23072 |
In the Linux kernel, the following vulnerability has been resolved:
l2tp: Fix memleak in l2tp_udp_encap_recv().
|
2026-02-04 |
| CVE-2026-23086 |
In the Linux kernel, the following vulnerability has been resolved:
vsock/virtio: cap TX credit to local buffer size
|
2026-02-04 |
| CVE-2026-23042 |
In the Linux kernel, the following vulnerability has been resolved:
idpf: fix aux device unplugging when rdma is not supported by vport
|
2026-02-04 |
| CVE-2026-23106 |
In the Linux kernel, the following vulnerability has been resolved:
timekeeping: Adjust the leap state for the correct auxiliary timekeeper
|
2026-02-04 |
| CVE-2026-23084 |
In the Linux kernel, the following vulnerability has been resolved:
be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list
|
2026-02-04 |
| CVE-2026-23070 |
In the Linux kernel, the following vulnerability has been resolved:
Octeontx2-af: Add proper checks for fwdata
|
2026-02-04 |
| CVE-2026-23071 |
In the Linux kernel, the following vulnerability has been resolved:
regmap: Fix race condition in hwspinlock irqsave routine
|
2026-02-04 |
| CVE-2026-23056 |
In the Linux kernel, the following vulnerability has been resolved:
uacce: implement mremap in uacce_vm_ops to return -EPERM
|
2026-02-04 |
| CVE-2026-23048 |
In the Linux kernel, the following vulnerability has been resolved:
udp: call skb_orphan() before skb_attempt_defer_free()
|
2026-02-04 |
| CVE-2026-23081 |
In the Linux kernel, the following vulnerability has been resolved:
net: phy: intel-xway: fix OF node refcount leakage
|
2026-02-04 |
| CVE-2026-23088 |
In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix crash on synthetic stacktrace field usage
|
2026-02-04 |
| CVE-2026-23083 |
In the Linux kernel, the following vulnerability has been resolved:
fou: Don't allow 0 for FOU_ATTR_IPPROTO.
|
2026-02-04 |
| CVE-2026-23062 |
In the Linux kernel, the following vulnerability has been resolved:
platform/x86: hp-bioscfg: Fix kernel panic in GET_INSTANCE_ID macro
|
2026-02-04 |
| CVE-2026-23050 |
In the Linux kernel, the following vulnerability has been resolved:
pNFS: Fix a deadlock when returning a delegation during open()
|
2026-02-04 |
| CVE-2026-23092 |
In the Linux kernel, the following vulnerability has been resolved:
iio: dac: ad3552r-hs: fix out-of-bound write in ad3552r_hs_write_data_source
|
2026-02-04 |
| CVE-2026-23044 |
In the Linux kernel, the following vulnerability has been resolved:
PM: hibernate: Fix crash when freeing invalid crypto compressor
|
2026-02-04 |
| CVE-2026-1765 |
A flaw was found in the `tracker-extract-mp3` component of GNOME localsearch. This vulnerability, a heap buffer overflow, occurs when processing specially crafted MP3 files. A remote attacker could exploit this by providing a malicious MP3 file, leading to a Denial of Service (DoS) where the application crashes. It may also potentially expose sensitive information from the system's memory.
|
2026-02-04 |
| CVE-2025-71199 |
In the Linux kernel, the following vulnerability has been resolved:
iio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc driver
|
2026-02-04 |
| CVE-2026-23099 |
In the Linux kernel, the following vulnerability has been resolved:
bonding: limit BOND_MODE_8023AD to Ethernet devices
|
2026-02-04 |
| CVE-2026-23078 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: scarlett2: Fix buffer overflow in config retrieval
|
2026-02-04 |
| CVE-2026-23047 |
In the Linux kernel, the following vulnerability has been resolved:
libceph: make calc_target() set t->paused, not just clear it
|
2026-02-04 |
| CVE-2026-23107 |
In the Linux kernel, the following vulnerability has been resolved:
arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA
|
2026-02-04 |
| CVE-2026-23058 |
In the Linux kernel, the following vulnerability has been resolved:
can: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak
|
2026-02-04 |
| CVE-2026-23043 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix NULL pointer dereference in do_abort_log_replay()
|
2026-02-04 |
| CVE-2026-23080 |
In the Linux kernel, the following vulnerability has been resolved:
can: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak
|
2026-02-04 |
| CVE-2026-25547 |
@isaacs/brace-expansion is a hybrid CJS/ESM TypeScript fork of brace-expansion. Prior to version 5.0.1, @isaacs/brace-expansion is vulnerable to a denial of service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process. This issue has been patched in version 5.0.1.
|
2026-02-04 |
| CVE-2026-23075 |
In the Linux kernel, the following vulnerability has been resolved:
can: esd_usb: esd_usb_read_bulk_callback(): fix URB memory leak
|
2026-02-04 |
| CVE-2026-23096 |
In the Linux kernel, the following vulnerability has been resolved:
uacce: fix cdev handling in the cleanup path
|
2026-02-04 |
| CVE-2026-23104 |
In the Linux kernel, the following vulnerability has been resolved:
ice: fix devlink reload call trace
|
2026-02-04 |
| CVE-2026-23064 |
In the Linux kernel, the following vulnerability has been resolved:
net/sched: act_ife: avoid possible NULL deref
|
2026-02-04 |
| CVE-2026-23040 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211_hwsim: fix typo in frequency notification
|
2026-02-04 |
| CVE-2026-23061 |
In the Linux kernel, the following vulnerability has been resolved:
can: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak
|
2026-02-04 |
| CVE-2026-23052 |
In the Linux kernel, the following vulnerability has been resolved:
ftrace: Do not over-allocate ftrace memory
|
2026-02-04 |
| CVE-2025-71195 |
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: xilinx: xdma: Fix regmap max_register
|
2026-02-04 |
| CVE-2026-23091 |
In the Linux kernel, the following vulnerability has been resolved:
intel_th: fix device leak on output open()
|
2026-02-04 |
| CVE-2026-23101 |
In the Linux kernel, the following vulnerability has been resolved:
leds: led-class: Only Add LED to leds_list when it is fully ready
|
2026-02-04 |
| CVE-2026-1801 |
A flaw was found in libsoup, an HTTP client/server library. This HTTP Request Smuggling vulnerability arises from non-RFC-compliant parsing in the soup_filter_input_stream_read_line() logic, where libsoup accepts malformed chunk headers, such as lone line feed (LF) characters instead of the required carriage return and line feed (CRLF). A remote attacker can exploit this without authentication or user interaction by sending specially crafted chunked requests. This allows libsoup to parse and process multiple HTTP requests from a single network message, potentially leading to information disclosure.
|
2026-02-03 |
| CVE-2026-1703 |
When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.
|
2026-02-02 |
| CVE-2026-1757 |
A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.
|
2026-02-02 |
| CVE-2026-1761 |
A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.
|
2026-02-02 |
| CVE-2026-1760 |
A flaw was found in SoupServer. This HTTP request smuggling vulnerability occurs because SoupServer improperly handles requests that combine Transfer-Encoding: chunked and Connection: keep-alive headers. A remote, unauthenticated client can exploit this by sending specially crafted requests, causing SoupServer to fail to close the connection as required by RFC 9112. This allows the attacker to smuggle additional requests over the persistent connection, leading to unintended request processing and potential denial-of-service (DoS) conditions.
|
2026-02-02 |
| CVE-2025-71182 |
In the Linux kernel, the following vulnerability has been resolved:
can: j1939: make j1939_session_activate() fail if device is no longer registered
|
2026-01-31 |
| CVE-2026-23019 |
In the Linux kernel, the following vulnerability has been resolved:
net: marvell: prestera: fix NULL dereference on devlink_alloc() failure
|
2026-01-31 |
| CVE-2026-23032 |
In the Linux kernel, the following vulnerability has been resolved:
null_blk: fix kmemleak by releasing references to fault configfs items
|
2026-01-31 |
| CVE-2025-71186 |
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: stm32: dmamux: fix device leak on route allocation
|
2026-01-31 |
| CVE-2026-23022 |
In the Linux kernel, the following vulnerability has been resolved:
idpf: fix memory leak in idpf_vc_core_deinit()
|
2026-01-31 |
| CVE-2025-71190 |
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: bcm-sba-raid: fix device leak on probe
|
2026-01-31 |
| CVE-2026-23034 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu/userq: Fix fence reference leak on queue teardown v2
|
2026-01-31 |
| CVE-2026-23025 |
In the Linux kernel, the following vulnerability has been resolved:
mm/page_alloc: prevent pcp corruption with SMP=n
|
2026-01-31 |
| CVE-2026-23029 |
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: KVM: Fix kvm_device leak in kvm_eiointc_destroy()
|
2026-01-31 |
| CVE-2026-23028 |
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: KVM: Fix kvm_device leak in kvm_ipi_destroy()
|
2026-01-31 |
| CVE-2026-23038 |
In the Linux kernel, the following vulnerability has been resolved:
pnfs/flexfiles: Fix memory leak in nfs4_ff_alloc_deviceid_node()
|
2026-01-31 |
| CVE-2026-23036 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: release path before iget_failed() in btrfs_read_locked_inode()
|
2026-01-31 |
| CVE-2025-71183 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: always detect conflicting inodes when logging inode refs
|
2026-01-31 |
| CVE-2026-23035 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv
|
2026-01-31 |
| CVE-2026-23015 |
In the Linux kernel, the following vulnerability has been resolved:
gpio: mpsse: fix reference leak in gpio_mpsse_probe() error paths
|
2026-01-31 |
| CVE-2026-23021 |
In the Linux kernel, the following vulnerability has been resolved:
net: usb: pegasus: fix memory leak in update_eth_regs_async()
|
2026-01-31 |
| CVE-2026-23031 |
In the Linux kernel, the following vulnerability has been resolved:
can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak
|
2026-01-31 |
| CVE-2025-71188 |
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: lpc18xx-dmamux: fix device leak on route allocation
|
2026-01-31 |
| CVE-2026-23018 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: release path before initializing extent tree in btrfs_read_locked_inode()
|
2026-01-31 |
| CVE-2026-23039 |
In the Linux kernel, the following vulnerability has been resolved:
drm/gud: fix NULL fb and crtc dereferences on USB disconnect
|
2026-01-31 |
| CVE-2025-71185 |
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: ti: dma-crossbar: fix device leak on am335x route allocation
|
2026-01-31 |
| CVE-2025-71189 |
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: dw: dmamux: fix OF node leak on route allocation failure
|
2026-01-31 |
| CVE-2026-23026 |
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config()
|
2026-01-31 |
| CVE-2025-71180 |
In the Linux kernel, the following vulnerability has been resolved:
counter: interrupt-cnt: Drop IRQF_NO_THREAD flag
|
2026-01-31 |
| CVE-2026-23027 |
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: KVM: Fix kvm_device leak in kvm_pch_pic_destroy()
|
2026-01-31 |
| CVE-2026-23037 |
In the Linux kernel, the following vulnerability has been resolved:
can: etas_es58x: allow partial RX URB allocation to succeed
|
2026-01-31 |
| CVE-2025-71191 |
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: at_hdmac: fix device leak on of_dma_xlate()
|
2026-01-31 |
| CVE-2026-23033 |
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: omap-dma: fix dma_pool resource leak in error paths
|
2026-01-31 |
| CVE-2026-23023 |
In the Linux kernel, the following vulnerability has been resolved:
idpf: fix memory leak in idpf_vport_rel()
|
2026-01-31 |
| CVE-2026-23030 |
In the Linux kernel, the following vulnerability has been resolved:
phy: rockchip: inno-usb2: Fix a double free bug in rockchip_usb2phy_probe()
|
2026-01-31 |
| CVE-2025-71187 |
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: sh: rz-dmac: fix device leak on probe failure
|
2026-01-31 |
| CVE-2026-23020 |
In the Linux kernel, the following vulnerability has been resolved:
net: 3com: 3c59x: fix possible null dereference in vortex_probe1()
|
2026-01-31 |
| CVE-2026-23017 |
In the Linux kernel, the following vulnerability has been resolved:
idpf: fix error handling in the init_task on load
|
2026-01-31 |
| CVE-2025-71184 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix NULL dereference on root when tracing inode eviction
|
2026-01-31 |
| CVE-2026-23024 |
In the Linux kernel, the following vulnerability has been resolved:
idpf: fix memory leak of flow steer list on rmmod
|
2026-01-31 |
| CVE-2025-71181 |
In the Linux kernel, the following vulnerability has been resolved:
rust_binder: remove spin_lock() in rust_shrink_free_page()
|
2026-01-31 |
| CVE-2026-23016 |
In the Linux kernel, the following vulnerability has been resolved:
inet: frags: drop fraglist conntrack references
|
2026-01-31 |
| CVE-2026-24682 |
Client side issue with FreeRDP
|
2026-01-30 |
| CVE-2026-24680 |
Client side issue with FreeRDP
|
2026-01-30 |
| CVE-2026-24678 |
Client side issue with FreeRDP
|
2026-01-30 |
| CVE-2026-24491 |
Client side issue with FreeRDP
|
2026-01-30 |
| CVE-2026-24681 |
Client side issue with FreeRDP
|
2026-01-30 |
| CVE-2026-25210 |
In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation.
|
2026-01-30 |
| CVE-2026-24684 |
Client side issue with FreeRDP
|
2026-01-30 |
| CVE-2026-24676 |
Client side issue with FreeRDP
|
2026-01-30 |
| CVE-2026-24679 |
Client side issue with FreeRDP
|
2026-01-30 |
| CVE-2026-24677 |
Client side issue with FreeRDP
|
2026-01-30 |
| CVE-2026-24675 |
Client side issue with FreeRDP
|
2026-01-30 |
| CVE-2026-24683 |
Client side issue with FreeRDP
|
2026-01-30 |
| CVE-2026-25068 |
alsa-lib versions 1.2.2 up to and including 1.2.15.2, prior to commit 5f7fe33, contain a heap-based buffer overflow in the topology mixer control decoder. The tplg_decode_control_mixer1() function reads the num_channels field from untrusted .tplg data and uses it as a loop bound without validating it against the fixed-size channel array (SND_TPLG_MAX_CHAN). A crafted topology file with an excessive num_channels value can cause out-of-bounds heap writes, leading to a crash.
|
2026-01-29 |
| CVE-2020-37011 |
Gnome Fonts Viewer 3.34.0 contains a heap corruption vulnerability that allows attackers to trigger an out-of-bounds write by crafting a malicious TTF font file. Attackers can generate a specially crafted TTF file with an oversized pattern to cause an infinite malloc() loop and potentially crash the gnome-font-viewer process.
|
2026-01-29 |
| CVE-2025-33219 |
NVIDIA Display Driver for Linux contains a vulnerability in the NVIDIA kernel module where an attacker could cause an integer overflow or wraparound. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.
|
2026-01-28 |
| CVE-2026-1536 |
A flaw was found in libsoup. An attacker who can control the input for the Content-Disposition header can inject CRLF (Carriage Return Line Feed) sequences into the header value. These sequences are then interpreted verbatim when the HTTP request or response is constructed, allowing arbitrary HTTP headers to be injected. This vulnerability can lead to HTTP header injection or HTTP response splitting without requiring authentication or user interaction.
|
2026-01-28 |
| CVE-2026-23014 |
In the Linux kernel, the following vulnerability has been resolved:
perf: Ensure swevent hrtimer is properly destroyed
|
2026-01-28 |
| CVE-2025-33220 |
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause heap memory access after the memory is freed. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.
|
2026-01-28 |
| CVE-2026-1539 |
A flaw was found in the libsoup HTTP library that can cause proxy authentication credentials to be sent to unintended destinations. When handling HTTP redirects, libsoup removes the Authorization header but does not remove the Proxy-Authorization header if the request is redirected to a different host. As a result, sensitive proxy credentials may be leaked to third-party servers. Applications using libsoup for HTTP communication may unintentionally expose proxy authentication data.
|
2026-01-28 |
| CVE-2026-24842 |
node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue.
|
2026-01-28 |
| CVE-2025-33217 |
NVIDIA Display Driver for Windows contains a vulnerability where an attacker could trigger a use after free. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure.
|
2026-01-28 |
| CVE-2025-33218 |
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where an attacker could cause an integer overflow. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.
|
2026-01-28 |
| CVE-2026-0818 |
CSS-based exfiltration of the content from partially encrypted emails when allowing remote content. This vulnerability affects Thunderbird < 147.0.1 and Thunderbird < 140.7.1.
|
2026-01-28 |
| CVE-2025-69421 |
Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function.
|
2026-01-27 |
| CVE-2025-15468 |
If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs.
|
2026-01-27 |
| CVE-2026-24881 |
In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of service; however, there is also memory corruption that could lead to remote code execution.
|
2026-01-27 |
| CVE-2026-1484 |
A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.
|
2026-01-27 |
| CVE-2025-28164 |
Buffer Overflow vulnerability in libpng 1.6.43-1.6.46 allows a local attacker to cause a denial of service via png_create_read_struct() function.
|
2026-01-27 |
| CVE-2026-24686 |
go-tuf is a Go implementation of The Update Framework (TUF). go-tuf's TAP 4 Multirepo Client uses the map file repository name string (`repoName`) as a filesystem path component when selecting the local metadata cache directory. Starting in version 2.0.0 and prior to version 2.4.1, if an application accepts a map file from an untrusted source, an attacker can supply a `repoName` containing traversal (e.g., `../escaped-repo`) and cause go-tuf to create directories and write the root metadata file outside the intended `LocalMetadataDir` cache base, within the running process's filesystem permissions. Version 2.4.1 contains a patch.
|
2026-01-27 |
| CVE-2026-24869 |
Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability affects Firefox < 147.0.2.
|
2026-01-27 |
| CVE-2026-24868 |
Mitigation bypass in the Privacy: Anti-Tracking component. This vulnerability affects Firefox < 147.0.2.
|
2026-01-27 |
| CVE-2026-1467 |
A flaw was found in libsoup, an HTTP client library. This vulnerability, known as CRLF (Carriage Return Line Feed) Injection, occurs when an HTTP proxy is configured and the library improperly handles URL-decoded input used to create the Host header. A remote attacker can exploit this by providing a specially crafted URL containing CRLF sequences, allowing them to inject additional HTTP headers or complete HTTP request bodies. This can lead to unintended or unauthorized HTTP requests being forwarded by the proxy, potentially impacting downstream services.
|
2026-01-27 |
| CVE-2025-15469 |
The "openssl dgst" command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error.
|
2026-01-27 |
| CVE-2025-66199 |
A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit.
|
2026-01-27 |
| CVE-2025-28162 |
Buffer Overflow vulnerability in libpng 1.6.43-1.6.46 allows a local attacker to cause a denial of service via the pngimage with AddressSanitizer (ASan), the program leaks memory in various locations, eventually leading to high memory usage and causing the program to become unresponsive
|
2026-01-27 |
| CVE-2026-22796 |
ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function
NOTE: https://openssl-library.org/news/secadv/20260127.txt
|
2026-01-27 |
| CVE-2025-69418 |
When using the low-level OCB API directly with AES-NI or other hardware-accelerated code paths, inputs whose length is not a multiple of 16 bytes can leave the final partial block unencrypted and unauthenticated.
|
2026-01-27 |
| CVE-2025-11187 |
PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification.
|
2026-01-27 |
| CVE-2026-24883 |
In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).
|
2026-01-27 |
| CVE-2025-15467 |
A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.
|
2026-01-27 |
| CVE-2026-22795 |
An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file.
|
2026-01-27 |
| CVE-2025-69419 |
Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer.
|
2026-01-27 |
| CVE-2025-69420 |
A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file.
|
2026-01-27 |
| CVE-2026-24825 |
Missing Release of Memory after Effective Lifetime vulnerability in ydb-platform ydb (contrib/libs/yajl modules). This vulnerability is associated with program files yail_tree.C.
This issue affects ydb: through 24.4.4.2.
|
2026-01-27 |
| CVE-2025-68160 |
Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write.
|
2026-01-27 |
| CVE-2026-1489 |
A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.
|
2026-01-27 |
| CVE-2026-24882 |
In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.
|
2026-01-27 |
| CVE-2026-1485 |
A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.
|
2026-01-27 |
| CVE-2026-24400 |
AssertJ provides Fluent testing assertions for Java and the Java Virtual Machine (JVM). Starting in version 1.4.0 and prior to version 3.27.7, an XML External Entity (XXE) vulnerability exists in `org.assertj.core.util.xml.XmlStringPrettyFormatter`: the `toXmlDocument(String)` method initializes `DocumentBuilderFactory` with default settings, without disabling DTDs or external entities. This formatter is used by the `isXmlEqualTo(CharSequence)` assertion for `CharSequence` values. An application is vulnerable only when it uses untrusted XML input with either `isXmlEqualTo(CharSequence)` from `org.assertj.core.api.AbstractCharSequenceAssert` or `xmlPrettyFormat(String)` from `org.assertj.core.util.xml.XmlStringPrettyFormatter`. If untrusted XML input is processed by tone of these methods, an attacker couldnread arbitrary local files via `file://` URIs (e.g., `/etc/passwd`, application configuration files); perform Server-Side Request Forgery (SSRF) via HTTP/HTTPS URIs, and/or cause Denial of Service via "Billion Laughs" entity expansion attacks. `isXmlEqualTo(CharSequence)` has been deprecated in favor of XMLUnit in version 3.18.0 and will be removed in version 4.0. Users of affected versions should, in order of preference: replace `isXmlEqualTo(CharSequence)` with XMLUnit, upgrade to version 3.27.7, or avoid using `isXmlEqualTo(CharSequence)` or `XmlStringPrettyFormatter` with untrusted input. `XmlStringPrettyFormatter` has historically been considered a utility for `isXmlEqualTo(CharSequence)` rather than a feature for AssertJ users, so it is deprecated in version 3.27.7 and removed in version 4.0, with no replacement.
|
2026-01-26 |
| CVE-2026-23008 |
In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx: Fix KMS with 3D on HW version 10
|
2026-01-25 |
| CVE-2026-23001 |
In the Linux kernel, the following vulnerability has been resolved:
macvlan: fix possible UAF in macvlan_forward_source()
|
2026-01-25 |
| CVE-2026-23004 |
In the Linux kernel, the following vulnerability has been resolved:
dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list()
|
2026-01-25 |
| CVE-2026-23013 |
In the Linux kernel, the following vulnerability has been resolved:
net: octeon_ep_vf: fix free_irq dev_id mismatch in IRQ rollback
|
2026-01-25 |
| CVE-2026-23009 |
In the Linux kernel, the following vulnerability has been resolved:
xhci: sideband: don't dereference freed ring when removing sideband endpoint
|
2026-01-25 |
| CVE-2026-23006 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: tlv320adcx140: fix null pointer
|
2026-01-25 |
| CVE-2026-22997 |
In the Linux kernel, the following vulnerability has been resolved:
net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon receiving the second rts
|
2026-01-25 |
| CVE-2026-23011 |
In the Linux kernel, the following vulnerability has been resolved:
ipv4: ip_gre: make ipgre_header() robust
|
2026-01-25 |
| CVE-2026-23010 |
In the Linux kernel, the following vulnerability has been resolved:
ipv6: Fix use-after-free in inet6_addr_del().
|
2026-01-25 |
| CVE-2026-22998 |
In the Linux kernel, the following vulnerability has been resolved:
nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec
|
2026-01-25 |
| CVE-2026-23002 |
In the Linux kernel, the following vulnerability has been resolved:
lib/buildid: use __kernel_read() for sleepable context
|
2026-01-25 |
| CVE-2025-71162 |
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: tegra-adma: Fix use-after-free
|
2026-01-25 |
| CVE-2026-22996 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv
|
2026-01-25 |
| CVE-2026-23003 |
In the Linux kernel, the following vulnerability has been resolved:
ip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv()
|
2026-01-25 |
| CVE-2026-23000 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Fix crash on profile change rollback failure
|
2026-01-25 |
| CVE-2026-23007 |
In the Linux kernel, the following vulnerability has been resolved:
block: zero non-PI portion of auto integrity buffer
|
2026-01-25 |
| CVE-2025-71163 |
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: idxd: fix device leaks on compat bind and unbind
|
2026-01-25 |
| CVE-2026-23005 |
In the Linux kernel, the following vulnerability has been resolved:
x86/fpu: Clear XSTATE_BV[i] in guest XSAVE state whenever XFD[i]=1
|
2026-01-25 |
| CVE-2026-22999 |
In the Linux kernel, the following vulnerability has been resolved:
net/sched: sch_qfq: do not free existing class in qfq_change_class()
|
2026-01-25 |
| CVE-2026-23012 |
In the Linux kernel, the following vulnerability has been resolved:
mm/damon/core: remove call_control in inactive contexts
|
2026-01-25 |
| CVE-2026-24401 |
Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In versions 0.9rc2 and below, avahi-daemon can be crashed via a segmentation fault by sending an unsolicited mDNS response containing a recursive CNAME record, where the alias and canonical name point to the same domain (e.g., "h.local" as a CNAME for "h.local"). This causes unbounded recursion in the lookup_handle_cname function, leading to stack exhaustion. The vulnerability affects record browsers where AVAHI_LOOKUP_USE_MULTICAST is set explicitly, which includes record browsers created by resolvers used by nss-mdns. This issue is patched in commit 78eab31128479f06e30beb8c1cbf99dd921e2524.
|
2026-01-24 |
| CVE-2026-22991 |
In the Linux kernel, the following vulnerability has been resolved:
libceph: make free_choose_arg_map() resilient to partial allocation
|
2026-01-23 |
| CVE-2025-71146 |
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_conncount: fix leaked ct in error paths
|
2026-01-23 |
| CVE-2026-22990 |
In the Linux kernel, the following vulnerability has been resolved:
libceph: replace overzealous BUG_ON in osdmap_apply_incremental()
|
2026-01-23 |
| CVE-2026-24137 |
sigstore framework is a common go library shared across sigstore services and clients. In versions 1.10.3 and below, the legacy TUF client (pkg/tuf/client.go) supports caching target files to disk. It constructs a filesystem path by joining a cache base directory with a target name sourced from signed target metadata; however, it does not validate that the resulting path stays within the cache base directory. A malicious TUF repository can trigger arbitrary file overwriting, limited to the permissions that the calling process has. Note that this should only affect clients that are directly using the TUF client in sigstore/sigstore or are using an older version of Cosign. Public Sigstore deployment users are unaffected, as TUF metadata is validated by a quorum of trusted collaborators. This issue has been fixed in version 1.10.4. As a workaround, users can disable disk caching for the legacy client by setting SIGSTORE_NO_CACHE=true in the environment, migrate to https://github.com/sigstore/sigstore-go/tree/main/pkg/tuf, or upgrade to the latest sigstore/sigstore release.
|
2026-01-23 |
| CVE-2026-22987 |
In the Linux kernel, the following vulnerability has been resolved:
net/sched: act_api: avoid dereferencing ERR_PTR in tcf_idrinfo_destroy
|
2026-01-23 |
| CVE-2025-71157 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/core: always drop device refcount in ib_del_sub_device_and_put()
|
2026-01-23 |
| CVE-2026-22989 |
In the Linux kernel, the following vulnerability has been resolved:
nfsd: check that server is running in unlock_filesystem
|
2026-01-23 |
| CVE-2026-22988 |
In the Linux kernel, the following vulnerability has been resolved:
arp: do not assume dev_hard_header() does not change skb->head
|
2026-01-23 |
| CVE-2025-71147 |
In the Linux kernel, the following vulnerability has been resolved:
KEYS: trusted: Fix a memory leak in tpm2_load_cmd
|
2026-01-23 |
| CVE-2025-71152 |
In the Linux kernel, the following vulnerability has been resolved:
net: dsa: properly keep track of conduit reference
|
2026-01-23 |
| CVE-2026-22993 |
In the Linux kernel, the following vulnerability has been resolved:
idpf: Fix RSS LUT NULL ptr issue after soft reset
|
2026-01-23 |
| CVE-2025-71155 |
In the Linux kernel, the following vulnerability has been resolved:
KVM: s390: Fix gmap_helper_zap_one_page() again
|
2026-01-23 |
| CVE-2026-22992 |
In the Linux kernel, the following vulnerability has been resolved:
libceph: return the handler error from mon_handle_auth_done()
|
2026-01-23 |
| CVE-2025-71156 |
In the Linux kernel, the following vulnerability has been resolved:
gve: defer interrupt enabling until NAPI registration
|
2026-01-23 |
| CVE-2026-22984 |
In the Linux kernel, the following vulnerability has been resolved:
libceph: prevent potential out-of-bounds reads in handle_auth_done()
|
2026-01-23 |
| CVE-2026-22985 |
In the Linux kernel, the following vulnerability has been resolved:
idpf: Fix RSS LUT NULL pointer crash on early ethtool operations
|
2026-01-23 |
| CVE-2025-71159 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix use-after-free warning in btrfs_get_or_create_delayed_node()
|
2026-01-23 |
| CVE-2026-22978 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: avoid kernel-infoleak from struct iw_point
|
2026-01-23 |
| CVE-2025-71153 |
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: Fix memory leak in get_file_all_info()
|
2026-01-23 |
| CVE-2026-24515 |
In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.
|
2026-01-23 |
| CVE-2026-0775 |
npm cli Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of npm cli. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the handling of modules. The application loads modules from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of a target user. Was ZDI-CAN-25430.
The npm project does not consider CVE-2026-0775 a security issue and confirmed the reported behavior is by design (ZDI-26-043). Amazon Linux agrees. No fix is planned for Amazon Linux at this time.
|
2026-01-23 |
| CVE-2026-22979 |
In the Linux kernel, the following vulnerability has been resolved:
net: fix memory leak in skb_segment_list for GRO packets
|
2026-01-23 |
| CVE-2026-22983 |
In the Linux kernel, the following vulnerability has been resolved:
net: do not write to msg_get_inq in callee
|
2026-01-23 |
| CVE-2025-71160 |
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: avoid chain re-validation if possible
|
2026-01-23 |
| CVE-2025-15059 |
GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PSP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28232.
|
2026-01-23 |
| CVE-2026-0994 |
A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages.
Due to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python’s recursion stack and causing a RecursionError.
|
2026-01-23 |
| CVE-2025-71145 |
In the Linux kernel, the following vulnerability has been resolved:
usb: phy: isp1301: fix non-OF device reference imbalance
|
2026-01-23 |
| CVE-2025-71150 |
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: Fix refcount leak when invalid session is found on session lookup
|
2026-01-23 |
| CVE-2026-22980 |
In the Linux kernel, the following vulnerability has been resolved:
nfsd: provide locking for v4_end_grace
|
2026-01-23 |
| CVE-2025-71161 |
In the Linux kernel, the following vulnerability has been resolved:
dm-verity: disable recursive forward error correction
|
2026-01-23 |
| CVE-2025-71148 |
In the Linux kernel, the following vulnerability has been resolved:
net/handshake: restore destructor on submit failure
|
2026-01-23 |
| CVE-2026-22982 |
In the Linux kernel, the following vulnerability has been resolved:
net: mscc: ocelot: Fix crash when adding interface under a lag
|
2026-01-23 |
| CVE-2026-22986 |
In the Linux kernel, the following vulnerability has been resolved:
gpiolib: fix race condition for gdev->srcu
|
2026-01-23 |
| CVE-2026-22981 |
In the Linux kernel, the following vulnerability has been resolved:
idpf: detach and close netdevs while handling a reset
|
2026-01-23 |
| CVE-2026-22994 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix reference count leak in bpf_prog_test_run_xdp()
|
2026-01-23 |
| CVE-2026-22995 |
In the Linux kernel, the following vulnerability has been resolved:
ublk: fix use-after-free in ublk_partition_scan_work
|
2026-01-23 |
| CVE-2026-1299 |
The email module, specifically the "BytesGenerator" class, didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. This is only applicable if using "LiteralHeader" writing headers that don't respect email folding rules, the new behavior will reject the incorrectly folded headers in "BytesGenerator".
|
2026-01-23 |
| CVE-2025-71149 |
In the Linux kernel, the following vulnerability has been resolved:
io_uring/poll: correctly handle io_poll_add() return value on update
|
2026-01-23 |
| CVE-2025-71154 |
In the Linux kernel, the following vulnerability has been resolved:
net: usb: rtl8150: fix memory leak on usb_submit_urb() failure
|
2026-01-23 |
| CVE-2025-71158 |
In the Linux kernel, the following vulnerability has been resolved:
gpio: mpsse: ensure worker is torn down
|
2026-01-23 |
| CVE-2025-71151 |
In the Linux kernel, the following vulnerability has been resolved:
cifs: Fix memory and information leak in smb3_reconfigure()
|
2026-01-23 |
| CVE-2025-71176 |
pytest through 9.0.2 on UNIX relies on directories with the /tmp/pytest-of-{user} name pattern, which allows local users to cause a denial of service or possibly gain privileges.
|
2026-01-22 |
| CVE-2026-24049 |
wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.46.1 and below, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.
|
2026-01-22 |
| CVE-2026-23893 |
openCryptoki is a PKCS#11 library and provides tooling for Linux and AIX. Versions 2.3.2 and above are vulnerable to symlink-following when running in privileged contexts. A token-group user can redirect file operations to arbitrary filesystem targets by planting symlinks in group-writable token directories, resulting in privilege escalation or data exposure. Token and lock directories are 0770 (group-writable for token users), so any token-group member can plant files and symlinks inside them. When run as root, the base code handling token directory file access, as well as several openCryptoki tools used for administrative purposes, may reset ownership or permissions on existing files inside the token directories. An attacker with token-group membership can exploit the system when an administrator runs a PKCS#11 application or administrative tool that performs chown on files inside the token directory during normal maintenance. This issue is fixed in commit 5e6e4b4, but has not been included in a released version at the time of publication.
|
2026-01-22 |
| CVE-2024-31884 |
A vulnerability was found in how Ceph uses Pybind, which does not implement correct certificate checking. No SSL context is passed to the constructor imaplib.IMAP4_SSL or smtplib.SMTP_SSL. As a result, pybind does not check the server's X.509
certificate, instead accepting any certificate. This can allow an attacker to compromise mail server credentials or mail contents, via a Man In The Middle (MITM) attack, impacting confidentiality and availability.
|
2026-01-22 |
| CVE-2025-15523 |
MacOS version of Inkscape bundles a Python interpreter that inherits the Transparency, Consent, and Control (TCC) permissions granted by the user to the main application bundle. An attacker with local user access can invoke this interpreter with arbitrary commands or scripts, leveraging the application's previously granted TCC permissions to access user's files in privacy-protected folders without triggering user prompts. Accessing other resources beyond previously granted TCC permissions will prompt the user for approval in the name of Inkscape, potentially disguising attacker's malicious intent.
This issue has been fixed in 1.4.3 version of Inkscape.
|
2026-01-22 |
| CVE-2026-23952 |
NULL pointer dereference in MSL (Magick Scripting Language) parser when processing <comment> tag before any image is loaded.
|
2026-01-22 |
| CVE-2026-22977 |
In the Linux kernel, the following vulnerability has been resolved:
net: sock: fix hardened usercopy panic in sock_recv_errqueue
|
2026-01-21 |
| CVE-2025-12781 |
When passing data to the b64decode(), standard_b64decode(), and urlsafe_b64decode() functions in the "base64" module the characters "+/" will always be accepted, regardless of the value of "altchars" parameter, typically used to establish an "alternative base64 alphabet" such as the URL safe alphabet. This behavior matches what is recommended in earlier base64 RFCs, but newer RFCs now recommend either dropping characters outside the specified base64 alphabet or raising an error. The old behavior has the possibility of causing data integrity issues.
This behavior can only be insecure if your application uses an alternate base64 alphabet (without "+/"). If your application does not use the "altchars" parameter or the urlsafe_b64decode() function, then your application does not use an alternative base64 alphabet.
The attached patches DOES NOT make the base64-decode behavior raise an error, as this would be a change in behavior and break existing programs. Instead, the patch deprecates the behavior which will be replaced with the newly recommended behavior in a future version of Python. Users are recommended to mitigate by verifying user-controlled inputs match the base64
alphabet they are expecting or verify that their application would not be
affected if the b64decode() functions accepted "+" or "/" outside of altchars.
|
2026-01-21 |
| CVE-2026-22976 |
In the Linux kernel, the following vulnerability has been resolved:
net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset
|
2026-01-21 |
| CVE-2025-13878 |
Malformed BRID/HHIT records can cause `named` to terminate unexpectedly.
This issue affects BIND 9 versions 9.18.40 through 9.18.43, 9.20.13 through 9.20.17, 9.21.12 through 9.21.16, 9.18.40-S1 through 9.18.43-S1, and 9.20.13-S1 through 9.20.17-S1.
|
2026-01-21 |
| CVE-2026-21948 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.44, 8.4.0-8.4.7 and 9.0.0-9.5.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
2026-01-20 |
| CVE-2025-33229 |
NVIDIA Nsight Visual Studio for Windows contains a vulnerability in Nsight Monitor where an attacker can execute arbitrary code with the same privileges as the NVIDIA Nsight Visual Studio Edition Monitor application. A successful exploit of this vulnerability may lead to escalation of privileges, code execution, data tampering, denial of service, and information disclosure.
|
2026-01-20 |
| CVE-2025-56005 |
An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the `picklefile` parameter in the `yacc()` function. This parameter accepts a `.pkl` file that is deserialized with `pickle.load()` without validation. Because `pickle` allows execution of embedded code via `__reduce__()`, an attacker can achieve code execution by passing a malicious pickle file. The parameter is not mentioned in official documentation or the GitHub repository, yet it is active in the PyPI version. This introduces a stealthy backdoor and persistence risk.
|
2026-01-20 |
| CVE-2025-15282 |
User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype.
|
2026-01-20 |
| CVE-2026-21941 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.44, 8.4.0-8.4.7 and 9.0.0-9.5.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
2026-01-20 |
| CVE-2025-33228 |
NVIDIA Nsight Systems contains a vulnerability in the gfx_hotspot recipe, where an attacker could cause an OS command injection by supplying a malicious string to the process_nsys_rep_cli.py script if the script is invoked manually. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure.
|
2026-01-20 |
| CVE-2026-0865 |
User-controlled header names and values containing newlines can allow injecting HTTP headers.
|
2026-01-20 |
| CVE-2026-21945 |
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
|
2026-01-20 |
| CVE-2026-21965 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth). Supported versions that are affected are 9.0.0-9.5.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).
|
2026-01-20 |
| CVE-2026-21964 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.0-8.0.44, 8.4.0-8.4.7 and 9.0.0-9.5.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
2026-01-20 |
| CVE-2025-33231 |
NVIDIA Nsight Systems for Windows contains a vulnerability in the application’s DLL loading mechanism where an attacker could cause an uncontrolled search path element by exploiting insecure DLL search paths. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service and information disclosure.
|
2026-01-20 |
| CVE-2026-21949 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.5.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
|
2026-01-20 |
| CVE-2026-21968 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.44, 8.4.0-8.4.7 and 9.0.0-9.5.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
|
2026-01-20 |
| CVE-2026-21932 |
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: AWT, JavaFX). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).
|
2026-01-20 |
| CVE-2026-21950 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.5.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
|
2026-01-20 |
| CVE-2026-23874 |
ImageMagick is free and open-source software used for editing and manipulating digital images. Versions prior to 7.1.2-13 have a stack overflow via infinite recursion in MSL (Magick Scripting Language) `<write>` command when writing to MSL format. Version 7.1.2-13 fixes the issue.
|
2026-01-20 |
| CVE-2026-21947 |
Vulnerability in Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u471-b50. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
|
2026-01-20 |
| CVE-2026-22770 |
ImageMagick is free and open-source software used for editing and manipulating digital images. The BilateralBlurImage method will allocate a set of double buffers inside AcquireBilateralTLS. But, in versions prior to 7.1.2-13, the last element in the set is not properly initialized. This will result in a release of an invalid pointer inside DestroyBilateralTLS when the memory allocation fails. Version 7.1.2-13 contains a patch for the issue.
|
2026-01-20 |
| CVE-2026-21933 |
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
2026-01-20 |
| CVE-2026-21936 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.44, 8.4.0-8.4.7 and 9.0.0-9.5.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
2026-01-20 |
| CVE-2026-0672 |
When using http.cookies.Morsel, user-controlled cookie values and parameters can allow injecting HTTP headers into messages. Patch rejects all control characters within cookie names, values, and parameters.
|
2026-01-20 |
| CVE-2026-21925 |
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: RMI). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
|
2026-01-20 |
| CVE-2026-21929 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 9.0.0-9.5.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
|
2026-01-20 |
| CVE-2025-33230 |
NVIDIA Nsight Systems for Linux contains a vulnerability in the .run installer, where an attacker could cause an OS command injection by supplying a malicious string to the installation path. A successful exploit of this vulnerability might lead to escalation of privileges, code execution, data tampering, denial of service, and information disclosure.
|
2026-01-20 |
| CVE-2026-23876 |
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-13 and 6.9.13-38, a heap buffer overflow vulnerability in the XBM image decoder (ReadXBMImage) allows an attacker to write controlled data past the allocated heap buffer when processing a maliciously crafted image file. Any operation that reads or identifies an image can trigger the overflow, making it exploitable via common image upload and processing pipelines. Versions 7.1.2-13 and 6.9.13-38 fix the issue.
|
2026-01-20 |
| CVE-2025-15366 |
The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.
|
2026-01-20 |
| CVE-2026-21952 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 9.0.0-9.5.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
2026-01-20 |
| CVE-2026-21937 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.0-8.0.44, 8.4.0-8.4.7 and 9.0.0-9.5.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
2026-01-20 |
| CVE-2025-15367 |
The poplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.
|
2026-01-20 |
| CVE-2026-23950 |
node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in the `path-reservations` system. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g., `ß` and `ss`), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses a `PathReservations` system to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of using `NFD` Unicode normalization (in which `ß` and `ss` are different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in which `ß` causes an inode collision with `ss`)). This enables an attacker to circumvent internal parallelization locks (`PathReservations`) using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updates `path-reservations.js` to use a normalization form that matches the target filesystem's behavior (e.g., `NFKD`), followed by first `toLocaleLowerCase('en')` and then `toLocaleUpperCase('en')`. As a workaround, users who cannot upgrade promptly, and who are programmatically using `node-tar` to extract arbitrary tarball data should filter out all `SymbolicLink` entries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.
|
2026-01-20 |
| CVE-2025-11468 |
When folding a long comment in an email header containing exclusively unfoldable characters, the parenthesis would not be preserved. This could be used for injecting headers into email messages where addresses are user-controlled and not sanitized.
|
2026-01-20 |
| CVE-2025-15281 |
Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.
|
2026-01-20 |
| CVE-2025-61730 |
crypto/tls: handshake messages may be processed at the incorrect encryption level
|
2026-01-19 |
| CVE-2026-23884 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, offscreen bitmap deletion leaves `gdi->drawing` pointing to freed memory, causing UAF when related update packets arrive. A malicious server can trigger a client‑side use after free, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
|
2026-01-19 |
| CVE-2025-61728 |
archive/zip: denial of service when parsing arbitrary ZIP archives
|
2026-01-19 |
| CVE-2026-23732 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, FastGlyph parsing trusts `cbData`/remaining length and never validates against the minimum size implied by `cx/cy`. A malicious server can trigger a client‑side global buffer overflow, causing a crash (DoS). Version 3.21.0 contains a patch for the issue.
|
2026-01-19 |
| CVE-2025-68119 |
cmd/go: unexpected code execution when invoking toolchain
|
2026-01-19 |
| CVE-2025-15497 |
When the sender jumps forwards exactly epoch_data_keys_future_count in its
epoch key use the housekeeping logic does not handle this correctly and
triggers an ASSERT.
|
2026-01-19 |
| CVE-2025-61726 |
net/http: memory exhaustion in Request.ParseForm
|
2026-01-19 |
| CVE-2026-23883 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, `xf_Pointer_New` frees `cursorPixels` on failure, then `pointer_free` calls `xf_Pointer_Free` and frees it again, triggering ASan UAF. A malicious server can trigger a client‑side use after free, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
|
2026-01-19 |
| CVE-2026-0810 |
A flaw in the gix-date library can generate invalid non-UTF8 strings, leading to undefined behavior when processed. The most likely impact from a successful attack is to data integrity, by the malicious data being able to corrupt data being hold in memory and to system availability as it eventually may lead to the software using the gix_date library to crash.
|
2026-01-19 |
| CVE-2025-61731 |
cmd/go: bypass of flag sanitization can lead to arbitrary code execution
|
2026-01-19 |
| CVE-2026-23531 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, in ClearCodec, when `glyphData` is present, `clear_decompress` calls `freerdp_image_copy_no_overlap` without validating the destination rectangle, allowing an out-of-bounds read/write via crafted RDPGFX surface updates. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
|
2026-01-19 |
| CVE-2026-0988 |
An integer overflow in the g_buffered_input_stream_peek() function of the GLib library can lead to a Denial of Service. Exploitation requires specially crafted input and is subject to strict preconditions, primarily causing application crashes.
|
2026-01-19 |
| CVE-2026-23534 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the ClearCodec bands decode path when crafted band coordinates allow writes past the end of the destination surface buffer. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
|
2026-01-19 |
| CVE-2026-23532 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the FreeRDP client’s `gdi_SurfaceToSurface` path due to a mismatch between destination rectangle clamping and the actual copy size. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
|
2026-01-19 |
| CVE-2025-68121 |
crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain
|
2026-01-19 |
| CVE-2026-23533 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the RDPGFX ClearCodec decode path when maliciously crafted residual data causes out-of-bounds writes during color output. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
|
2026-01-19 |
| CVE-2026-23530 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0,`freerdp_bitmap_decompress_planar` does not validate `nSrcWidth`/`nSrcHeight` against `planar->maxWidth`/`maxHeight` before RLE decode. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
|
2026-01-19 |
| CVE-2025-15536 |
A weakness has been identified in BYVoid OpenCC up to 1.1.9. This vulnerability affects the function opencc::MaxMatchSegmentation of the file src/MaxMatchSegmentation.cpp. This manipulation causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. Patch name: 345c9a50ab07018f1b4439776bad78a0d40778ec. To fix this issue, it is recommended to deploy a patch.
|
2026-01-18 |
| CVE-2025-15538 |
A security vulnerability has been detected in Open Asset Import Library Assimp up to 6.0.2. Affected by this vulnerability is the function Assimp::LWOImporter::FindUVChannels of the file /src/assimp/code/AssetLib/LWO/LWOMaterial.cpp. Such manipulation leads to use after free. The attack needs to be performed locally. The exploit has been disclosed publicly and may be used. This and similar defects are tracked and handled via issue #6128.
|
2026-01-18 |
| CVE-2025-29943 |
Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.
|
2026-01-16 |
| CVE-2026-23490 |
pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.2, a Denial-of-Service issue has been found that leads to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets. This vulnerability is fixed in 0.6.2.
|
2026-01-16 |
| CVE-2026-23745 |
node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.
|
2026-01-16 |
| CVE-2025-55131 |
A flaw in Node.js's buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the vm module with the timeout option. Under specific timing conditions, buffers allocated with Buffer.alloc and other TypedArray instances like Uint8Array may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption.
While exploitation typically requires precise timing or in-process code execution, it can become remotely exploitable when untrusted input influences workload and timeouts, leading to potential confidentiality and integrity impact.
|
2026-01-15 |
| CVE-2026-21637 |
TLS PSK/ALPN Callback Exceptions Bypass Error Handlers, Causing DoS and FD Leak
NOTE: https://nodejs.org/en/blog/vulnerability/december-2025-security-releases#tls-pskalpn-callback-exceptions-bypass-error-handlers-causing-dos-and-fd-leak-cve-2026-21637---medium
|
2026-01-15 |
| CVE-2025-59465 |
Node.js HTTP/2 server crashes with unhandled error when receiving malformed HEADERS frame
|
2026-01-15 |
| CVE-2025-55132 |
fs.futimes() Bypasses Read-Only Permission Model
|
2026-01-15 |
| CVE-2025-59464 |
Memory leak that enables remote Denial of Service against applications processing TLS client certificates
|
2026-01-15 |
| CVE-2026-21636 |
Node.js permission model bypass via unchecked Unix Domain Socket connections (UDS)
|
2026-01-15 |
| CVE-2026-0990 |
A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.
|
2026-01-15 |
| CVE-2025-55130 |
Bypass File System Permissions using crafted symlinks
|
2026-01-15 |
| CVE-2025-59466 |
Uncatchable "Maximum call stack size exceeded" error on Node.js via async_hooks leads to process crashes bypassing error handlers
|
2026-01-15 |
| CVE-2026-0915 |
Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
|
2026-01-15 |
| CVE-2026-0989 |
A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested <include> directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.
|
2026-01-15 |
| CVE-2026-0992 |
A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.
|
2026-01-15 |
| CVE-2026-22852 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a malicious RDP server can trigger a heap-buffer-overflow write in the FreeRDP client when processing Audio Input (AUDIN) format lists. audin_process_formats reuses callback->formats_count across multiple MSG_SNDIN_FORMATS PDUs and writes past the newly allocated formats array, causing memory corruption and a crash. This vulnerability is fixed in 3.20.1.
|
2026-01-14 |
| CVE-2025-71139 |
In the Linux kernel, the following vulnerability has been resolved:
kernel/kexec: fix IMA when allocation happens in CMA area
|
2026-01-14 |
| CVE-2025-71130 |
In the Linux kernel, the following vulnerability has been resolved:
drm/i915/gem: Zero-initialize the eb.vma array in i915_gem_do_execbuffer
|
2026-01-14 |
| CVE-2025-71113 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: af_alg - zero initialize memory allocated via sock_kmalloc
|
2026-01-14 |
| CVE-2025-71140 |
In the Linux kernel, the following vulnerability has been resolved:
media: mediatek: vcodec: Use spinlock for context list protection lock
|
2026-01-14 |
| CVE-2025-71132 |
In the Linux kernel, the following vulnerability has been resolved:
smc91x: fix broken irq-context in PREEMPT_RT
|
2026-01-14 |
| CVE-2025-71122 |
In the Linux kernel, the following vulnerability has been resolved:
iommufd/selftest: Check for overflow in IOMMU_TEST_OP_ADD_RESERVEd
|
2026-01-14 |
| CVE-2025-71134 |
In the Linux kernel, the following vulnerability has been resolved:
mm/page_alloc: change all pageblocks migrate type on coalescing
|
2026-01-14 |
| CVE-2025-71127 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: Discard Beacon frames to non-broadcast address
|
2026-01-14 |
| CVE-2025-71103 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm: adreno: fix deferencing ifpc_reglist when not declared
|
2026-01-14 |
| CVE-2025-71135 |
In the Linux kernel, the following vulnerability has been resolved:
md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt()
|
2026-01-14 |
| CVE-2026-22853 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, RDPEAR’s NDR array reader does not perform bounds checking on the on‑wire element count and can write past the heap buffer allocated from hints, causing a heap buffer overflow in ndr_read_uint8Array. This vulnerability is fixed in 3.20.1.
|
2026-01-14 |
| CVE-2025-71110 |
In the Linux kernel, the following vulnerability has been resolved:
mm/slub: reset KASAN tag in defer_free() before accessing freed memory
|
2026-01-14 |
| CVE-2025-71102 |
In the Linux kernel, the following vulnerability has been resolved:
scs: fix a wrong parameter in __scs_magic
|
2026-01-14 |
| CVE-2026-22858 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, global-buffer-overflow was observed in FreeRDP's Base64 decoding path. The root cause appears to be implementation-defined char signedness: on Arm/AArch64 builds, plain char is treated as unsigned, so the guard c <= 0 can be optimized into a simple c != 0 check. As a result, non-ASCII bytes (e.g., 0x80-0xFF) may bypass the intended range restriction and be used as an index into a global lookup table, causing out-of-bounds access. This vulnerability is fixed in 3.20.1.
|
2026-01-14 |
| CVE-2025-71136 |
In the Linux kernel, the following vulnerability has been resolved:
media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status()
|
2026-01-14 |
| CVE-2025-71123 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix string copying in parse_apply_sb_mount_options()
|
2026-01-14 |
| CVE-2025-71133 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/irdma: avoid invalid read in irdma_net_event
|
2026-01-14 |
| CVE-2025-71125 |
In the Linux kernel, the following vulnerability has been resolved:
tracing: Do not register unsupported perf events
|
2026-01-14 |
| CVE-2025-71106 |
In the Linux kernel, the following vulnerability has been resolved:
fs: PM: Fix reverse check in filesystems_freeze_callback()
|
2026-01-14 |
| CVE-2025-71117 |
In the Linux kernel, the following vulnerability has been resolved:
block: Remove queue freezing from several sysfs store callbacks
|
2026-01-14 |
| CVE-2025-71124 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/a6xx: move preempt_prepare_postamble after error check
|
2026-01-14 |
| CVE-2026-0962 |
SOME/IP-SD protocol dissector crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to 4.4.12 allows denial of service
|
2026-01-14 |
| CVE-2025-71128 |
In the Linux kernel, the following vulnerability has been resolved:
erspan: Initialize options_len before referencing options.
|
2026-01-14 |
| CVE-2026-22036 |
Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation. This vulnerability is fixed in 7.18.0 and 6.23.0.
|
2026-01-14 |
| CVE-2026-22854 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap-buffer-overflow occurs in drive read when a server-controlled read length is used to read file data into an IRP output stream buffer without a hard upper bound, allowing an oversized read to overwrite heap memory. This vulnerability is fixed in 3.20.1.
|
2026-01-14 |
| CVE-2026-0960 |
HTTP3 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.2 allows denial of service
|
2026-01-14 |
| CVE-2025-71107 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: ensure node page reads complete before f2fs_put_super() finishes
|
2026-01-14 |
| CVE-2025-71144 |
In the Linux kernel, the following vulnerability has been resolved:
mptcp: ensure context reset on disconnect()
|
2026-01-14 |
| CVE-2025-71129 |
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: BPF: Sign extend kfunc call arguments
|
2026-01-14 |
| CVE-2025-71138 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dpu: Add missing NULL pointer check for pingpong interface
|
2026-01-14 |
| CVE-2026-22857 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap use-after-free occurs in irp_thread_func because the IRP is freed by irp->Complete() and then accessed again on the error path. This vulnerability is fixed in 3.20.1.
|
2026-01-14 |
| CVE-2025-71143 |
In the Linux kernel, the following vulnerability has been resolved:
clk: samsung: exynos-clkout: Assign .num before accessing .hws
|
2026-01-14 |
| CVE-2025-71131 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: seqiv - Do not use req->iv after crypto_aead_encrypt
|
2026-01-14 |
| CVE-2025-71116 |
In the Linux kernel, the following vulnerability has been resolved:
libceph: make decode_pool() more resilient against corrupted osdmaps
|
2026-01-14 |
| CVE-2025-71105 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: use global inline_xattr_slab instead of per-sb slab cache
|
2026-01-14 |
| CVE-2025-71118 |
In the Linux kernel, the following vulnerability has been resolved:
ACPICA: Avoid walking the Namespace if start_node is NULL
|
2026-01-14 |
| CVE-2025-71111 |
In the Linux kernel, the following vulnerability has been resolved:
hwmon: (w83791d) Convert macros to functions to avoid TOCTOU
|
2026-01-14 |
| CVE-2025-14242 |
A flaw was found in vsftpd. This vulnerability allows a denial of service (DoS) via an integer overflow in the ls command parameter parsing, triggered by a remote, authenticated attacker sending a crafted STAT command with a specific byte sequence.
|
2026-01-14 |
| CVE-2025-71115 |
In the Linux kernel, the following vulnerability has been resolved:
um: init cpu_tasks[] earlier
|
2026-01-14 |
| CVE-2025-71126 |
In the Linux kernel, the following vulnerability has been resolved:
mptcp: avoid deadlock on fallback while reinjecting
|
2026-01-14 |
| CVE-2025-71112 |
In the Linux kernel, the following vulnerability has been resolved:
net: hns3: add VLAN id validation before using
|
2026-01-14 |
| CVE-2026-22856 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race in the serial channel IRP thread tracking allows a heap use‑after‑free when one thread removes an entry from serial->IrpThreads while another reads it. This vulnerability is fixed in 3.20.1.
|
2026-01-14 |
| CVE-2025-71137 |
In the Linux kernel, the following vulnerability has been resolved:
octeontx2-pf: fix "UBSAN: shift-out-of-bounds error"
|
2026-01-14 |
| CVE-2025-71114 |
In the Linux kernel, the following vulnerability has been resolved:
via_wdt: fix critical boot hang due to unnamed resource allocation
|
2026-01-14 |
| CVE-2025-71121 |
In the Linux kernel, the following vulnerability has been resolved:
parisc: Do not reprogram affinitiy on ASP chip
|
2026-01-14 |
| CVE-2026-0665 |
An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.
|
2026-01-14 |
| CVE-2025-71108 |
In the Linux kernel, the following vulnerability has been resolved:
usb: typec: ucsi: Handle incorrect num_connectors capability
|
2026-01-14 |
| CVE-2026-22851 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race condition between the RDPGFX dynamic virtual channel thread and the SDL render thread leads to a heap use-after-free. Specifically, an escaped pointer to sdl->primary (SDL_Surface) is accessed after it has been freed during RDPGFX ResetGraphics handling. This vulnerability is fixed in 3.20.1.
|
2026-01-14 |
| CVE-2026-0861 |
Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.
Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc.
Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.
|
2026-01-14 |
| CVE-2025-71120 |
In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf
|
2026-01-14 |
| CVE-2026-0961 |
BLF file parser crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to 4.4.12 allows denial of service
|
2026-01-14 |
| CVE-2025-56226 |
Libsndfile <=1.2.2 contains a memory leak vulnerability in the mpeg_l3_encoder_init() function within the mpeg_l3_encode.c file.
|
2026-01-14 |
| CVE-2026-22859 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, the URBDRC client does not perform bounds checking on server‑supplied MSUSB_INTERFACE_DESCRIPTOR values and uses them as indices in libusb_udev_complete_msconfig_setup, causing an out‑of‑bounds read. This vulnerability is fixed in 3.20.1.
|
2026-01-14 |
| CVE-2025-71142 |
In the Linux kernel, the following vulnerability has been resolved:
cpuset: fix warning when disabling remote partition
|
2026-01-14 |
| CVE-2025-71141 |
In the Linux kernel, the following vulnerability has been resolved:
drm/tilcdc: Fix removal actions in case of failed probe
|
2026-01-14 |
| CVE-2026-22855 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap out-of-bounds read occurs in the smartcard SetAttrib path when cbAttrLen does not match the actual NDR buffer length. This vulnerability is fixed in 3.20.1.
|
2026-01-14 |
| CVE-2025-71119 |
In the Linux kernel, the following vulnerability has been resolved:
powerpc/kexec: Enable SMT before waking offline CPUs
|
2026-01-14 |
| CVE-2025-71109 |
In the Linux kernel, the following vulnerability has been resolved:
MIPS: ftrace: Fix memory corruption when kernel is located beyond 32 bits
|
2026-01-14 |
| CVE-2026-0959 |
IEEE 802.11 protocol dissector crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to 4.4.12 allows denial of service
|
2026-01-14 |
| CVE-2025-71104 |
In the Linux kernel, the following vulnerability has been resolved:
KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer
|
2026-01-14 |
| CVE-2025-71088 |
In the Linux kernel, the following vulnerability has been resolved:
mptcp: fallback earlier on simult connection
|
2026-01-13 |
| CVE-2025-71084 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/cm: Fix leaking the multicast GID table reference
|
2026-01-13 |
| CVE-2025-71070 |
In the Linux kernel, the following vulnerability has been resolved:
ublk: clean up user copy references on ublk server exit
|
2026-01-13 |
| CVE-2025-68800 |
In the Linux kernel, the following vulnerability has been resolved:
mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats
|
2026-01-13 |
| CVE-2025-68795 |
In the Linux kernel, the following vulnerability has been resolved:
ethtool: Avoid overflowing userspace buffer on stats query
|
2026-01-13 |
| CVE-2025-68793 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: fix a job->pasid access race in gpu recovery
|
2026-01-13 |
| CVE-2025-71075 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: aic94xx: fix use-after-free in device removal path
|
2026-01-13 |
| CVE-2025-68792 |
In the Linux kernel, the following vulnerability has been resolved:
tpm2-sessions: Fix out of range indexing in name_size
|
2026-01-13 |
| CVE-2025-68821 |
In the Linux kernel, the following vulnerability has been resolved:
fuse: fix readahead reclaim deadlock
|
2026-01-13 |
| CVE-2025-68790 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Fix double unregister of HCA_PORTS component
|
2026-01-13 |
| CVE-2025-68769 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix return value of f2fs_recover_fsync_data()
|
2026-01-13 |
| CVE-2026-0881 |
Sandbox escape in the Messaging System component. This vulnerability affects Firefox < 147.
|
2026-01-13 |
| CVE-2025-71071 |
In the Linux kernel, the following vulnerability has been resolved:
iommu/mediatek: fix use-after-free on probe deferral
|
2026-01-13 |
| CVE-2025-68773 |
In the Linux kernel, the following vulnerability has been resolved:
spi: fsl-cpm: Check length parity before switching to 16 bit mode
|
2026-01-13 |
| CVE-2026-0886 |
Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 147, Firefox ESR < 115.32, and Firefox ESR < 140.7.
|
2026-01-13 |
| CVE-2025-68806 |
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix buffer validation by including null terminator size in EA length
|
2026-01-13 |
| CVE-2025-68789 |
In the Linux kernel, the following vulnerability has been resolved:
hwmon: (ibmpex) fix use-after-free in high/low store
|
2026-01-13 |
| CVE-2025-68779 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Avoid unregistering PSP twice
|
2026-01-13 |
| CVE-2025-71096 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly
|
2026-01-13 |
| CVE-2025-68801 |
In the Linux kernel, the following vulnerability has been resolved:
mlxsw: spectrum_router: Fix neighbour use-after-free
|
2026-01-13 |
| CVE-2026-0716 |
OOB Read via Integer Overflow on libsoup through libsoup/websocket/soup-websocket-connection.c via process_frame() leads to Undefined Behavior
|
2026-01-13 |
| CVE-2025-68780 |
In the Linux kernel, the following vulnerability has been resolved:
sched/deadline: only set free_cpus for online runqueues
|
2026-01-13 |
| CVE-2026-0891 |
Memory safety bugs present in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 147 and Firefox ESR < 140.7.
|
2026-01-13 |
| CVE-2025-71072 |
In the Linux kernel, the following vulnerability has been resolved:
shmem: fix recovery on rename failures
|
2026-01-13 |
| CVE-2026-0878 |
Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. This vulnerability affects Firefox < 147 and Firefox ESR < 140.7.
|
2026-01-13 |
| CVE-2025-71069 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: invalidate dentry cache on failed whiteout creation
|
2026-01-13 |
| CVE-2025-68816 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: fw_tracer, Validate format string parameters
|
2026-01-13 |
| CVE-2025-68808 |
In the Linux kernel, the following vulnerability has been resolved:
media: vidtv: initialize local pointers upon transfer of memory ownership
|
2026-01-13 |
| CVE-2025-68817 |
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency
|
2026-01-13 |
| CVE-2026-0879 |
Sandbox escape due to incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 147, Firefox ESR < 115.32, and Firefox ESR < 140.7.
|
2026-01-13 |
| CVE-2025-68810 |
In the Linux kernel, the following vulnerability has been resolved:
KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot
|
2026-01-13 |
| CVE-2025-68823 |
In the Linux kernel, the following vulnerability has been resolved:
ublk: fix deadlock when reading partition table
|
2026-01-13 |
| CVE-2025-71066 |
In the Linux kernel, the following vulnerability has been resolved:
net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change
|
2026-01-13 |
| CVE-2025-68811 |
In the Linux kernel, the following vulnerability has been resolved:
svcrdma: use rc_pageoff for memcpy byte offset
|
2026-01-13 |
| CVE-2025-71085 |
In the Linux kernel, the following vulnerability has been resolved:
ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()
|
2026-01-13 |
| CVE-2026-0884 |
Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 147 and Firefox ESR < 140.7.
|
2026-01-13 |
| CVE-2025-68791 |
In the Linux kernel, the following vulnerability has been resolved:
fuse: missing copy_finish in fuse-over-io-uring argument copies
|
2026-01-13 |
| CVE-2026-0885 |
Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 147 and Firefox ESR < 140.7.
|
2026-01-13 |
| CVE-2026-0890 |
Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. This vulnerability affects Firefox < 147 and Firefox ESR < 140.7.
|
2026-01-13 |
| CVE-2025-68809 |
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: vfs: fix race on m_flags in vfs_cache
|
2026-01-13 |
| CVE-2025-68796 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to avoid updating zero-sized extent in extent cache
|
2026-01-13 |
| CVE-2025-68768 |
In the Linux kernel, the following vulnerability has been resolved:
inet: frags: flush pending skbs in fqdir_pre_exit()
|
2026-01-13 |
| CVE-2025-71067 |
In the Linux kernel, the following vulnerability has been resolved:
ntfs: set dummy blocksize to read boot_block when mounting
|
2026-01-13 |
| CVE-2025-71081 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: stm32: sai: fix OF node leak on probe
|
2026-01-13 |
| CVE-2025-71082 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btusb: revert use of devm_kzalloc in btusb
|
2026-01-13 |
| CVE-2026-0877 |
Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 147, Firefox ESR < 115.32, and Firefox ESR < 140.7.
|
2026-01-13 |
| CVE-2025-68786 |
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: skip lock-range check on equal size to avoid size==0 underflow
|
2026-01-13 |
| CVE-2025-71093 |
In the Linux kernel, the following vulnerability has been resolved:
e1000: fix OOB in e1000_tbi_should_accept()
|
2026-01-13 |
| CVE-2025-68776 |
In the Linux kernel, the following vulnerability has been resolved:
net/hsr: fix NULL pointer dereference in prp_get_untagged_frame()
|
2026-01-13 |
| CVE-2025-68813 |
In the Linux kernel, the following vulnerability has been resolved:
ipvs: fix ipv4 null-ptr-deref in route error path
|
2026-01-13 |
| CVE-2025-68814 |
In the Linux kernel, the following vulnerability has been resolved:
io_uring: fix filename leak in __io_openat_prep()
|
2026-01-13 |
| CVE-2025-68804 |
In the Linux kernel, the following vulnerability has been resolved:
platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver
|
2026-01-13 |
| CVE-2025-68797 |
In the Linux kernel, the following vulnerability has been resolved:
char: applicom: fix NULL pointer dereference in ac_ioctl
|
2026-01-13 |
| CVE-2025-68771 |
In the Linux kernel, the following vulnerability has been resolved:
ocfs2: fix kernel BUG in ocfs2_find_victim_chain
|
2026-01-13 |
| CVE-2025-68784 |
In the Linux kernel, the following vulnerability has been resolved:
xfs: fix a UAF problem in xattr repair
|
2026-01-13 |
| CVE-2025-71077 |
In the Linux kernel, the following vulnerability has been resolved:
tpm: Cap the number of PCR banks
|
2026-01-13 |
| CVE-2026-22791 |
openCryptoki is a PKCS#11 library and tools for Linux and AIX. In 3.25.0 and 3.26.0, there is a heap buffer overflow vulnerability in the CKM_ECDH_AES_KEY_WRAP implementation allows an attacker with local access to cause out-of-bounds writes in the host process by supplying a compressed EC public key and invoking C_WrapKey. This can lead to heap corruption, or denial-of-service.
|
2026-01-13 |
| CVE-2025-68787 |
In the Linux kernel, the following vulnerability has been resolved:
netrom: Fix memory leak in nr_sendmsg()
|
2026-01-13 |
| CVE-2025-68785 |
In the Linux kernel, the following vulnerability has been resolved:
net: openvswitch: fix middle attribute validation in push_nsh() action
|
2026-01-13 |
| CVE-2025-71101 |
In the Linux kernel, the following vulnerability has been resolved:
platform/x86: hp-bioscfg: Fix out-of-bounds array access in ACPI package parsing
|
2026-01-13 |
| CVE-2025-68781 |
In the Linux kernel, the following vulnerability has been resolved:
usb: phy: fsl-usb: Fix use-after-free in delayed work during device removal
|
2026-01-13 |
| CVE-2025-71076 |
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/oa: Limit num_syncs to prevent oversized allocations
|
2026-01-13 |
| CVE-2025-68818 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: Revert "scsi: qla2xxx: Perform lockless command completion in abort path"
|
2026-01-13 |
| CVE-2025-71083 |
In the Linux kernel, the following vulnerability has been resolved:
drm/ttm: Avoid NULL pointer deref for evicted BOs
|
2026-01-13 |
| CVE-2025-71080 |
In the Linux kernel, the following vulnerability has been resolved:
ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT
|
2026-01-13 |
| CVE-2025-71097 |
In the Linux kernel, the following vulnerability has been resolved:
ipv4: Fix reference count leak when using error routes with nexthop objects
|
2026-01-13 |
| CVE-2025-71078 |
In the Linux kernel, the following vulnerability has been resolved:
powerpc/64s/slb: Fix SLB multihit issue during SLB preload
|
2026-01-13 |
| CVE-2025-71065 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to avoid potential deadlock
|
2026-01-13 |
| CVE-2025-71064 |
In the Linux kernel, the following vulnerability has been resolved:
net: hns3: using the num_tqps in the vf driver to apply for resources
|
2026-01-13 |
| CVE-2025-71100 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: rtlwifi: 8192cu: fix tid out of range in rtl92cu_tx_fill_desc()
|
2026-01-13 |
| CVE-2025-68782 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: target: Reset t_task_cdb pointer in error case
|
2026-01-13 |
| CVE-2025-68775 |
In the Linux kernel, the following vulnerability has been resolved:
net/handshake: duplicate handshake cancellations leak socket
|
2026-01-13 |
| CVE-2025-68822 |
In the Linux kernel, the following vulnerability has been resolved:
Input: alps - fix use-after-free bugs caused by dev3_register_work
|
2026-01-13 |
| CVE-2025-68777 |
In the Linux kernel, the following vulnerability has been resolved:
Input: ti_am335x_tsc - fix off-by-one error in wire_order validation
|
2026-01-13 |
| CVE-2025-68783 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-mixer: us16x08: validate meter packet indices
|
2026-01-13 |
| CVE-2025-71089 |
In the Linux kernel, the following vulnerability has been resolved:
iommu: disable SVA when CONFIG_X86 is set
|
2026-01-13 |
| CVE-2025-68803 |
In the Linux kernel, the following vulnerability has been resolved:
NFSD: NFSv4 file creation neglects setting ACL
|
2026-01-13 |
| CVE-2025-71086 |
In the Linux kernel, the following vulnerability has been resolved:
net: rose: fix invalid array index in rose_kill_by_device()
|
2026-01-13 |
| CVE-2025-71098 |
In the Linux kernel, the following vulnerability has been resolved:
ip6_gre: make ip6gre_header() robust
|
2026-01-13 |
| CVE-2025-68778 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: don't log conflicting inode if it's a dir moved in the current transaction
|
2026-01-13 |
| CVE-2026-0888 |
Information disclosure in the XML component. This vulnerability affects Firefox < 147.
|
2026-01-13 |
| CVE-2025-68799 |
In the Linux kernel, the following vulnerability has been resolved:
caif: fix integer underflow in cffrml_receive()
|
2026-01-13 |
| CVE-2025-71073 |
In the Linux kernel, the following vulnerability has been resolved:
Input: lkkbd - disable pending work before freeing device
|
2026-01-13 |
| CVE-2025-71091 |
In the Linux kernel, the following vulnerability has been resolved:
team: fix check for port enabled in team_queue_override_port_prio_changed()
|
2026-01-13 |
| CVE-2026-0883 |
Information disclosure in the Networking component. This vulnerability affects Firefox < 147 and Firefox ESR < 140.7.
|
2026-01-13 |
| CVE-2025-68805 |
In the Linux kernel, the following vulnerability has been resolved:
fuse: fix io-uring list corruption for terminated non-committed requests
|
2026-01-13 |
| CVE-2025-68794 |
In the Linux kernel, the following vulnerability has been resolved:
iomap: adjust read range correctly for non-block-aligned positions
|
2026-01-13 |
| CVE-2025-71090 |
In the Linux kernel, the following vulnerability has been resolved:
nfsd: fix nfsd_file reference leak in nfsd4_add_rdaccess_to_wrdeleg()
|
2026-01-13 |
| CVE-2025-71092 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/bnxt_re: Fix OOB write in bnxt_re_copy_err_stats()
|
2026-01-13 |
| CVE-2025-68772 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to avoid updating compression context during writeback
|
2026-01-13 |
| CVE-2025-68820 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: xattr: fix null pointer deref in ext4_raw_inode()
|
2026-01-13 |
| CVE-2025-71068 |
In the Linux kernel, the following vulnerability has been resolved:
svcrdma: bound check rq_pages index in inline path
|
2026-01-13 |
| CVE-2025-68802 |
In the Linux kernel, the following vulnerability has been resolved:
drm/xe: Limit num_syncs to prevent oversized allocations
|
2026-01-13 |
| CVE-2025-68815 |
In the Linux kernel, the following vulnerability has been resolved:
net/sched: ets: Remove drr class from the active list if it changes to strict
|
2026-01-13 |
| CVE-2025-71079 |
In the Linux kernel, the following vulnerability has been resolved:
net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write
|
2026-01-13 |
| CVE-2025-68774 |
In the Linux kernel, the following vulnerability has been resolved:
hfsplus: fix missing hfs_bnode_get() in __hfs_bnode_create
|
2026-01-13 |
| CVE-2026-0892 |
Memory safety bugs present in Firefox 146 and Thunderbird 146. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 147.
|
2026-01-13 |
| CVE-2025-68798 |
In the Linux kernel, the following vulnerability has been resolved:
perf/x86/amd: Check event before enable to avoid GPF
|
2026-01-13 |
| CVE-2025-71094 |
In the Linux kernel, the following vulnerability has been resolved:
net: usb: asix: validate PHY address before use
|
2026-01-13 |
| CVE-2025-71099 |
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/oa: Fix potential UAF in xe_oa_add_config_ioctl()
|
2026-01-13 |
| CVE-2025-68819 |
In the Linux kernel, the following vulnerability has been resolved:
media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg()
|
2026-01-13 |
| CVE-2025-71087 |
In the Linux kernel, the following vulnerability has been resolved:
iavf: fix off-by-one issues in iavf_config_rss_reg()
|
2026-01-13 |
| CVE-2025-68770 |
In the Linux kernel, the following vulnerability has been resolved:
bnxt_en: Fix XDP_TX path
|
2026-01-13 |
| CVE-2025-71074 |
In the Linux kernel, the following vulnerability has been resolved:
functionfs: fix the open/removal races
|
2026-01-13 |
| CVE-2026-0880 |
Sandbox escape due to integer overflow in the Graphics component. This vulnerability affects Firefox < 147, Firefox ESR < 115.32, and Firefox ESR < 140.7.
|
2026-01-13 |
| CVE-2025-68767 |
In the Linux kernel, the following vulnerability has been resolved:
hfsplus: Verify inode mode when loading from disk
|
2026-01-13 |
| CVE-2026-0882 |
Use-after-free in the IPC component. This vulnerability affects Firefox < 147, Firefox ESR < 115.32, and Firefox ESR < 140.7.
|
2026-01-13 |
| CVE-2025-68807 |
In the Linux kernel, the following vulnerability has been resolved:
block: fix race between wbt_enable_default and IO submission
|
2026-01-13 |
| CVE-2026-0889 |
Denial-of-service in the DOM: Service Workers component. This vulnerability affects Firefox < 147.
|
2026-01-13 |
| CVE-2025-71095 |
In the Linux kernel, the following vulnerability has been resolved:
net: stmmac: fix the crash issue for zero copy XDP_TX action
|
2026-01-13 |
| CVE-2025-68788 |
In the Linux kernel, the following vulnerability has been resolved:
fsnotify: do not generate ACCESS/MODIFY events on child for special files
|
2026-01-13 |
| CVE-2026-0887 |
Clickjacking issue, information disclosure in the PDF Viewer component. This vulnerability affects Firefox < 147 and Firefox ESR < 140.7.
|
2026-01-13 |
| CVE-2025-68812 |
In the Linux kernel, the following vulnerability has been resolved:
media: iris: Add sanity check for stop streaming
|
2026-01-13 |
| CVE-2025-68471 |
Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending 2 unsolicited announcements with CNAME resource records 2 seconds apart.
|
2026-01-12 |
| CVE-2025-68276 |
Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, an unprivileged local users can crash avahi-daemon (with wide-area disabled) by creating record browsers with the AVAHI_LOOKUP_USE_WIDE_AREA flag set via D-Bus. This can be done by either calling
the RecordBrowserNew method directly or creating hostname/address/service resolvers/browsers that create those browsers internally themselves.
|
2026-01-12 |
| CVE-2025-68468 |
Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending unsolicited announcements containing CNAME resource records pointing it to resource records with short TTLs. As soon as they expire avahi-daemon crashes.
|
2026-01-12 |
| CVE-2026-22801 |
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. This vulnerability is fixed in 1.6.54.
|
2026-01-12 |
| CVE-2026-22772 |
Fulcio is a certificate authority for issuing code signing certificates for an OpenID Connect (OIDC) identity. Prior to 1.8.5, Fulcio's metaRegex() function uses unanchored regex, allowing attackers to bypass MetaIssuer URL validation and trigger SSRF to arbitrary internal services. Since the SSRF only can trigger GET requests, the request cannot mutate state. The response from the GET request is not returned to the caller so data exfiltration is not possible. A malicious actor could attempt to probe an internal network through Blind SSRF. This vulnerability is fixed in 1.8.5.
|
2026-01-12 |
| CVE-2026-22695 |
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.51 to 1.6.53, there is a heap buffer over-read in the libpng simplified API function png_image_finish_read when processing interlaced 16-bit PNGs with 8-bit output format and non-minimal row stride. This is a regression introduced by the fix for CVE-2025-65018. This vulnerability is fixed in 1.6.54.
|
2026-01-12 |
| CVE-2026-22702 |
virtualenv is a tool for creating isolated virtual python environments. Prior to version 20.36.1, TOCTOU (Time-of-Check-Time-of-Use) vulnerabilities in virtualenv allow local attackers to perform symlink-based attacks on directory creation operations. An attacker with local access can exploit a race condition between directory existence checks and creation to redirect virtualenv's app_data and lock file operations to attacker-controlled locations. This issue has been patched in version 20.36.1.
|
2026-01-10 |
| CVE-2026-22701 |
filelock is a platform-independent file lock for Python. Prior to version 3.20.3, a TOCTOU race condition vulnerability exists in the SoftFileLock implementation of the filelock package. An attacker with local filesystem access and permission to create symlinks can exploit a race condition between the permission validation and file creation to cause lock operations to fail or behave unexpectedly. The vulnerability occurs in the _acquire() method between raise_on_not_writable_file() (permission check) and os.open() (file creation). During this race window, an attacker can create a symlink at the lock file path, potentially causing the lock to operate on an unintended target file or leading to denial of service. This issue has been patched in version 3.20.3.
|
2026-01-10 |
| CVE-2026-22693 |
HarfBuzz is a text shaping engine. Prior to version 12.3.0, a null pointer dereference vulnerability exists in the SubtableUnicodesCache::create function located in src/hb-ot-cmap-table.hh. The function fails to check if hb_malloc returns NULL before using placement new to construct an object at the returned pointer address. When hb_malloc fails to allocate memory (which can occur in low-memory conditions or when using custom allocators that simulate allocation failures), it returns NULL. The code then attempts to call the constructor on this null pointer using placement new syntax, resulting in undefined behavior and a Segmentation Fault. This issue has been patched in version 12.3.0.
|
2026-01-10 |
| CVE-2026-22703 |
Cosign provides code signing and transparency for containers and binaries. Prior to versions 2.6.2 and 3.0.4, Cosign bundle can be crafted to successfully verify an artifact even if the embedded Rekor entry does not reference the artifact's digest, signature or public key. When verifying a Rekor entry, Cosign verifies the Rekor entry signature, and also compares the artifact's digest, the user's public key from either a Fulcio certificate or provided by the user, and the artifact signature to the Rekor entry contents. Without these comparisons, Cosign would accept any response from Rekor as valid. A malicious actor that has compromised a user's identity or signing key could construct a valid Cosign bundle by including any arbitrary Rekor entry, thus preventing the user from being able to audit the signing event. This issue has been patched in versions 2.6.2 and 3.0.4.
|
2026-01-10 |
| CVE-2025-15079 |
libssh global knownhost override
NOTE: https://curl.se/docs/CVE-2025-15079.html
NOTE: Introduced with: https://github.com/curl/curl/commit/c92d2e14cfb0db662f958effd2ac86f995cf1b5a (curl-7_58_0)
NOTE: Fixed by: https://github.com/curl/curl/commit/adca486c125d9a6d9565b9607a19dce803a8b479 (rc-8_18_0-3, curl-8_18_0)
NOTE: Debian builds with libssh2 for SSH backend
|
2026-01-08 |
| CVE-2025-13034 |
No QUIC certificate pinning with GnuTLS
NOTE: https://curl.se/docs/CVE-2025-13034.html
NOTE: Introduced with: https://github.com/curl/curl/commit/3210101088dfa3d6a125d213226b092f2f866722 (curl-8_8_0)
NOTE: Fixed by: https://github.com/curl/curl/commit/3d91ca8cdb3b434226e743946d428b4dd3acf2c9 (rc-8_18_0-1, curl-8_18_0)
|
2026-01-08 |
| CVE-2026-21876 |
The OWASP core rule set (CRS) is a set of generic attack detection rules for use with compatible web application firewalls. Prior to versions 4.22.0 and 3.3.8, the current rule 922110 has a bug when processing multipart requests with multiple parts. When the first rule in a chain iterates over a collection (like `MULTIPART_PART_HEADERS`), the capture variables (`TX:0`, `TX:1`) get overwritten with each iteration. Only the last captured value is available to the chained rule, which means malicious charsets in earlier parts can be missed if a later part has a legitimate charset. Versions 4.22.0 and 3.3.8 patch the issue.
|
2026-01-08 |
| CVE-2025-15224 |
libssh key passphrase bypass without agent set
NOTE: https://curl.se/docs/CVE-2025-15224.html
NOTE: Introduced with: https://github.com/curl/curl/commit/c92d2e14cfb0db662f958effd2ac86f995cf1b5a (curl-7_58_0)
NOTE: Fixed by: https://github.com/curl/curl/commit/16d5f2a5660c61cc27bd5f1c7f512391d1c927aa (curl-8_18_0)
NOTE: Debian builds with libssh2 for SSH backend
|
2026-01-08 |
| CVE-2026-21860 |
Werkzeug is a comprehensive WSGI web application library. Prior to version 3.1.5, Werkzeug's safe_join function allows path segments with Windows device names that have file extensions or trailing spaces. On Windows, there are special device names such as CON, AUX, etc that are implicitly present and readable in every directory. Windows still accepts them with any file extension, such as CON.txt, or trailing spaces such as CON. This issue has been patched in version 3.1.5.
|
2026-01-08 |
| CVE-2025-14819 |
OpenSSL partial chain store policy bypass
NOTE: https://curl.se/docs/CVE-2025-14819.html
NOTE: Introduced with: https://github.com/curl/curl/commit/3c16697ebd796f799227be293e8689aec5f8190d (curl-7_87_0)
NOTE: Fixed by: https://github.com/curl/curl/commit/cd046f6c93b39d673a58c18648d8906e954c4f5d (rc-8_18_0-3, curl-8_18_0)
|
2026-01-08 |
| CVE-2026-0719 |
A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.
|
2026-01-08 |
| CVE-2026-22184 |
zlib versions up to and including 1.3.1.2 contain a global buffer overflow in the untgz utility. The TGZfname() function copies an attacker-supplied archive name from argv[] into a fixed-size 1024-byte static global buffer using an unbounded strcpy() call without length validation. Supplying an archive name longer than 1024 bytes results in an out-of-bounds write that can lead to memory corruption, denial of service, and potentially code execution depending on compiler, build flags, architecture, and memory layout. The overflow occurs prior to any archive parsing or validation.
|
2026-01-07 |
| CVE-2025-14524 |
bearer token leak on cross-protocol redirect
NOTE: https://curl.se/docs/CVE-2025-14524.html
NOTE: Introduced with: https://github.com/curl/curl/commit/06c1bea72faabb6fad4b7ef818aafaa336c9a7aa (curl-7_33_0)
NOTE: Fixed by: https://github.com/curl/curl/commit/1a822275d333dc6da6043497160fd04c8fa48640 (rc-8_18_0-2, curl-8_18_0)
|
2026-01-07 |
| CVE-2025-14017 |
broken TLS options for threaded LDAPS
NOTE: https://curl.se/docs/CVE-2025-14017.html
NOTE: Introduced with: https://github.com/curl/curl/commit/ccba0d10b6baf5c73cae8cf4fb3f29f0f55c5a34 (curl-7_17_0)
NOTE: Fixed by: https://github.com/curl/curl/commit/39d1976b7f709a516e3243338ebc0443bdd8d56d (rc-8_18_0-1, curl-8_18_0)
NOTE: Built with OpenLDAP (only affects the legacy LDAP support)
|
2026-01-07 |
| CVE-2025-12543 |
A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.
|
2026-01-07 |
| CVE-2025-13151 |
Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.
|
2026-01-07 |
| CVE-2026-21441 |
urllib3 is an HTTP client library for Python. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.
|
2026-01-07 |
| CVE-2026-22185 |
OpenLDAP Lightning Memory-Mapped Database (LMDB) versions up to and including 0.9.14, prior to commit 8e1fda8, contain a heap buffer underflow in the readline() function of mdb_load. When processing malformed input containing an embedded NUL byte, an unsigned offset calculation can underflow and cause an out-of-bounds read of one byte before the allocated heap buffer. This can cause mdb_load to crash, leading to a limited denial-of-service condition.
|
2026-01-07 |
| CVE-2025-68758 |
In the Linux kernel, the following vulnerability has been resolved:
backlight: led-bl: Add devlink to supplier LEDs
|
2026-01-05 |
| CVE-2025-68765 |
In the Linux kernel, the following vulnerability has been resolved:
mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()
|
2026-01-05 |
| CVE-2025-68754 |
In the Linux kernel, the following vulnerability has been resolved:
rtc: amlogic-a4: fix double free caused by devm
|
2026-01-05 |
| CVE-2025-68761 |
In the Linux kernel, the following vulnerability has been resolved:
hfs: fix potential use after free in hfs_correct_next_unused_CNID()
|
2026-01-05 |
| CVE-2025-68752 |
In the Linux kernel, the following vulnerability has been resolved:
iavf: Implement settime64 with -EOPNOTSUPP
|
2026-01-05 |
| CVE-2025-68759 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()
|
2026-01-05 |
| CVE-2025-68755 |
In the Linux kernel, the following vulnerability has been resolved:
staging: most: remove broken i2c driver
|
2026-01-05 |
| CVE-2025-68751 |
In the Linux kernel, the following vulnerability has been resolved:
s390/fpu: Fix false-positive kmsan report in fpu_vstl()
|
2026-01-05 |
| CVE-2025-68762 |
In the Linux kernel, the following vulnerability has been resolved:
net: netpoll: initialize work queue before error checks
|
2026-01-05 |
| CVE-2025-68757 |
In the Linux kernel, the following vulnerability has been resolved:
drm/vgem-fence: Fix potential deadlock on release
|
2026-01-05 |
| CVE-2025-68763 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: starfive - Correctly handle return of sg_nents_for_len
|
2026-01-05 |
| CVE-2025-68753 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: firewire-motu: add bounds check in put_user loop for DSP events
|
2026-01-05 |
| CVE-2025-68766 |
In the Linux kernel, the following vulnerability has been resolved:
irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()
|
2026-01-05 |
| CVE-2025-68760 |
In the Linux kernel, the following vulnerability has been resolved:
iommu/amd: Fix potential out-of-bounds read in iommu_mmio_show
|
2026-01-05 |
| CVE-2025-68756 |
In the Linux kernel, the following vulnerability has been resolved:
block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock
|
2026-01-05 |
| CVE-2025-68764 |
In the Linux kernel, the following vulnerability has been resolved:
NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags
|
2026-01-05 |
| CVE-2025-15280 |
FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28525.
Amazon Linux will not provide fixes for: CVE-2025-15271, CVE-2025-15272, CVE-2025-15273, CVE-2025-15274, CVE-2025-15276, CVE-2025-15277, CVE-2025-15278, CVE-2025-15280. Amazon Linux has analyzed these CVEs and found that they require user interaction to exploit (opening malicious font files). The upstream FontForge project has explicitly stated in their community guidelines that security issues related to untrusted input are not a priority and will not be fixed. FontForge is designed to work with trusted font files, and customers are advised to not use font files from untrusted sources. Due to the upstream project's security stance, their decision to defer fixes indefinitely, and the lack of accessible reproducers, Amazon Linux will not be providing fixes at this time.
|
2025-12-31 |
| CVE-2025-15276 |
FontForge SFD File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of SFD files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28198.
Amazon Linux will not provide fixes for: CVE-2025-15271, CVE-2025-15272, CVE-2025-15273, CVE-2025-15274, CVE-2025-15276, CVE-2025-15277, CVE-2025-15278, CVE-2025-15280. Amazon Linux has analyzed these CVEs and found that they require user interaction to exploit (opening malicious font files). The upstream FontForge project has explicitly stated in their community guidelines that security issues related to untrusted input are not a priority and will not be fixed. FontForge is designed to work with trusted font files, and customers are advised to not use font files from untrusted sources. Due to the upstream project's security stance, their decision to defer fixes indefinitely, and the lack of accessible reproducers, Amazon Linux will not be providing fixes at this time.
|
2025-12-31 |
| CVE-2025-15272 |
FontForge SFD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of SFD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28547.
Amazon Linux will not provide fixes for: CVE-2025-15271, CVE-2025-15272, CVE-2025-15273, CVE-2025-15274, CVE-2025-15276, CVE-2025-15277, CVE-2025-15278, CVE-2025-15280. Amazon Linux has analyzed these CVEs and found that they require user interaction to exploit (opening malicious font files). The upstream FontForge project has explicitly stated in their community guidelines that security issues related to untrusted input are not a priority and will not be fixed. FontForge is designed to work with trusted font files, and customers are advised to not use font files from untrusted sources. Due to the upstream project's security stance, their decision to defer fixes indefinitely, and the lack of accessible reproducers, Amazon Linux will not be providing fixes at this time.
|
2025-12-31 |
| CVE-2025-69277 |
libsodium before ad3004e, in atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group.
|
2025-12-31 |
| CVE-2025-15270 |
FontForge SFD File Parsing Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of SFD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated array. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28563.
|
2025-12-31 |
| CVE-2025-15274 |
FontForge SFD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of SFD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28544.
Amazon Linux will not provide fixes for: CVE-2025-15271, CVE-2025-15272, CVE-2025-15273, CVE-2025-15274, CVE-2025-15276, CVE-2025-15277, CVE-2025-15278, CVE-2025-15280. Amazon Linux has analyzed these CVEs and found that they require user interaction to exploit (opening malicious font files). The upstream FontForge project has explicitly stated in their community guidelines that security issues related to untrusted input are not a priority and will not be fixed. FontForge is designed to work with trusted font files, and customers are advised to not use font files from untrusted sources. Due to the upstream project's security stance, their decision to defer fixes indefinitely, and the lack of accessible reproducers, Amazon Linux will not be providing fixes at this time.
|
2025-12-31 |
| CVE-2025-11961 |
pcap_ether_aton() is an auxiliary function in libpcap, it takes a string argument and returns a fixed-size allocated buffer. The string argument must be a well-formed MAC-48 address in one of the supported formats, but this requirement has been poorly documented. If an application calls the function with an argument that deviates from the expected format, the function can read data beyond the end of the provided string and write data beyond the end of the allocated buffer.
|
2025-12-31 |
| CVE-2025-15275 |
FontForge SFD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of SFD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28543.
|
2025-12-31 |
| CVE-2025-15278 |
FontForge GUtils XBM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of pixels within XBM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27865.
Amazon Linux will not provide fixes for: CVE-2025-15271, CVE-2025-15272, CVE-2025-15273, CVE-2025-15274, CVE-2025-15276, CVE-2025-15277, CVE-2025-15278, CVE-2025-15280. Amazon Linux has analyzed these CVEs and found that they require user interaction to exploit (opening malicious font files). The upstream FontForge project has explicitly stated in their community guidelines that security issues related to untrusted input are not a priority and will not be fixed. FontForge is designed to work with trusted font files, and customers are advised to not use font files from untrusted sources. Due to the upstream project's security stance, their decision to defer fixes indefinitely, and the lack of accessible reproducers, Amazon Linux will not be providing fixes at this time.
|
2025-12-31 |
| CVE-2025-15273 |
FontForge PFB File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PFB files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28546.
Amazon Linux will not provide fixes for: CVE-2025-15271, CVE-2025-15272, CVE-2025-15273, CVE-2025-15274, CVE-2025-15276, CVE-2025-15277, CVE-2025-15278, CVE-2025-15280. Amazon Linux has analyzed these CVEs and found that they require user interaction to exploit (opening malicious font files). The upstream FontForge project has explicitly stated in their community guidelines that security issues related to untrusted input are not a priority and will not be fixed. FontForge is designed to work with trusted font files, and customers are advised to not use font files from untrusted sources. Due to the upstream project's security stance, their decision to defer fixes indefinitely, and the lack of accessible reproducers, Amazon Linux will not be providing fixes at this time.
|
2025-12-31 |
| CVE-2025-15279 |
FontForge GUtils BMP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of pixels within BMP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27517.
|
2025-12-31 |
| CVE-2025-15271 |
FontForge SFD File Parsing Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of SFD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated array. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28562.
Amazon Linux will not provide fixes for: CVE-2025-15271, CVE-2025-15272, CVE-2025-15273, CVE-2025-15274, CVE-2025-15276, CVE-2025-15277, CVE-2025-15278, CVE-2025-15280. Amazon Linux has analyzed these CVEs and found that they require user interaction to exploit (opening malicious font files). The upstream FontForge project has explicitly stated in their community guidelines that security issues related to untrusted input are not a priority and will not be fixed. FontForge is designed to work with trusted font files, and customers are advised to not use font files from untrusted sources. Due to the upstream project's security stance, their decision to defer fixes indefinitely, and the lack of accessible reproducers, Amazon Linux will not be providing fixes at this time.
|
2025-12-31 |
| CVE-2025-15277 |
FontForge GUtils SGI File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of scanlines within SGI files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27920.
Amazon Linux will not provide fixes for: CVE-2025-15271, CVE-2025-15272, CVE-2025-15273, CVE-2025-15274, CVE-2025-15276, CVE-2025-15277, CVE-2025-15278, CVE-2025-15280. Amazon Linux has analyzed these CVEs and found that they require user interaction to exploit (opening malicious font files). The upstream FontForge project has explicitly stated in their community guidelines that security issues related to untrusted input are not a priority and will not be fixed. FontForge is designed to work with trusted font files, and customers are advised to not use font files from untrusted sources. Due to the upstream project's security stance, their decision to defer fixes indefinitely, and the lack of accessible reproducers, Amazon Linux will not be providing fixes at this time.
|
2025-12-31 |
| CVE-2025-15269 |
FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28564.
|
2025-12-31 |
| CVE-2023-54240 |
In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: mtk_eth_soc: fix possible NULL pointer dereference in mtk_hwlro_get_fdir_all()
|
2025-12-30 |
| CVE-2022-50883 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Prevent decl_tag from being referenced in func_proto arg
|
2025-12-30 |
| CVE-2022-50832 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: wilc1000: fix potential memory leak in wilc_mac_xmit()
|
2025-12-30 |
| CVE-2022-50876 |
In the Linux kernel, the following vulnerability has been resolved:
usb: musb: Fix musb_gadget.c rxstate overflow bug
|
2025-12-30 |
| CVE-2023-54222 |
In the Linux kernel, the following vulnerability has been resolved:
hte: tegra-194: Fix off by one in tegra_hte_map_to_line_id()
|
2025-12-30 |
| CVE-2022-50839 |
In the Linux kernel, the following vulnerability has been resolved:
jbd2: fix potential buffer head reference count leak
|
2025-12-30 |
| CVE-2023-54319 |
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: at91-pio4: check return value of devm_kasprintf()
|
2025-12-30 |
| CVE-2023-54204 |
In the Linux kernel, the following vulnerability has been resolved:
mmc: sunplus: fix return value check of mmc_add_host()
|
2025-12-30 |
| CVE-2023-54246 |
In the Linux kernel, the following vulnerability has been resolved:
rcuscale: Move rcu_scale_writer() schedule_timeout_uninterruptible() to _idle()
|
2025-12-30 |
| CVE-2022-50819 |
In the Linux kernel, the following vulnerability has been resolved:
udmabuf: Set ubuf->sg = NULL if the creation of sg table fails
|
2025-12-30 |
| CVE-2023-54191 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7996: fix memory leak in mt7996_mcu_exit
|
2025-12-30 |
| CVE-2023-54277 |
In the Linux kernel, the following vulnerability has been resolved:
fbdev: udlfb: Fix endpoint check
|
2025-12-30 |
| CVE-2023-54288 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: fortify the spinlock against deadlock by interrupt
|
2025-12-30 |
| CVE-2022-50817 |
In the Linux kernel, the following vulnerability has been resolved:
net: hsr: avoid possible NULL deref in skb_clone()
|
2025-12-30 |
| CVE-2022-50884 |
In the Linux kernel, the following vulnerability has been resolved:
drm: Prevent drm_copy_field() to attempt copying a NULL pointer
|
2025-12-30 |
| CVE-2023-54300 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx
|
2025-12-30 |
| CVE-2022-50824 |
In the Linux kernel, the following vulnerability has been resolved:
tpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak
|
2025-12-30 |
| CVE-2023-54310 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: message: mptlan: Fix use after free bug in mptlan_remove() due to race condition
|
2025-12-30 |
| CVE-2023-54305 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: refuse to create ea block when umounted
|
2025-12-30 |
| CVE-2023-54278 |
In the Linux kernel, the following vulnerability has been resolved:
s390/vmem: split pages when debug pagealloc is enabled
|
2025-12-30 |
| CVE-2022-50878 |
In the Linux kernel, the following vulnerability has been resolved:
gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init()
|
2025-12-30 |
| CVE-2023-54237 |
In the Linux kernel, the following vulnerability has been resolved:
net/smc: fix potential panic dues to unprotected smc_llc_srv_add_link()
|
2025-12-30 |
| CVE-2023-54197 |
In the Linux kernel, the following vulnerability has been resolved:
Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work"
|
2025-12-30 |
| CVE-2022-50843 |
In the Linux kernel, the following vulnerability has been resolved:
dm clone: Fix UAF in clone_dtr()
|
2025-12-30 |
| CVE-2023-54264 |
In the Linux kernel, the following vulnerability has been resolved:
fs/sysv: Null check to prevent null-ptr-deref bug
|
2025-12-30 |
| CVE-2023-54302 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/irdma: Fix data race on CQP completion stats
|
2025-12-30 |
| CVE-2023-54196 |
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Fix NULL pointer dereference in 'ni_write_inode'
|
2025-12-30 |
| CVE-2023-54262 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Don't clone flow post action attributes second time
|
2025-12-30 |
| CVE-2023-54311 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix deadlock when converting an inline directory in nojournal mode
|
2025-12-30 |
| CVE-2023-54260 |
In the Linux kernel, the following vulnerability has been resolved:
cifs: Fix lost destroy smbd connection when MR allocate failed
|
2025-12-30 |
| CVE-2023-54253 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: set page extent mapped after read_folio in relocate_one_page
|
2025-12-30 |
| CVE-2023-54326 |
In the Linux kernel, the following vulnerability has been resolved:
misc: pci_endpoint_test: Free IRQs before removing the device
|
2025-12-30 |
| CVE-2023-54172 |
In the Linux kernel, the following vulnerability has been resolved:
x86/hyperv: Disable IBT when hypercall page lacks ENDBR instruction
|
2025-12-30 |
| CVE-2023-54308 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: ymfpci: Create card with device-managed snd_devm_card_new()
|
2025-12-30 |
| CVE-2022-50834 |
In the Linux kernel, the following vulnerability has been resolved:
nfc: Fix potential resource leaks
|
2025-12-30 |
| CVE-2023-54282 |
In the Linux kernel, the following vulnerability has been resolved:
media: tuners: qt1010: replace BUG_ON with a regular error
|
2025-12-30 |
| CVE-2023-54245 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: codecs: tx-macro: Fix for KASAN: slab-out-of-bounds
|
2025-12-30 |
| CVE-2022-50855 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: prevent leak of lsm program after failed attach
|
2025-12-30 |
| CVE-2023-54176 |
In the Linux kernel, the following vulnerability has been resolved:
mptcp: stricter state check in mptcp_worker
|
2025-12-30 |
| CVE-2023-54314 |
In the Linux kernel, the following vulnerability has been resolved:
media: af9005: Fix null-ptr-deref in af9005_i2c_xfer
|
2025-12-30 |
| CVE-2023-54194 |
In the Linux kernel, the following vulnerability has been resolved:
exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree
|
2025-12-30 |
| CVE-2022-50847 |
In the Linux kernel, the following vulnerability has been resolved:
drm/bridge: it6505: Initialize AUX channel in it6505_i2c_probe
|
2025-12-30 |
| CVE-2023-54187 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix potential corruption when moving a directory
|
2025-12-30 |
| CVE-2022-50851 |
In the Linux kernel, the following vulnerability has been resolved:
vhost_vdpa: fix the crash in unmap a large memory
|
2025-12-30 |
| CVE-2023-54171 |
In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix memory leak of iter->temp when reading trace_pipe
|
2025-12-30 |
| CVE-2023-54182 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to check readonly condition correctly
|
2025-12-30 |
| CVE-2023-54230 |
In the Linux kernel, the following vulnerability has been resolved:
amba: bus: fix refcount leak
|
2025-12-30 |
| CVE-2022-50826 |
In the Linux kernel, the following vulnerability has been resolved:
ipu3-imgu: Fix NULL pointer dereference in imgu_subdev_set_selection()
|
2025-12-30 |
| CVE-2023-54218 |
In the Linux kernel, the following vulnerability has been resolved:
net: Fix load-tearing on sk->sk_stamp in sock_recv_cmsgs().
|
2025-12-30 |
| CVE-2023-54320 |
In the Linux kernel, the following vulnerability has been resolved:
platform/x86/amd: pmc: Fix memory leak in amd_pmc_stb_debugfs_open_v2()
|
2025-12-30 |
| CVE-2022-50825 |
In the Linux kernel, the following vulnerability has been resolved:
usb: typec: wusb3801: fix fwnode refcount leak in wusb3801_probe()
|
2025-12-30 |
| CVE-2023-54307 |
In the Linux kernel, the following vulnerability has been resolved:
ptp_qoriq: fix memory leak in probe()
|
2025-12-30 |
| CVE-2023-54206 |
In the Linux kernel, the following vulnerability has been resolved:
net/sched: flower: fix filter idr initialization
|
2025-12-30 |
| CVE-2023-54190 |
In the Linux kernel, the following vulnerability has been resolved:
leds: led-core: Fix refcount leak in of_led_get()
|
2025-12-30 |
| CVE-2023-54178 |
In the Linux kernel, the following vulnerability has been resolved:
of: unittest: fix null pointer dereferencing in of_unittest_find_node_by_name()
|
2025-12-30 |
| CVE-2023-54195 |
In the Linux kernel, the following vulnerability has been resolved:
rxrpc: Fix timeout of a call that hasn't yet been granted a channel
|
2025-12-30 |
| CVE-2023-54239 |
In the Linux kernel, the following vulnerability has been resolved:
iommufd: Check for uptr overflow
|
2025-12-30 |
| CVE-2023-54208 |
In the Linux kernel, the following vulnerability has been resolved:
media: ov5675: Fix memleak in ov5675_init_controls()
|
2025-12-30 |
| CVE-2022-50811 |
In the Linux kernel, the following vulnerability has been resolved:
erofs: fix missing unmap if z_erofs_get_extent_compressedlen() fails
|
2025-12-30 |
| CVE-2023-54309 |
In the Linux kernel, the following vulnerability has been resolved:
tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation
|
2025-12-30 |
| CVE-2022-50887 |
In the Linux kernel, the following vulnerability has been resolved:
regulator: core: fix unbalanced of node refcount in regulator_dev_lookup()
|
2025-12-30 |
| CVE-2022-50846 |
In the Linux kernel, the following vulnerability has been resolved:
mmc: via-sdmmc: fix return value check of mmc_add_host()
|
2025-12-30 |
| CVE-2023-54241 |
In the Linux kernel, the following vulnerability has been resolved:
MIPS: KVM: Fix NULL pointer dereference
|
2025-12-30 |
| CVE-2022-50858 |
In the Linux kernel, the following vulnerability has been resolved:
mmc: alcor: fix return value check of mmc_add_host()
|
2025-12-30 |
| CVE-2022-50862 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: prevent decl_tag from being referenced in func_proto
|
2025-12-30 |
| CVE-2023-54202 |
In the Linux kernel, the following vulnerability has been resolved:
drm/i915: fix race condition UAF in i915_perf_add_config_ioctl
|
2025-12-30 |
| CVE-2023-54286 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace
|
2025-12-30 |
| CVE-2023-54210 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_remove_adv_monitor()
|
2025-12-30 |
| CVE-2022-50853 |
In the Linux kernel, the following vulnerability has been resolved:
NFSv4: Fix a credential leak in _nfs4_discover_trunking()
|
2025-12-30 |
| CVE-2023-54324 |
In the Linux kernel, the following vulnerability has been resolved:
dm: fix a race condition in retrieve_deps
|
2025-12-30 |
| CVE-2023-54265 |
In the Linux kernel, the following vulnerability has been resolved:
ipv6: Fix an uninit variable access bug in __ip6_make_skb()
|
2025-12-30 |
| CVE-2023-54216 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: TC, Fix using eswitch mapping in nic mode
|
2025-12-30 |
| CVE-2022-50860 |
In the Linux kernel, the following vulnerability has been resolved:
apparmor: Fix memleak in alloc_ns()
|
2025-12-30 |
| CVE-2022-50852 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7921: fix use after free in mt7921_acpi_read()
|
2025-12-30 |
| CVE-2022-50842 |
In the Linux kernel, the following vulnerability has been resolved:
drm/virtio: Check whether transferred 2D BO is shmem
|
2025-12-30 |
| CVE-2023-54321 |
In the Linux kernel, the following vulnerability has been resolved:
driver core: fix potential null-ptr-deref in device_add()
|
2025-12-30 |
| CVE-2022-50828 |
In the Linux kernel, the following vulnerability has been resolved:
clk: zynqmp: Fix stack-out-of-bounds in strncpy`
|
2025-12-30 |
| CVE-2023-54225 |
In the Linux kernel, the following vulnerability has been resolved:
net: ipa: only reset hashed tables when supported
|
2025-12-30 |
| CVE-2022-50840 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: snic: Fix possible UAF in snic_tgt_create()
|
2025-12-30 |
| CVE-2022-50849 |
In the Linux kernel, the following vulnerability has been resolved:
pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP
|
2025-12-30 |
| CVE-2023-54169 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: fix memory leak in mlx5e_ptp_open
|
2025-12-30 |
| CVE-2023-54252 |
In the Linux kernel, the following vulnerability has been resolved:
platform/x86: think-lmi: Fix memory leaks when parsing ThinkStation WMI strings
|
2025-12-30 |
| CVE-2023-54193 |
In the Linux kernel, the following vulnerability has been resolved:
net/sched: cls_api: remove block_cb from driver_list before freeing
|
2025-12-30 |
| CVE-2023-54233 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: SOF: avoid a NULL dereference with unsupported widgets
|
2025-12-30 |
| CVE-2023-54192 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix null pointer panic in tracepoint in __replace_atomic_write_block
|
2025-12-30 |
| CVE-2023-54296 |
In the Linux kernel, the following vulnerability has been resolved:
KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration
|
2025-12-30 |
| CVE-2023-54298 |
In the Linux kernel, the following vulnerability has been resolved:
thermal: intel: quark_dts: fix error pointer dereference
|
2025-12-30 |
| CVE-2023-54284 |
In the Linux kernel, the following vulnerability has been resolved:
media: av7110: prevent underflow in write_ts_to_decoder()
|
2025-12-30 |
| CVE-2023-54179 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Array index may go out of bound
|
2025-12-30 |
| CVE-2023-54269 |
In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: double free xprt_ctxt while still in use
|
2025-12-30 |
| CVE-2022-50786 |
In the Linux kernel, the following vulnerability has been resolved:
media: s5p-mfc: Clear workbit to handle error condition
|
2025-12-30 |
| CVE-2022-50815 |
In the Linux kernel, the following vulnerability has been resolved:
ext2: Add sanity checks for group and filesystem size
|
2025-12-30 |
| CVE-2023-54266 |
In the Linux kernel, the following vulnerability has been resolved:
media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer()
|
2025-12-30 |
| CVE-2023-54268 |
In the Linux kernel, the following vulnerability has been resolved:
debugobjects: Don't wake up kswapd from fill_pool()
|
2025-12-30 |
| CVE-2022-50827 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: lpfc: Fix memory leak in lpfc_create_port()
|
2025-12-30 |
| CVE-2022-50809 |
In the Linux kernel, the following vulnerability has been resolved:
xhci: dbc: Fix memory leak in xhci_alloc_dbc()
|
2025-12-30 |
| CVE-2022-50812 |
In the Linux kernel, the following vulnerability has been resolved:
security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6
|
2025-12-30 |
| CVE-2022-50856 |
In the Linux kernel, the following vulnerability has been resolved:
cifs: Fix xid leak in cifs_ses_add_channel()
|
2025-12-30 |
| CVE-2023-54257 |
In the Linux kernel, the following vulnerability has been resolved:
net: macb: fix a memory corruption in extended buffer descriptor mode
|
2025-12-30 |
| CVE-2023-54267 |
In the Linux kernel, the following vulnerability has been resolved:
powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT
|
2025-12-30 |
| CVE-2022-50867 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/a6xx: Fix kvzalloc vs state_kcalloc usage
|
2025-12-30 |
| CVE-2023-54173 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Disable preemption in bpf_event_output
|
2025-12-30 |
| CVE-2023-54244 |
In the Linux kernel, the following vulnerability has been resolved:
ACPI: EC: Fix oops when removing custom query handlers
|
2025-12-30 |
| CVE-2023-54276 |
In the Linux kernel, the following vulnerability has been resolved:
nfsd: move init of percpu reply_cache_stats counters back to nfsd_init_net
|
2025-12-30 |
| CVE-2023-54219 |
In the Linux kernel, the following vulnerability has been resolved:
Revert "IB/isert: Fix incorrect release of isert connection"
|
2025-12-30 |
| CVE-2023-54177 |
In the Linux kernel, the following vulnerability has been resolved:
quota: fix warning in dqgrab()
|
2025-12-30 |
| CVE-2022-50873 |
In the Linux kernel, the following vulnerability has been resolved:
vdpa/vp_vdpa: fix kfree a wrong pointer in vp_vdpa_remove
|
2025-12-30 |
| CVE-2023-54227 |
In the Linux kernel, the following vulnerability has been resolved:
blk-mq: fix tags leak when shrink nr_hw_queues
|
2025-12-30 |
| CVE-2022-50844 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix type of second parameter in odn_edit_dpm_table() callback
|
2025-12-30 |
| CVE-2023-54214 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: L2CAP: Fix potential user-after-free
|
2025-12-30 |
| CVE-2023-54170 |
In the Linux kernel, the following vulnerability has been resolved:
keys: Fix linking a duplicate key to a keyring's assoc_array
|
2025-12-30 |
| CVE-2022-50836 |
In the Linux kernel, the following vulnerability has been resolved:
remoteproc: sysmon: fix memory leak in qcom_add_sysmon_subdev()
|
2025-12-30 |
| CVE-2025-61594 |
URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. Versions 0.12.5, 0.13.3, and 1.0.4 fix the issue.
|
2025-12-30 |
| CVE-2022-50859 |
In the Linux kernel, the following vulnerability has been resolved:
cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message
|
2025-12-30 |
| CVE-2023-54258 |
In the Linux kernel, the following vulnerability has been resolved:
cifs: fix potential oops in cifs_oplock_break
|
2025-12-30 |
| CVE-2023-54301 |
In the Linux kernel, the following vulnerability has been resolved:
serial: 8250_bcm7271: fix leak in `brcmuart_probe`
|
2025-12-30 |
| CVE-2023-54201 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/efa: Fix wrong resources deallocation order
|
2025-12-30 |
| CVE-2022-50868 |
In the Linux kernel, the following vulnerability has been resolved:
hwrng: amd - Fix PCI device refcount leak
|
2025-12-30 |
| CVE-2023-54291 |
In the Linux kernel, the following vulnerability has been resolved:
vduse: fix NULL pointer dereference
|
2025-12-30 |
| CVE-2022-50866 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: pxa: fix null-pointer dereference in filter()
|
2025-12-30 |
| CVE-2023-54289 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: qedf: Fix NULL dereference in error handling
|
2025-12-30 |
| CVE-2023-54235 |
In the Linux kernel, the following vulnerability has been resolved:
PCI/DOE: Fix destroy_work_on_stack() race
|
2025-12-30 |
| CVE-2023-54226 |
In the Linux kernel, the following vulnerability has been resolved:
af_unix: Fix data races around sk->sk_shutdown.
|
2025-12-30 |
| CVE-2022-50877 |
In the Linux kernel, the following vulnerability has been resolved:
net: broadcom: bcm4908_enet: update TX stats after actual transmission
|
2025-12-30 |
| CVE-2022-50850 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: ipr: Fix WARNING in ipr_init()
|
2025-12-30 |
| CVE-2023-54287 |
In the Linux kernel, the following vulnerability has been resolved:
tty: serial: imx: disable Ageing Timer interrupt request irq
|
2025-12-30 |
| CVE-2023-54200 |
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: always release netdev hooks from notifier
|
2025-12-30 |
| CVE-2023-54297 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: zoned: fix memory leak after finding block group with super blocks
|
2025-12-30 |
| CVE-2023-54217 |
In the Linux kernel, the following vulnerability has been resolved:
Revert "drm/msm: Add missing check and destroy for alloc_ordered_workqueue"
|
2025-12-30 |
| CVE-2022-50818 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: pm8001: Fix running_req for internal abort commands
|
2025-12-30 |
| CVE-2022-50820 |
In the Linux kernel, the following vulnerability has been resolved:
perf/arm_dmc620: Fix hotplug callback leak in dmc620_pmu_init()
|
2025-12-30 |
| CVE-2023-54209 |
In the Linux kernel, the following vulnerability has been resolved:
block: fix blktrace debugfs entries leakage
|
2025-12-30 |
| CVE-2022-50874 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/erdma: Fix refcount leak in erdma_mmap
|
2025-12-30 |
| CVE-2023-54221 |
In the Linux kernel, the following vulnerability has been resolved:
clk: imx93: fix memory leak and missing unwind goto in imx93_clocks_probe
|
2025-12-30 |
| CVE-2023-54181 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix issue in verifying allow_ptr_leaks
|
2025-12-30 |
| CVE-2023-54263 |
In the Linux kernel, the following vulnerability has been resolved:
drm/nouveau/kms/nv50-: init hpd_irq_lock for PIOR DP
|
2025-12-30 |
| CVE-2022-50879 |
In the Linux kernel, the following vulnerability has been resolved:
objtool: Fix SEGFAULT
|
2025-12-30 |
| CVE-2023-54323 |
In the Linux kernel, the following vulnerability has been resolved:
cxl/pmem: Fix nvdimm registration races
|
2025-12-30 |
| CVE-2023-54275 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup
|
2025-12-30 |
| CVE-2023-54280 |
In the Linux kernel, the following vulnerability has been resolved:
cifs: fix potential race when tree connecting ipc
|
2025-12-30 |
| CVE-2022-50848 |
In the Linux kernel, the following vulnerability has been resolved:
drivers: dio: fix possible memory leak in dio_init()
|
2025-12-30 |
| CVE-2023-54281 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: release path before inode lookup during the ino lookup ioctl
|
2025-12-30 |
| CVE-2022-50841 |
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Add overflow check for attribute size
|
2025-12-30 |
| CVE-2023-54199 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup()
|
2025-12-30 |
| CVE-2025-69204 |
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-12, in the WriteSVGImage function, using an int variable to store number_attributes caused an integer overflow. This, in turn, triggered a buffer overflow and caused a DoS attack. Version 7.1.2-12 fixes the issue.
|
2025-12-30 |
| CVE-2023-54273 |
In the Linux kernel, the following vulnerability has been resolved:
xfrm: Fix leak of dev tracker
|
2025-12-30 |
| CVE-2022-50854 |
In the Linux kernel, the following vulnerability has been resolved:
nfc: virtual_ncidev: Fix memory leak in virtual_nci_send()
|
2025-12-30 |
| CVE-2023-54303 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Disable preemption in bpf_perf_event_output
|
2025-12-30 |
| CVE-2023-54312 |
In the Linux kernel, the following vulnerability has been resolved:
samples/bpf: Fix buffer overflow in tcp_basertt
|
2025-12-30 |
| CVE-2022-50875 |
In the Linux kernel, the following vulnerability has been resolved:
of: overlay: fix null pointer dereferencing in find_dup_cset_node_entry() and find_dup_cset_prop()
|
2025-12-30 |
| CVE-2023-54270 |
In the Linux kernel, the following vulnerability has been resolved:
media: usb: siano: Fix use after free bugs caused by do_submit_urb
|
2025-12-30 |
| CVE-2023-54238 |
In the Linux kernel, the following vulnerability has been resolved:
mlx5: fix skb leak while fifo resync and push
|
2025-12-30 |
| CVE-2023-54183 |
In the Linux kernel, the following vulnerability has been resolved:
media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link()
|
2025-12-30 |
| CVE-2023-54259 |
In the Linux kernel, the following vulnerability has been resolved:
soundwire: bus: Fix unbalanced pm_runtime_put() causing usage count underflow
|
2025-12-30 |
| CVE-2023-54234 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: mpi3mr: Fix missing mrioc->evtack_cmds initialization
|
2025-12-30 |
| CVE-2022-50835 |
In the Linux kernel, the following vulnerability has been resolved:
jbd2: add miss release buffer head in fc_do_one_pass()
|
2025-12-30 |
| CVE-2025-68618 |
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-12, using Magick to read a malicious SVG file resulted in a DoS attack. Version 7.1.2-12 fixes the issue.
|
2025-12-30 |
| CVE-2023-54317 |
In the Linux kernel, the following vulnerability has been resolved:
dm flakey: don't corrupt the zero page
|
2025-12-30 |
| CVE-2022-50881 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect()
|
2025-12-30 |
| CVE-2023-54167 |
In the Linux kernel, the following vulnerability has been resolved:
m68k: mm: Move initrd phys_to_virt handling after paging_init()
|
2025-12-30 |
| CVE-2022-50888 |
In the Linux kernel, the following vulnerability has been resolved:
remoteproc: qcom: q6v5: Fix potential null-ptr-deref in q6v5_wcss_init_mmio()
|
2025-12-30 |
| CVE-2023-54184 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: target: iscsit: Free cmds before session free
|
2025-12-30 |
| CVE-2022-50861 |
In the Linux kernel, the following vulnerability has been resolved:
NFSD: Finish converting the NFSv2 GETACL result encoder
|
2025-12-30 |
| CVE-2023-54189 |
In the Linux kernel, the following vulnerability has been resolved:
pstore/ram: Add check for kstrdup
|
2025-12-30 |
| CVE-2023-54249 |
In the Linux kernel, the following vulnerability has been resolved:
bus: mhi: ep: Only send -ENOTCONN status if client driver is available
|
2025-12-30 |
| CVE-2022-50823 |
In the Linux kernel, the following vulnerability has been resolved:
clk: tegra: Fix refcount leak in tegra114_clock_init
|
2025-12-30 |
| CVE-2023-54325 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: qat - fix out-of-bounds read
|
2025-12-30 |
| CVE-2022-50870 |
In the Linux kernel, the following vulnerability has been resolved:
powerpc/rtas: avoid device tree lookups in rtas_os_term()
|
2025-12-30 |
| CVE-2022-50880 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state()
|
2025-12-30 |
| CVE-2023-54186 |
In the Linux kernel, the following vulnerability has been resolved:
usb: typec: altmodes/displayport: fix pin_assignment_show
|
2025-12-30 |
| CVE-2023-54205 |
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain
|
2025-12-30 |
| CVE-2023-54292 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/irdma: Fix data race on CQP request done
|
2025-12-30 |
| CVE-2023-54236 |
In the Linux kernel, the following vulnerability has been resolved:
net/net_failover: fix txq exceeding warning
|
2025-12-30 |
| CVE-2023-54224 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix lockdep splat and potential deadlock after failure running delayed items
|
2025-12-30 |
| CVE-2023-54271 |
In the Linux kernel, the following vulnerability has been resolved:
blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init
|
2025-12-30 |
| CVE-2023-54247 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Silence a warning in btf_type_id_size()
|
2025-12-30 |
| CVE-2023-54188 |
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: apple-admac: Fix 'current_tx' not getting freed
|
2025-12-30 |
| CVE-2022-50886 |
In the Linux kernel, the following vulnerability has been resolved:
mmc: toshsd: fix return value check of mmc_add_host()
|
2025-12-30 |
| CVE-2022-50822 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/restrack: Release MR restrack when delete
|
2025-12-30 |
| CVE-2022-50833 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: use hdev->workqueue when queuing hdev->{cmd,ncmd}_timer works
|
2025-12-30 |
| CVE-2023-54165 |
In the Linux kernel, the following vulnerability has been resolved:
zsmalloc: move LRU update from zs_map_object() to zs_malloc()
|
2025-12-30 |
| CVE-2023-54254 |
In the Linux kernel, the following vulnerability has been resolved:
drm/ttm: Don't leak a resource on eviction error
|
2025-12-30 |
| CVE-2023-54162 |
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix possible memory leak in smb2_lock()
|
2025-12-30 |
| CVE-2023-54211 |
In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix warning in trace_buffered_event_disable()
|
2025-12-30 |
| CVE-2023-54318 |
In the Linux kernel, the following vulnerability has been resolved:
net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add
|
2025-12-30 |
| CVE-2023-54322 |
In the Linux kernel, the following vulnerability has been resolved:
arm64: set __exception_irq_entry with __irq_entry as a default
|
2025-12-30 |
| CVE-2022-50838 |
In the Linux kernel, the following vulnerability has been resolved:
net: stream: purge sk_error_queue in sk_stream_kill_queues()
|
2025-12-30 |
| CVE-2022-50814 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr
|
2025-12-30 |
| CVE-2023-54229 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: fix registration of 6Ghz-only phy without the full channel range
|
2025-12-30 |
| CVE-2022-50857 |
In the Linux kernel, the following vulnerability has been resolved:
rapidio: rio: fix possible name leak in rio_register_mport()
|
2025-12-30 |
| CVE-2023-54232 |
In the Linux kernel, the following vulnerability has been resolved:
m68k: Only force 030 bus error if PC not in exception table
|
2025-12-30 |
| CVE-2023-54316 |
In the Linux kernel, the following vulnerability has been resolved:
refscale: Fix uninitalized use of wait_queue_head_t
|
2025-12-30 |
| CVE-2022-50785 |
In the Linux kernel, the following vulnerability has been resolved:
fsi: occ: Prevent use after free
|
2025-12-30 |
| CVE-2022-50872 |
In the Linux kernel, the following vulnerability has been resolved:
ARM: OMAP2+: Fix memory leak in realtime_counter_init()
|
2025-12-30 |
| CVE-2023-54274 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/srpt: Add a check for valid 'mad_agent' pointer
|
2025-12-30 |
| CVE-2025-68950 |
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-12, Magick fails to check for circular references between two MVGs, leading to a stack overflow. This is a DoS vulnerability, and any situation that allows reading the mvg file will be affected. Version 7.1.2-12 fixes the issue.
|
2025-12-30 |
| CVE-2023-54299 |
In the Linux kernel, the following vulnerability has been resolved:
usb: typec: bus: verify partner exists in typec_altmode_attention
|
2025-12-30 |
| CVE-2022-50889 |
In the Linux kernel, the following vulnerability has been resolved:
dm integrity: Fix UAF in dm_integrity_dtr()
|
2025-12-30 |
| CVE-2025-67746 |
Composer is a dependency manager for PHP. In versions on the 2.x branch prior to 2.2.26 and 2.9.3, attackers controlling remote sources that Composer downloads from might in some way inject ANSI control characters in the terminal output of various Composer commands, causing mangled output and potentially leading to confusion or DoS of the terminal application. There is no proven exploit and this has thus a low severity but we still publish a CVE as it has potential for abuse, and we want to be on the safe side informing users that they should upgrade. Versions 2.2.26 and 2.9.3 contain a patch for the issue.
|
2025-12-30 |
| CVE-2022-50882 |
In the Linux kernel, the following vulnerability has been resolved:
media: uvcvideo: Fix memory leak in uvc_gpio_parse
|
2025-12-30 |
| CVE-2023-54279 |
In the Linux kernel, the following vulnerability has been resolved:
MIPS: fw: Allow firmware to pass a empty env
|
2025-12-30 |
| CVE-2022-50837 |
In the Linux kernel, the following vulnerability has been resolved:
net: dsa: tag_8021q: avoid leaking ctx on dsa_tag_8021q_register() error path
|
2025-12-30 |
| CVE-2023-54261 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Add missing gfx11 MQD manager callbacks
|
2025-12-30 |
| CVE-2023-54315 |
In the Linux kernel, the following vulnerability has been resolved:
powerpc/powernv/sriov: perform null check on iov before dereferencing iov
|
2025-12-30 |
| CVE-2022-50885 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/rxe: Fix NULL-ptr-deref in rxe_qp_do_cleanup() when socket create failed
|
2025-12-30 |
| CVE-2023-54242 |
In the Linux kernel, the following vulnerability has been resolved:
block, bfq: Fix division by zero error on zero wsum
|
2025-12-30 |
| CVE-2022-50798 |
SoX 14.4.2 contains a division by zero vulnerability when handling WAV files that can cause program crashes. Attackers can trigger a floating point exception by providing a specially crafted WAV file that causes arithmetic errors during sound file processing.
|
2025-12-30 |
| CVE-2023-54198 |
In the Linux kernel, the following vulnerability has been resolved:
tty: fix out-of-bounds access in tty_driver_lookup_tty()
|
2025-12-30 |
| CVE-2022-50784 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: mei: fix potential NULL-ptr deref after clone
|
2025-12-30 |
| CVE-2023-54294 |
In the Linux kernel, the following vulnerability has been resolved:
md/raid10: fix memleak of md thread
|
2025-12-30 |
| CVE-2022-50813 |
In the Linux kernel, the following vulnerability has been resolved:
drivers: mcb: fix resource leak in mcb_probe()
|
2025-12-30 |
| CVE-2023-54207 |
In the Linux kernel, the following vulnerability has been resolved:
HID: uclogic: Correct devm device reference for hidinput input_dev name
|
2025-12-30 |
| CVE-2022-50821 |
In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: Don't leak netobj memory when gss_read_proxy_verf() fails
|
2025-12-30 |
| CVE-2023-54215 |
In the Linux kernel, the following vulnerability has been resolved:
virtio-vdpa: Fix cpumask memory leak in virtio_vdpa_find_vqs()
|
2025-12-30 |
| CVE-2023-54166 |
In the Linux kernel, the following vulnerability has been resolved:
igc: Fix Kernel Panic during ndo_tx_timeout callback
|
2025-12-30 |
| CVE-2023-54228 |
In the Linux kernel, the following vulnerability has been resolved:
regulator: raa215300: Fix resource leak in case of error
|
2025-12-30 |
| CVE-2023-54174 |
In the Linux kernel, the following vulnerability has been resolved:
vfio: Fix NULL pointer dereference caused by uninitialized group->iommufd
|
2025-12-30 |
| CVE-2022-50869 |
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Fix slab-out-of-bounds in r_page
|
2025-12-30 |
| CVE-2023-54223 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: xsk: Fix invalid buffer access for legacy rq
|
2025-12-30 |
| CVE-2023-54295 |
In the Linux kernel, the following vulnerability has been resolved:
mtd: spi-nor: Fix shift-out-of-bounds in spi_nor_set_erase_type
|
2025-12-30 |
| CVE-2023-54248 |
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Add check for kmemdup
|
2025-12-30 |
| CVE-2022-50829 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath9k: hif_usb: Fix use-after-free in ath9k_hif_usb_reg_in_cb()
|
2025-12-30 |
| CVE-2022-50810 |
In the Linux kernel, the following vulnerability has been resolved:
rapidio: devices: fix missing put_device in mport_cdev_open
|
2025-12-30 |
| CVE-2023-54255 |
In the Linux kernel, the following vulnerability has been resolved:
sh: dma: Fix DMA channel offset calculation
|
2025-12-30 |
| CVE-2023-54304 |
In the Linux kernel, the following vulnerability has been resolved:
firmware: meson_sm: fix to avoid potential NULL pointer dereference
|
2025-12-30 |
| CVE-2023-54164 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: ISO: fix iso_conn related locking and validity issues
|
2025-12-30 |
| CVE-2023-54243 |
In the Linux kernel, the following vulnerability has been resolved:
netfilter: ebtables: fix table blob use-after-free
|
2025-12-30 |
| CVE-2023-54180 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: handle case when repair happens with dev-replace
|
2025-12-30 |
| CVE-2023-54285 |
In the Linux kernel, the following vulnerability has been resolved:
iomap: Fix possible overflow condition in iomap_write_delalloc_scan
|
2025-12-30 |
| CVE-2022-50830 |
In the Linux kernel, the following vulnerability has been resolved:
auxdisplay: hd44780: Fix potential memory leak in hd44780_remove()
|
2025-12-30 |
| CVE-2023-54220 |
In the Linux kernel, the following vulnerability has been resolved:
serial: 8250: Fix oops for port->pm on uart_change_pm()
|
2025-12-30 |
| CVE-2023-54272 |
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Fix a possible null-pointer dereference in ni_clear()
|
2025-12-30 |
| CVE-2023-54168 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/mlx4: Prevent shift wrapping in set_user_sq_size()
|
2025-12-30 |
| CVE-2022-50845 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix inode leak in ext4_xattr_inode_create() on an error path
|
2025-12-30 |
| CVE-2023-54293 |
In the Linux kernel, the following vulnerability has been resolved:
bcache: fixup btree_cache_wait list damage
|
2025-12-30 |
| CVE-2023-54250 |
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: avoid out of bounds access in decode_preauth_ctxt()
|
2025-12-30 |
| CVE-2022-50863 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw89: free unused skb to prevent memory leak
|
2025-12-30 |
| CVE-2022-50871 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: Fix qmi_msg_handler data structure initialization
|
2025-12-30 |
| CVE-2023-54175 |
In the Linux kernel, the following vulnerability has been resolved:
i2c: xiic: xiic_xfer(): Fix runtime PM leak on error path
|
2025-12-30 |
| CVE-2022-50864 |
In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix shift-out-of-bounds due to too large exponent of block size
|
2025-12-30 |
| CVE-2023-54213 |
In the Linux kernel, the following vulnerability has been resolved:
USB: sisusbvga: Add endpoint checks
|
2025-12-30 |
| CVE-2023-54313 |
In the Linux kernel, the following vulnerability has been resolved:
ovl: fix null pointer dereference in ovl_get_acl_rcu()
|
2025-12-30 |
| CVE-2023-54231 |
In the Linux kernel, the following vulnerability has been resolved:
net: libwx: fix memory leak in wx_setup_rx_resources
|
2025-12-30 |
| CVE-2023-54185 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: remove BUG_ON()'s in add_new_free_space()
|
2025-12-30 |
| CVE-2022-50865 |
In the Linux kernel, the following vulnerability has been resolved:
tcp: fix a signed-integer-overflow bug in tcp_add_backlog()
|
2025-12-30 |
| CVE-2022-50816 |
In the Linux kernel, the following vulnerability has been resolved:
ipv6: ensure sane device mtu in tunnels
|
2025-12-30 |
| CVE-2023-54306 |
In the Linux kernel, the following vulnerability has been resolved:
net: tls: avoid hanging tasks on the tx_lock
|
2025-12-30 |
| CVE-2023-54251 |
In the Linux kernel, the following vulnerability has been resolved:
net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX.
|
2025-12-30 |
| CVE-2023-54283 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Address KCSAN report on bpf_lru_list
|
2025-12-30 |
| CVE-2025-66865 |
An issue was discovered in function d_print_comp_inner in file cp-demangle.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.
|
2025-12-29 |
| CVE-2025-66861 |
An issue was discovered in function d_unqualified_name in file cp-demangle.c in BinUtils 2.26 allowing attackers to cause a denial of service via crafted PE file.
|
2025-12-29 |
| CVE-2025-66866 |
An issue was discovered in function d_abi_tags in file cp-demangle.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.
|
2025-12-29 |
| CVE-2025-66862 |
A buffer overflow vulnerability in function gnu_special in file cplus-dem.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.
|
2025-12-29 |
| CVE-2025-68431 |
libheif is an HEIF and AVIF file format decoder and encoder. Prior to version 1.21.0, a crafted HEIF that exercises the overlay image item path triggers a heap buffer over-read in `HeifPixelImage::overlay()`. The function computes a negative row length (likely from an unclipped overlay rectangle or invalid offsets), which then underflows when converted to `size_t` and is passed to `memcpy`, causing a very large read past the end of the source plane and a crash. Version 1.21.0 contains a patch. As a workaround, avoid decoding images using `iovl` overlay boxes.
|
2025-12-29 |
| CVE-2025-66864 |
An issue was discovered in function d_print_comp_inner in file cp-demangle.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.
|
2025-12-29 |
| CVE-2025-66863 |
An issue was discovered in function d_discriminator in file cp-demangle.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.
|
2025-12-29 |
| CVE-2025-68973 |
In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)
|
2025-12-28 |
| CVE-2025-68972 |
In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.
Exploitation of this vulnerability requires an attacker to obtain a legitimate signature on crafted content and trick users into trusting unsigned material displayed alongside signed content without properly verifying signed contents. There is no fix available from the GnuPG project. Users are advised to mitigate this issue by avoiding using cleartext signatures and always using “gpg —output“ to verify what content was actually signed.
|
2025-12-27 |
| CVE-2023-54015 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device
|
2025-12-24 |
| CVE-2023-54078 |
In the Linux kernel, the following vulnerability has been resolved:
media: max9286: Free control handler
|
2025-12-24 |
| CVE-2023-54098 |
In the Linux kernel, the following vulnerability has been resolved:
drm/i915/gvt: fix gvt debugfs destroy
|
2025-12-24 |
| CVE-2022-50765 |
In the Linux kernel, the following vulnerability has been resolved:
RISC-V: kexec: Fix memory leak of elf header buffer
|
2025-12-24 |
| CVE-2023-54071 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw88: use work to update rate to avoid RCU warning
|
2025-12-24 |
| CVE-2023-54088 |
In the Linux kernel, the following vulnerability has been resolved:
blk-cgroup: hold queue_lock when removing blkg->q_node
|
2025-12-24 |
| CVE-2022-50710 |
In the Linux kernel, the following vulnerability has been resolved:
ice: set tx_tstamps when creating new Tx rings via ethtool
|
2025-12-24 |
| CVE-2022-50767 |
In the Linux kernel, the following vulnerability has been resolved:
fbdev: smscufx: Fix several use-after-free bugs
|
2025-12-24 |
| CVE-2023-53996 |
In the Linux kernel, the following vulnerability has been resolved:
x86/sev: Make enc_dec_hypercall() accept a size instead of npages
|
2025-12-24 |
| CVE-2022-50722 |
In the Linux kernel, the following vulnerability has been resolved:
media: ipu3-imgu: Fix NULL pointer dereference in active selection access
|
2025-12-24 |
| CVE-2022-50752 |
In the Linux kernel, the following vulnerability has been resolved:
md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk()
|
2025-12-24 |
| CVE-2022-50698 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: da7219: Fix an error handling path in da7219_register_dai_clks()
|
2025-12-24 |
| CVE-2022-50737 |
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Validate index root when initialize NTFS security
|
2025-12-24 |
| CVE-2022-50714 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7921e: fix rmmod crash in driver reload test
|
2025-12-24 |
| CVE-2023-54153 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: turn quotas off if mount failed after enabling quotas
|
2025-12-24 |
| CVE-2025-68350 |
In the Linux kernel, the following vulnerability has been resolved:
exfat: fix divide-by-zero in exfat_allocate_bitmap
|
2025-12-24 |
| CVE-2022-50735 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: do not run mt76u_status_worker if the device is not running
|
2025-12-24 |
| CVE-2025-68366 |
In the Linux kernel, the following vulnerability has been resolved:
nbd: defer config unlock in nbd_genl_connect
|
2025-12-24 |
| CVE-2022-50712 |
In the Linux kernel, the following vulnerability has been resolved:
devlink: hold region lock when flushing snapshots
|
2025-12-24 |
| CVE-2025-68747 |
In the Linux kernel, the following vulnerability has been resolved:
drm/panthor: Fix UAF on kernel BO VA nodes
|
2025-12-24 |
| CVE-2023-54007 |
In the Linux kernel, the following vulnerability has been resolved:
vmci_host: fix a race condition in vmci_host_poll() causing GPF
|
2025-12-24 |
| CVE-2022-50719 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: line6: fix stack overflow in line6_midi_transmit
|
2025-12-24 |
| CVE-2023-54082 |
In the Linux kernel, the following vulnerability has been resolved:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
|
2025-12-24 |
| CVE-2022-50777 |
In the Linux kernel, the following vulnerability has been resolved:
net: phy: xgmiitorgmii: Fix refcount leak in xgmiitorgmii_probe
|
2025-12-24 |
| CVE-2023-54050 |
In the Linux kernel, the following vulnerability has been resolved:
ubifs: Fix memleak when insert_old_idx() failed
|
2025-12-24 |
| CVE-2023-54095 |
In the Linux kernel, the following vulnerability has been resolved:
powerpc/iommu: Fix notifiers being shared by PCI and VIO buses
|
2025-12-24 |
| CVE-2025-68749 |
In the Linux kernel, the following vulnerability has been resolved:
accel/ivpu: Fix race condition when unbinding BOs
|
2025-12-24 |
| CVE-2023-54128 |
In the Linux kernel, the following vulnerability has been resolved:
fs: drop peer group ids under namespace lock
|
2025-12-24 |
| CVE-2023-54034 |
In the Linux kernel, the following vulnerability has been resolved:
iommufd: Make sure to zero vfio_iommu_type1_info before copying to user
|
2025-12-24 |
| CVE-2023-53992 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: cfg80211: ocb: don't leave if not joined
|
2025-12-24 |
| CVE-2025-68352 |
In the Linux kernel, the following vulnerability has been resolved:
spi: ch341: fix out-of-bounds memory access in ch341_transfer_one
|
2025-12-24 |
| CVE-2025-68726 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: aead - Fix reqsize handling
|
2025-12-24 |
| CVE-2023-54091 |
In the Linux kernel, the following vulnerability has been resolved:
drm/client: Fix memory leak in drm_client_target_cloned
|
2025-12-24 |
| CVE-2023-54147 |
In the Linux kernel, the following vulnerability has been resolved:
media: platform: mtk-mdp3: Add missing check and free for ida_alloc
|
2025-12-24 |
| CVE-2023-54139 |
In the Linux kernel, the following vulnerability has been resolved:
tracing/user_events: Ensure write index cannot be negative
|
2025-12-24 |
| CVE-2022-50705 |
In the Linux kernel, the following vulnerability has been resolved:
io_uring/rw: defer fsnotify calls to task context
|
2025-12-24 |
| CVE-2025-68725 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Do not let BPF test infra emit invalid GSO types to stack
|
2025-12-24 |
| CVE-2023-54006 |
In the Linux kernel, the following vulnerability has been resolved:
af_unix: Fix data-race around unix_tot_inflight.
|
2025-12-24 |
| CVE-2022-50718 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: fix pci device refcount leak
|
2025-12-24 |
| CVE-2022-50734 |
In the Linux kernel, the following vulnerability has been resolved:
nvmem: core: Fix memleak in nvmem_register()
|
2025-12-24 |
| CVE-2025-68347 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events
|
2025-12-24 |
| CVE-2023-54084 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: firewire-digi00x: prevent potential use after free
|
2025-12-24 |
| CVE-2025-68351 |
In the Linux kernel, the following vulnerability has been resolved:
exfat: fix refcount leak in exfat_find
|
2025-12-24 |
| CVE-2025-68380 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: fix peer HE MCS assignment
|
2025-12-24 |
| CVE-2023-54111 |
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups
|
2025-12-24 |
| CVE-2023-53993 |
In the Linux kernel, the following vulnerability has been resolved:
PCI/DOE: Fix memory leak with CONFIG_DEBUG_OBJECTS=y
|
2025-12-24 |
| CVE-2022-50724 |
In the Linux kernel, the following vulnerability has been resolved:
regulator: core: fix resource leak in regulator_register()
|
2025-12-24 |
| CVE-2023-54160 |
In the Linux kernel, the following vulnerability has been resolved:
firmware: arm_sdei: Fix sleep from invalid context BUG
|
2025-12-24 |
| CVE-2023-54093 |
In the Linux kernel, the following vulnerability has been resolved:
media: anysee: fix null-ptr-deref in anysee_master_xfer
|
2025-12-24 |
| CVE-2022-50751 |
In the Linux kernel, the following vulnerability has been resolved:
configfs: fix possible memory leak in configfs_create_dir()
|
2025-12-24 |
| CVE-2025-68375 |
In the Linux kernel, the following vulnerability has been resolved:
perf/x86: Fix NULL event access and potential PEBS record loss
|
2025-12-24 |
| CVE-2023-53990 |
In the Linux kernel, the following vulnerability has been resolved:
SMB3: Add missing locks to protect deferred close file list
|
2025-12-24 |
| CVE-2022-50740 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath9k: hif_usb: fix memory leak of urbs in ath9k_hif_usb_dealloc_tx_urbs()
|
2025-12-24 |
| CVE-2023-54118 |
In the Linux kernel, the following vulnerability has been resolved:
serial: sc16is7xx: setup GPIO controller later in probe
|
2025-12-24 |
| CVE-2022-50711 |
In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: mtk_eth_soc: fix possible memory leak in mtk_probe()
|
2025-12-24 |
| CVE-2023-54135 |
In the Linux kernel, the following vulnerability has been resolved:
maple_tree: fix potential out-of-bounds access in mas_wr_end_piv()
|
2025-12-24 |
| CVE-2022-50697 |
In the Linux kernel, the following vulnerability has been resolved:
mrp: introduce active flags to prevent UAF when applicant uninit
|
2025-12-24 |
| CVE-2025-68372 |
In the Linux kernel, the following vulnerability has been resolved:
nbd: defer config put in recv_work
|
2025-12-24 |
| CVE-2023-54087 |
In the Linux kernel, the following vulnerability has been resolved:
ubi: Fix possible null-ptr-deref in ubi_free_volume()
|
2025-12-24 |
| CVE-2022-50727 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: efct: Fix possible memleak in efct_device_init()
|
2025-12-24 |
| CVE-2023-54000 |
In the Linux kernel, the following vulnerability has been resolved:
net: hns3: fix deadlock issue when externel_lb and reset are executed together
|
2025-12-24 |
| CVE-2023-54074 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Use correct encap attribute during invalidation
|
2025-12-24 |
| CVE-2023-54129 |
In the Linux kernel, the following vulnerability has been resolved:
octeontx2-af: Add validation for lmac type
|
2025-12-24 |
| CVE-2022-50713 |
In the Linux kernel, the following vulnerability has been resolved:
clk: visconti: Fix memory leak in visconti_register_pll()
|
2025-12-24 |
| CVE-2025-68732 |
In the Linux kernel, the following vulnerability has been resolved:
gpu: host1x: Fix race in syncpt alloc/free
|
2025-12-24 |
| CVE-2022-50769 |
In the Linux kernel, the following vulnerability has been resolved:
mmc: mxcmmc: fix return value check of mmc_add_host()
|
2025-12-24 |
| CVE-2025-68727 |
In the Linux kernel, the following vulnerability has been resolved:
ntfs3: Fix uninit buffer allocated by __getname()
|
2025-12-24 |
| CVE-2022-50779 |
In the Linux kernel, the following vulnerability has been resolved:
orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string()
|
2025-12-24 |
| CVE-2025-68359 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix double free of qgroup record after failure to add delayed ref head
|
2025-12-24 |
| CVE-2022-50732 |
In the Linux kernel, the following vulnerability has been resolved:
staging: rtl8192u: Fix use after free in ieee80211_rx()
|
2025-12-24 |
| CVE-2023-54025 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled
|
2025-12-24 |
| CVE-2023-54120 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: Fix race condition in hidp_session_thread
|
2025-12-24 |
| CVE-2023-54023 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix race between balance and cancel/pause
|
2025-12-24 |
| CVE-2022-50709 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg()
|
2025-12-24 |
| CVE-2022-50776 |
In the Linux kernel, the following vulnerability has been resolved:
clk: st: Fix memory leak in st_of_quadfs_setup()
|
2025-12-24 |
| CVE-2025-68376 |
In the Linux kernel, the following vulnerability has been resolved:
coresight: ETR: Fix ETR buffer use-after-free issue
|
2025-12-24 |
| CVE-2025-68369 |
In the Linux kernel, the following vulnerability has been resolved:
ntfs3: init run lock for extend inode
|
2025-12-24 |
| CVE-2025-68737 |
In the Linux kernel, the following vulnerability has been resolved:
arm64/pageattr: Propagate return value from __change_memory_common
|
2025-12-24 |
| CVE-2025-68734 |
In the Linux kernel, the following vulnerability has been resolved:
isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe()
|
2025-12-24 |
| CVE-2023-54114 |
In the Linux kernel, the following vulnerability has been resolved:
net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment()
|
2025-12-24 |
| CVE-2022-50744 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs
|
2025-12-24 |
| CVE-2023-54005 |
In the Linux kernel, the following vulnerability has been resolved:
binder: fix memory leak in binder_init()
|
2025-12-24 |
| CVE-2023-54133 |
In the Linux kernel, the following vulnerability has been resolved:
nfp: clean mc addresses in application firmware when closing port
|
2025-12-24 |
| CVE-2023-54016 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Fix memory leak in rx_desc and tx_desc
|
2025-12-24 |
| CVE-2023-54008 |
In the Linux kernel, the following vulnerability has been resolved:
virtio_vdpa: build affinity masks conditionally
|
2025-12-24 |
| CVE-2023-54032 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix race when deleting quota root from the dirty cow roots list
|
2025-12-24 |
| CVE-2023-53987 |
In the Linux kernel, the following vulnerability has been resolved:
ping: Fix potentail NULL deref for /proc/net/icmp.
|
2025-12-24 |
| CVE-2022-50738 |
In the Linux kernel, the following vulnerability has been resolved:
vhost-vdpa: fix an iotlb memory leak
|
2025-12-24 |
| CVE-2022-50741 |
In the Linux kernel, the following vulnerability has been resolved:
media: imx-jpeg: Disable useless interrupt to avoid kernel panic
|
2025-12-24 |
| CVE-2025-68355 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix exclusive map memory leak
|
2025-12-24 |
| CVE-2023-54039 |
In the Linux kernel, the following vulnerability has been resolved:
can: j1939: j1939_tp_tx_dat_new(): fix out-of-bounds memory access
|
2025-12-24 |
| CVE-2025-68730 |
In the Linux kernel, the following vulnerability has been resolved:
accel/ivpu: Fix page fault in ivpu_bo_unbind_all_bos_from_context()
|
2025-12-24 |
| CVE-2023-54149 |
In the Linux kernel, the following vulnerability has been resolved:
net: dsa: avoid suspicious RCU usage for synced VLAN-aware MAC addresses
|
2025-12-24 |
| CVE-2025-68367 |
In the Linux kernel, the following vulnerability has been resolved:
macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse
|
2025-12-24 |
| CVE-2023-54068 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: compress: fix to call f2fs_wait_on_page_writeback() in f2fs_write_raw_pages()
|
2025-12-24 |
| CVE-2025-68739 |
In the Linux kernel, the following vulnerability has been resolved:
PM / devfreq: hisi: Fix potential UAF in OPP handling
|
2025-12-24 |
| CVE-2023-54083 |
In the Linux kernel, the following vulnerability has been resolved:
phy: tegra: xusb: Clear the driver reference in usb-phy dev
|
2025-12-24 |
| CVE-2025-68356 |
In the Linux kernel, the following vulnerability has been resolved:
gfs2: Prevent recursive memory reclaim
|
2025-12-24 |
| CVE-2022-50704 |
In the Linux kernel, the following vulnerability has been resolved:
USB: gadget: Fix use-after-free during usb config switch
|
2025-12-24 |
| CVE-2022-50702 |
In the Linux kernel, the following vulnerability has been resolved:
vdpa_sim: fix possible memory leak in vdpasim_net_init() and vdpasim_blk_init()
|
2025-12-24 |
| CVE-2023-54126 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: safexcel - Cleanup ring IRQ workqueues on load failure
|
2025-12-24 |
| CVE-2023-54033 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: fix a memory leak in the LRU and LRU_PERCPU hash maps
|
2025-12-24 |
| CVE-2023-54080 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: zoned: skip splitting and logical rewriting on pre-alloc write
|
2025-12-24 |
| CVE-2023-54140 |
In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse
|
2025-12-24 |
| CVE-2023-54042 |
In the Linux kernel, the following vulnerability has been resolved:
powerpc/64s: Fix VAS mm use after free
|
2025-12-24 |
| CVE-2018-25154 |
GNU Barcode 0.99 contains a buffer overflow vulnerability in its code 93 encoding process that allows attackers to trigger memory corruption. Attackers can exploit boundary errors during input file processing to potentially execute arbitrary code on the affected system.
|
2025-12-24 |
| CVE-2022-50761 |
In the Linux kernel, the following vulnerability has been resolved:
x86/xen: Fix memory leak in xen_init_lock_cpu()
|
2025-12-24 |
| CVE-2025-68370 |
In the Linux kernel, the following vulnerability has been resolved:
coresight: tmc: add the handle of the event to the path
|
2025-12-24 |
| CVE-2023-54159 |
In the Linux kernel, the following vulnerability has been resolved:
usb: mtu3: fix kernel panic at qmu transfer done irq handler
|
2025-12-24 |
| CVE-2023-54085 |
In the Linux kernel, the following vulnerability has been resolved:
mptcp: fix NULL pointer dereference on fastopen early fallback
|
2025-12-24 |
| CVE-2023-54132 |
In the Linux kernel, the following vulnerability has been resolved:
erofs: stop parsing non-compact HEAD index if clusterofs is invalid
|
2025-12-24 |
| CVE-2022-50750 |
In the Linux kernel, the following vulnerability has been resolved:
drm/panel/panel-sitronix-st7701: Remove panel on DSI attach failure
|
2025-12-24 |
| CVE-2022-50763 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: marvell/octeontx - prevent integer overflows
|
2025-12-24 |
| CVE-2023-54019 |
In the Linux kernel, the following vulnerability has been resolved:
sched/psi: use kernfs polling functions for PSI trigger polling
|
2025-12-24 |
| CVE-2023-54024 |
In the Linux kernel, the following vulnerability has been resolved:
KVM: Destroy target device if coalesced MMIO unregistration fails
|
2025-12-24 |
| CVE-2025-68746 |
In the Linux kernel, the following vulnerability has been resolved:
spi: tegra210-quad: Fix timeout handling
|
2025-12-24 |
| CVE-2025-68368 |
In the Linux kernel, the following vulnerability has been resolved:
md: init bioset in mddev_init
|
2025-12-24 |
| CVE-2023-54090 |
In the Linux kernel, the following vulnerability has been resolved:
ixgbe: Fix panic during XDP_TX with > 64 CPUs
|
2025-12-24 |
| CVE-2022-50708 |
In the Linux kernel, the following vulnerability has been resolved:
HSI: ssi_protocol: fix potential resource leak in ssip_pn_open()
|
2025-12-24 |
| CVE-2023-54028 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task"
|
2025-12-24 |
| CVE-2023-54036 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: rtl8xxxu: Fix memory leaks with RTL8723BU, RTL8192EU
|
2025-12-24 |
| CVE-2025-68740 |
In the Linux kernel, the following vulnerability has been resolved:
ima: Handle error code returned by ima_filter_rule_match()
|
2025-12-24 |
| CVE-2023-54100 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: qedi: Fix use after free bug in qedi_remove()
|
2025-12-24 |
| CVE-2023-54144 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix kernel warning during topology setup
|
2025-12-24 |
| CVE-2023-54094 |
In the Linux kernel, the following vulnerability has been resolved:
net: prevent skb corruption on frag list segmentation
|
2025-12-24 |
| CVE-2022-50783 |
In the Linux kernel, the following vulnerability has been resolved:
mptcp: use proper req destructor for IPv6
|
2025-12-24 |
| CVE-2025-68348 |
In the Linux kernel, the following vulnerability has been resolved:
block: fix memory leak in __blkdev_issue_zero_pages
|
2025-12-24 |
| CVE-2025-68374 |
In the Linux kernel, the following vulnerability has been resolved:
md: fix rcu protection in md_wakeup_thread
|
2025-12-24 |
| CVE-2023-54110 |
In the Linux kernel, the following vulnerability has been resolved:
usb: rndis_host: Secure rndis_query check against int overflow
|
2025-12-24 |
| CVE-2023-54047 |
In the Linux kernel, the following vulnerability has been resolved:
drm/rockchip: dw_hdmi: cleanup drm encoder during unbind
|
2025-12-24 |
| CVE-2025-68378 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix stackmap overflow check in __bpf_get_stackid()
|
2025-12-24 |
| CVE-2023-54017 |
In the Linux kernel, the following vulnerability has been resolved:
powerpc/pseries: fix possible memory leak in ibmebus_bus_init()
|
2025-12-24 |
| CVE-2023-54049 |
In the Linux kernel, the following vulnerability has been resolved:
rpmsg: glink: Add check for kstrdup
|
2025-12-24 |
| CVE-2025-68349 |
In the Linux kernel, the following vulnerability has been resolved:
NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid
|
2025-12-24 |
| CVE-2023-54102 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow
|
2025-12-24 |
| CVE-2023-53989 |
In the Linux kernel, the following vulnerability has been resolved:
arm64: mm: fix VA-range sanity check
|
2025-12-24 |
| CVE-2023-54075 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: mediatek: common: Fix refcount leak in parse_dai_link_info
|
2025-12-24 |
| CVE-2022-50755 |
In the Linux kernel, the following vulnerability has been resolved:
udf: Avoid double brelse() in udf_rename()
|
2025-12-24 |
| CVE-2023-54041 |
In the Linux kernel, the following vulnerability has been resolved:
io_uring: fix memory leak when removing provided buffers
|
2025-12-24 |
| CVE-2023-54086 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Add preempt_count_{sub,add} into btf id deny list
|
2025-12-24 |
| CVE-2022-50762 |
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Avoid UBSAN error on true_sectors_per_clst()
|
2025-12-24 |
| CVE-2025-68354 |
In the Linux kernel, the following vulnerability has been resolved:
regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex
|
2025-12-24 |
| CVE-2023-54152 |
In the Linux kernel, the following vulnerability has been resolved:
can: j1939: prevent deadlock by moving j1939_sk_errqueue()
|
2025-12-24 |
| CVE-2023-54096 |
In the Linux kernel, the following vulnerability has been resolved:
soundwire: fix enumeration completion
|
2025-12-24 |
| CVE-2022-50772 |
In the Linux kernel, the following vulnerability has been resolved:
netdevsim: fix memory leak in nsim_bus_dev_new()
|
2025-12-24 |
| CVE-2023-54046 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: essiv - Handle EBUSY correctly
|
2025-12-24 |
| CVE-2023-54004 |
In the Linux kernel, the following vulnerability has been resolved:
udplite: Fix NULL pointer dereference in __sk_mem_raise_allocated().
|
2025-12-24 |
| CVE-2025-68742 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix invalid prog->stats access when update_effective_progs fails
|
2025-12-24 |
| CVE-2022-50716 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out
|
2025-12-24 |
| CVE-2023-54134 |
In the Linux kernel, the following vulnerability has been resolved:
autofs: fix memory leak of waitqueues in autofs_catatonic_mode
|
2025-12-24 |
| CVE-2022-50748 |
In the Linux kernel, the following vulnerability has been resolved:
ipc: mqueue: fix possible memory leak in init_mqueue_fs()
|
2025-12-24 |
| CVE-2023-54076 |
In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix missed ses refcounting
|
2025-12-24 |
| CVE-2022-50701 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7921s: fix slab-out-of-bounds access in sdio host
|
2025-12-24 |
| CVE-2023-54040 |
In the Linux kernel, the following vulnerability has been resolved:
ice: fix wrong fallback logic for FDIR
|
2025-12-24 |
| CVE-2022-50775 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/hns: Fix refcount leak in hns_roce_mmap
|
2025-12-24 |
| CVE-2025-68371 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: smartpqi: Fix device resources accessed after device removal
|
2025-12-24 |
| CVE-2023-54107 |
In the Linux kernel, the following vulnerability has been resolved:
blk-cgroup: dropping parent refcount after pd_free_fn() is done
|
2025-12-24 |
| CVE-2023-54055 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/irdma: Fix memory leak of PBLE objects
|
2025-12-24 |
| CVE-2025-68736 |
In the Linux kernel, the following vulnerability has been resolved:
landlock: Fix handling of disconnected directories
|
2025-12-24 |
| CVE-2023-53999 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: TC, Fix internal port memory leak
|
2025-12-24 |
| CVE-2023-54056 |
In the Linux kernel, the following vulnerability has been resolved:
kheaders: Use array declaration instead of char
|
2025-12-24 |
| CVE-2022-50782 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix bug_on in __es_tree_search caused by bad quota inode
|
2025-12-24 |
| CVE-2023-54009 |
In the Linux kernel, the following vulnerability has been resolved:
i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path
|
2025-12-24 |
| CVE-2023-54021 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: set goal start correctly in ext4_mb_normalize_request
|
2025-12-24 |
| CVE-2022-50700 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath10k: Delay the unmapping of the buffer
|
2025-12-24 |
| CVE-2023-54069 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix BUG in ext4_mb_new_inode_pa() due to overflow
|
2025-12-24 |
| CVE-2022-50717 |
In the Linux kernel, the following vulnerability has been resolved:
nvmet-tcp: add bounds check on Transfer Tag
|
2025-12-24 |
| CVE-2023-54048 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/bnxt_re: Prevent handling any completions after qp destroy
|
2025-12-24 |
| CVE-2023-54011 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: mpi3mr: Fix an issue found by KASAN
|
2025-12-24 |
| CVE-2023-54052 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7921: fix skb leak by txs missing in AMSDU
|
2025-12-24 |
| CVE-2023-54104 |
In the Linux kernel, the following vulnerability has been resolved:
mtd: rawnand: fsl_upm: Fix an off-by one test in fun_exec_op()
|
2025-12-24 |
| CVE-2023-54073 |
In the Linux kernel, the following vulnerability has been resolved:
tpm: Add !tpm_amd_is_rng_defective() to the hwrng_unregister() call site
|
2025-12-24 |
| CVE-2025-68744 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Free special fields when update [lru_,]percpu_hash maps
|
2025-12-24 |
| CVE-2022-50760 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix PCI device refcount leak in amdgpu_atrm_get_bios()
|
2025-12-24 |
| CVE-2025-68748 |
In the Linux kernel, the following vulnerability has been resolved:
drm/panthor: Fix UAF race between device unplug and FW event processing
|
2025-12-24 |
| CVE-2025-68365 |
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Initialize allocated memory before use
|
2025-12-24 |
| CVE-2023-54043 |
In the Linux kernel, the following vulnerability has been resolved:
iommufd: Do not add the same hwpt to the ioas->hwpt_list twice
|
2025-12-24 |
| CVE-2025-68729 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Fix MSDU buffer types handling in RX error path
|
2025-12-24 |
| CVE-2023-54146 |
In the Linux kernel, the following vulnerability has been resolved:
x86/kexec: Fix double-free of elf header buffer
|
2025-12-24 |
| CVE-2025-68377 |
In the Linux kernel, the following vulnerability has been resolved:
ns: initialize ns_list_node for initial namespaces
|
2025-12-24 |
| CVE-2023-54026 |
In the Linux kernel, the following vulnerability has been resolved:
opp: Fix use-after-free in lazy_opp_tables after probe deferral
|
2025-12-24 |
| CVE-2022-50743 |
In the Linux kernel, the following vulnerability has been resolved:
erofs: Fix pcluster memleak when its block address is zero
|
2025-12-24 |
| CVE-2023-54020 |
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: sf-pdma: pdma_desc memory leak fix
|
2025-12-24 |
| CVE-2023-54092 |
In the Linux kernel, the following vulnerability has been resolved:
KVM: s390: pv: fix index value of replaced ASCE
|
2025-12-24 |
| CVE-2023-54051 |
In the Linux kernel, the following vulnerability has been resolved:
net: do not allow gso_size to be set to GSO_BY_FRAGS
|
2025-12-24 |
| CVE-2023-54113 |
In the Linux kernel, the following vulnerability has been resolved:
rcu: dump vmalloc memory info safely
|
2025-12-24 |
| CVE-2022-50764 |
In the Linux kernel, the following vulnerability has been resolved:
ipv6/sit: use DEV_STATS_INC() to avoid data-races
|
2025-12-24 |
| CVE-2022-50736 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/siw: Fix immediate work request flush to completion queue
|
2025-12-24 |
| CVE-2023-54065 |
In the Linux kernel, the following vulnerability has been resolved:
net: dsa: realtek: fix out-of-bounds access
|
2025-12-24 |
| CVE-2022-50758 |
In the Linux kernel, the following vulnerability has been resolved:
staging: vt6655: fix potential memory leak
|
2025-12-24 |
| CVE-2022-50733 |
In the Linux kernel, the following vulnerability has been resolved:
usb: idmouse: fix an uninit-value in idmouse_open
|
2025-12-24 |
| CVE-2023-54045 |
In the Linux kernel, the following vulnerability has been resolved:
audit: fix possible soft lockup in __audit_inode_child()
|
2025-12-24 |
| CVE-2023-54038 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_conn: return ERR_PTR instead of NULL when there is no link
|
2025-12-24 |
| CVE-2022-50759 |
In the Linux kernel, the following vulnerability has been resolved:
media: i2c: ov5648: Free V4L2 fwnode data on unbind
|
2025-12-24 |
| CVE-2023-54123 |
In the Linux kernel, the following vulnerability has been resolved:
md/raid10: fix memleak for 'conf->bio_split'
|
2025-12-24 |
| CVE-2023-54148 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Move representor neigh cleanup to profile cleanup_tx
|
2025-12-24 |
| CVE-2023-54013 |
In the Linux kernel, the following vulnerability has been resolved:
interconnect: Fix locking for runpm vs reclaim
|
2025-12-24 |
| CVE-2023-54089 |
In the Linux kernel, the following vulnerability has been resolved:
virtio_pmem: add the missing REQ_OP_WRITE for flush bio
|
2025-12-24 |
| CVE-2023-54077 |
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Fix memory leak if ntfs_read_mft failed
|
2025-12-24 |
| CVE-2023-54012 |
In the Linux kernel, the following vulnerability has been resolved:
net: fix stack overflow when LRO is disabled for virtual interfaces
|
2025-12-24 |
| CVE-2023-54037 |
In the Linux kernel, the following vulnerability has been resolved:
ice: prevent NULL pointer deref during reload
|
2025-12-24 |
| CVE-2023-54079 |
In the Linux kernel, the following vulnerability has been resolved:
power: supply: bq27xxx: Fix poll_interval handling and races on remove
|
2025-12-24 |
| CVE-2025-68358 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix racy bitfield write in btrfs_clear_space_info_full()
|
2025-12-24 |
| CVE-2023-54125 |
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Return error for inconsistent extended attributes
|
2025-12-24 |
| CVE-2023-54070 |
In the Linux kernel, the following vulnerability has been resolved:
igb: clean up in all error paths when enabling SR-IOV
|
2025-12-24 |
| CVE-2023-54156 |
In the Linux kernel, the following vulnerability has been resolved:
sfc: fix crash when reading stats while NIC is resetting
|
2025-12-24 |
| CVE-2023-54099 |
In the Linux kernel, the following vulnerability has been resolved:
fs: Protect reconfiguration of sb read-write from racing writes
|
2025-12-24 |
| CVE-2023-54161 |
In the Linux kernel, the following vulnerability has been resolved:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
|
2025-12-24 |
| CVE-2022-50726 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Fix possible use-after-free in async command interface
|
2025-12-24 |
| CVE-2025-68741 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix improper freeing of purex item
|
2025-12-24 |
| CVE-2023-54060 |
In the Linux kernel, the following vulnerability has been resolved:
iommufd: Set end correctly when doing batch carry
|
2025-12-24 |
| CVE-2023-53867 |
In the Linux kernel, the following vulnerability has been resolved:
ceph: fix potential use-after-free bug when trimming caps
|
2025-12-24 |
| CVE-2023-54136 |
In the Linux kernel, the following vulnerability has been resolved:
serial: sprd: Fix DMA buffer leak issue
|
2025-12-24 |
| CVE-2023-54143 |
In the Linux kernel, the following vulnerability has been resolved:
media: mediatek: vcodec: fix resource leaks in vdec_msg_queue_init()
|
2025-12-24 |
| CVE-2025-68344 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: wavefront: Fix integer overflow in sample size validation
|
2025-12-24 |
| CVE-2022-50774 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: qat - fix DMA transfer direction
|
2025-12-24 |
| CVE-2023-54121 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix incorrect splitting in btrfs_drop_extent_map_range
|
2025-12-24 |
| CVE-2022-50728 |
In the Linux kernel, the following vulnerability has been resolved:
s390/lcs: Fix return type of lcs_start_xmit()
|
2025-12-24 |
| CVE-2023-54124 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to drop all dirty pages during umount() if cp_error is set
|
2025-12-24 |
| CVE-2022-50766 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: set generation before calling btrfs_clean_tree_block in btrfs_init_new_buffer
|
2025-12-24 |
| CVE-2023-54138 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm: fix NULL-deref on irq uninstall
|
2025-12-24 |
| CVE-2025-68733 |
In the Linux kernel, the following vulnerability has been resolved:
smack: fix bug: unprivileged task can create labels
|
2025-12-24 |
| CVE-2022-50723 |
In the Linux kernel, the following vulnerability has been resolved:
bnxt_en: fix memory leak in bnxt_nvm_test()
|
2025-12-24 |
| CVE-2023-54022 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix potential memory leaks at error path for UMP open
|
2025-12-24 |
| CVE-2025-68362 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb()
|
2025-12-24 |
| CVE-2025-68357 |
In the Linux kernel, the following vulnerability has been resolved:
iomap: allocate s_dio_done_wq for async reads as well
|
2025-12-24 |
| CVE-2023-54063 |
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Fix OOB read in indx_insert_into_buffer
|
2025-12-24 |
| CVE-2022-50721 |
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: qcom-adm: fix wrong calling convention for prep_slave_sg
|
2025-12-24 |
| CVE-2023-54151 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: Fix system crash due to lack of free space in LFS
|
2025-12-24 |
| CVE-2023-54112 |
In the Linux kernel, the following vulnerability has been resolved:
kcm: Fix memory leak in error path of kcm_sendmsg()
|
2025-12-24 |
| CVE-2022-50745 |
In the Linux kernel, the following vulnerability has been resolved:
staging: media: tegra-video: fix device_node use after free
|
2025-12-24 |
| CVE-2022-50707 |
In the Linux kernel, the following vulnerability has been resolved:
virtio-crypto: fix memory leak in virtio_crypto_alg_skcipher_close_session()
|
2025-12-24 |
| CVE-2023-54115 |
In the Linux kernel, the following vulnerability has been resolved:
pcmcia: rsrc_nonstatic: Fix memory leak in nonstatic_release_resource_db()
|
2025-12-24 |
| CVE-2025-68363 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Check skb->transport_header is set in bpf_skb_check_mtu
|
2025-12-24 |
| CVE-2022-50730 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: silence the warning when evicting inode with dioread_nolock
|
2025-12-24 |
| CVE-2025-68361 |
In the Linux kernel, the following vulnerability has been resolved:
erofs: limit the level of fs stacking for file-backed mounts
|
2025-12-24 |
| CVE-2023-54105 |
In the Linux kernel, the following vulnerability has been resolved:
can: isotp: check CAN address family in isotp_bind()
|
2025-12-24 |
| CVE-2025-68364 |
In the Linux kernel, the following vulnerability has been resolved:
ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent()
|
2025-12-24 |
| CVE-2023-54064 |
In the Linux kernel, the following vulnerability has been resolved:
ipmi:ssif: Fix a memory leak when scanning for an adapter
|
2025-12-24 |
| CVE-2023-54018 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/hdmi: Add missing check for alloc_ordered_workqueue
|
2025-12-24 |
| CVE-2022-50699 |
In the Linux kernel, the following vulnerability has been resolved:
selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context()
|
2025-12-24 |
| CVE-2023-54054 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix buffer overrun
|
2025-12-24 |
| CVE-2023-54059 |
In the Linux kernel, the following vulnerability has been resolved:
soc: mediatek: mtk-svs: Enable the IRQ later
|
2025-12-24 |
| CVE-2025-68735 |
In the Linux kernel, the following vulnerability has been resolved:
drm/panthor: Prevent potential UAF in group creation
|
2025-12-24 |
| CVE-2022-50770 |
In the Linux kernel, the following vulnerability has been resolved:
ocfs2: fix memory leak in ocfs2_mount_volume()
|
2025-12-24 |
| CVE-2022-50780 |
In the Linux kernel, the following vulnerability has been resolved:
net: fix UAF issue in nfqnl_nf_hook_drop() when ops_init() failed
|
2025-12-24 |
| CVE-2023-54027 |
In the Linux kernel, the following vulnerability has been resolved:
iio: core: Prevent invalid memory access when there is no parent
|
2025-12-24 |
| CVE-2023-54122 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dpu: Add check for cstate
|
2025-12-24 |
| CVE-2023-54131 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: rt2x00: Fix memory leak when handling surveys
|
2025-12-24 |
| CVE-2022-50731 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: akcipher - default implementation for setting a private key
|
2025-12-24 |
| CVE-2022-50778 |
In the Linux kernel, the following vulnerability has been resolved:
fortify: Fix __compiletime_strlen() under UBSAN_BOUNDS_LOCAL
|
2025-12-24 |
| CVE-2023-54142 |
In the Linux kernel, the following vulnerability has been resolved:
gtp: Fix use-after-free in __gtp_encap_destroy().
|
2025-12-24 |
| CVE-2023-54072 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: pcm: Fix potential data race at PCM memory allocation helpers
|
2025-12-24 |
| CVE-2022-50753 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to do sanity check on summary info
|
2025-12-24 |
| CVE-2023-54109 |
In the Linux kernel, the following vulnerability has been resolved:
media: rcar_fdp1: Fix refcount leak in probe and remove function
|
2025-12-24 |
| CVE-2023-53998 |
In the Linux kernel, the following vulnerability has been resolved:
hwrng: virtio - Fix race on data_avail and actual data
|
2025-12-24 |
| CVE-2023-54155 |
In the Linux kernel, the following vulnerability has been resolved:
net: core: remove unnecessary frame_sz check in bpf_xdp_adjust_tail()
|
2025-12-24 |
| CVE-2023-54044 |
In the Linux kernel, the following vulnerability has been resolved:
spmi: Add a check for remove callback when removing a SPMI driver
|
2025-12-24 |
| CVE-2023-54108 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests
|
2025-12-24 |
| CVE-2025-68373 |
In the Linux kernel, the following vulnerability has been resolved:
md: avoid repeated calls to del_gendisk
|
2025-12-24 |
| CVE-2023-53991 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dpu: Disallow unallocated resources to be returned
|
2025-12-24 |
| CVE-2023-53988 |
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Fix slab-out-of-bounds read in hdr_delete_de()
|
2025-12-24 |
| CVE-2023-54106 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: fix potential memory leak in mlx5e_init_rep_rx
|
2025-12-24 |
| CVE-2023-54116 |
In the Linux kernel, the following vulnerability has been resolved:
drm/fbdev-generic: prohibit potential out-of-bounds access
|
2025-12-24 |
| CVE-2025-68738 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7996: fix null pointer deref in mt7996_conf_tx()
|
2025-12-24 |
| CVE-2025-68750 |
In the Linux kernel, the following vulnerability has been resolved:
usb: potential integer overflow in usbg_make_tpg()
|
2025-12-24 |
| CVE-2023-53986 |
In the Linux kernel, the following vulnerability has been resolved:
mips: bmips: BCM6358: disable RAC flush for TP1
|
2025-12-24 |
| CVE-2022-50739 |
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Add null pointer check for inode operations
|
2025-12-24 |
| CVE-2022-50725 |
In the Linux kernel, the following vulnerability has been resolved:
media: vidtv: Fix use-after-free in vidtv_bridge_dvb_init()
|
2025-12-24 |
| CVE-2023-54081 |
In the Linux kernel, the following vulnerability has been resolved:
xen: speed up grant-table reclaim
|
2025-12-24 |
| CVE-2023-54053 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: pcie: fix possible NULL pointer dereference
|
2025-12-24 |
| CVE-2023-54117 |
In the Linux kernel, the following vulnerability has been resolved:
s390/dcssblk: fix kernel crash with list_add corruption
|
2025-12-24 |
| CVE-2023-53997 |
In the Linux kernel, the following vulnerability has been resolved:
thermal: of: fix double-free on unregistration
|
2025-12-24 |
| CVE-2023-54035 |
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: fix underflow in chain reference counter
|
2025-12-24 |
| CVE-2023-54001 |
In the Linux kernel, the following vulnerability has been resolved:
staging: r8712: Fix memory leak in _r8712_init_xmit_priv()
|
2025-12-24 |
| CVE-2023-54130 |
In the Linux kernel, the following vulnerability has been resolved:
hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling
|
2025-12-24 |
| CVE-2025-68728 |
In the Linux kernel, the following vulnerability has been resolved:
ntfs3: fix uninit memory after failed mi_read in mi_format_new
|
2025-12-24 |
| CVE-2023-54141 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: Add missing hw_ops->get_ring_selector() for IPQ5018
|
2025-12-24 |
| CVE-2022-50768 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: smartpqi: Correct device removal for multi-actuator devices
|
2025-12-24 |
| CVE-2023-54154 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: target: core: Fix target_cmd_counter leak
|
2025-12-24 |
| CVE-2022-50706 |
In the Linux kernel, the following vulnerability has been resolved:
net/ieee802154: don't warn zero-sized raw_sendmsg()
|
2025-12-24 |
| CVE-2022-50747 |
In the Linux kernel, the following vulnerability has been resolved:
hfs: Fix OOB Write in hfs_asc2mac
|
2025-12-24 |
| CVE-2023-54058 |
In the Linux kernel, the following vulnerability has been resolved:
firmware: arm_ffa: Check if ffa_driver remove is present before executing
|
2025-12-24 |
| CVE-2023-54066 |
In the Linux kernel, the following vulnerability has been resolved:
media: dvb-usb-v2: gl861: Fix null-ptr-deref in gl861_i2c_master_xfer
|
2025-12-24 |
| CVE-2023-53994 |
In the Linux kernel, the following vulnerability has been resolved:
ionic: remove WARN_ON to prevent panic_on_warn
|
2025-12-24 |
| CVE-2022-50742 |
In the Linux kernel, the following vulnerability has been resolved:
misc: ocxl: fix possible refcount leak in afu_ioctl()
|
2025-12-24 |
| CVE-2022-50754 |
In the Linux kernel, the following vulnerability has been resolved:
apparmor: fix a memleak in multi_transaction_new()
|
2025-12-24 |
| CVE-2023-54029 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: fix iwl_mvm_max_amsdu_size() for MLO
|
2025-12-24 |
| CVE-2023-54127 |
In the Linux kernel, the following vulnerability has been resolved:
fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount()
|
2025-12-24 |
| CVE-2025-68345 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi()
|
2025-12-24 |
| CVE-2022-50720 |
In the Linux kernel, the following vulnerability has been resolved:
x86/apic: Don't disable x2APIC if locked
|
2025-12-24 |
| CVE-2023-54062 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix invalid free tracking in ext4_xattr_move_to_block()
|
2025-12-24 |
| CVE-2022-50757 |
In the Linux kernel, the following vulnerability has been resolved:
media: camss: Clean up received buffers on failed start of streaming
|
2025-12-24 |
| CVE-2023-54097 |
In the Linux kernel, the following vulnerability has been resolved:
regulator: stm32-pwr: fix of_iomap leak
|
2025-12-24 |
| CVE-2022-50771 |
In the Linux kernel, the following vulnerability has been resolved:
rcu: Fix __this_cpu_read() lockdep warning in rcu_force_quiescent_state()
|
2025-12-24 |
| CVE-2022-50773 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: mts64: fix possible null-ptr-defer in snd_mts64_interrupt
|
2025-12-24 |
| CVE-2023-54031 |
In the Linux kernel, the following vulnerability has been resolved:
vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check
|
2025-12-24 |
| CVE-2022-50749 |
In the Linux kernel, the following vulnerability has been resolved:
acct: fix potential integer overflow in encode_comp_t()
|
2025-12-24 |
| CVE-2022-50746 |
In the Linux kernel, the following vulnerability has been resolved:
erofs: validate the extent length for uncompressed pclusters
|
2025-12-24 |
| CVE-2023-54137 |
In the Linux kernel, the following vulnerability has been resolved:
vfio/type1: fix cap_migration information leak
|
2025-12-24 |
| CVE-2023-54030 |
In the Linux kernel, the following vulnerability has been resolved:
io_uring/net: don't overflow multishot recv
|
2025-12-24 |
| CVE-2025-68724 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id
|
2025-12-24 |
| CVE-2025-68360 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: wed: use proper wed reference in mt76 wed driver callabacks
|
2025-12-24 |
| CVE-2023-54101 |
In the Linux kernel, the following vulnerability has been resolved:
driver: soc: xilinx: use _safe loop iterator to avoid a use after free
|
2025-12-24 |
| CVE-2023-53995 |
In the Linux kernel, the following vulnerability has been resolved:
net: ipv4: fix one memleak in __inet_del_ifa()
|
2025-12-24 |
| CVE-2025-68346 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: dice: fix buffer overflow in detect_stream_formats()
|
2025-12-24 |
| CVE-2023-54150 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amd: Fix an out of bounds error in BIOS parser
|
2025-12-24 |
| CVE-2022-50703 |
In the Linux kernel, the following vulnerability has been resolved:
soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe()
|
2025-12-24 |
| CVE-2023-54003 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/core: Fix GID entry ref leak when create_ah fails
|
2025-12-24 |
| CVE-2025-68743 |
In the Linux kernel, the following vulnerability has been resolved:
mshv: Fix create memory region overlap check
|
2025-12-24 |
| CVE-2023-54157 |
In the Linux kernel, the following vulnerability has been resolved:
binder: fix UAF of alloc->vma in race with munmap()
|
2025-12-24 |
| CVE-2022-50715 |
In the Linux kernel, the following vulnerability has been resolved:
md/raid1: stop mdx_raid1 thread when raid1 array run failed
|
2025-12-24 |
| CVE-2025-68745 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Clear cmds after chip reset
|
2025-12-24 |
| CVE-2023-54014 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport()
|
2025-12-24 |
| CVE-2022-50756 |
In the Linux kernel, the following vulnerability has been resolved:
nvme-pci: fix mempool alloc size
|
2025-12-24 |
| CVE-2023-54119 |
In the Linux kernel, the following vulnerability has been resolved:
inotify: Avoid reporting event with invalid wd
|
2025-12-24 |
| CVE-2022-50729 |
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: Fix resource leak in ksmbd_session_rpc_open()
|
2025-12-24 |
| CVE-2025-68353 |
In the Linux kernel, the following vulnerability has been resolved:
net: vxlan: prevent NULL deref in vxlan_xmit_one
|
2025-12-24 |
| CVE-2023-54010 |
In the Linux kernel, the following vulnerability has been resolved:
ACPICA: ACPICA: check null return of ACPI_ALLOCATE_ZEROED in acpi_db_display_objects
|
2025-12-24 |
| CVE-2025-68379 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/rxe: Fix null deref on srq->rq.queue after resize failure
|
2025-12-24 |
| CVE-2025-68731 |
In the Linux kernel, the following vulnerability has been resolved:
accel/amdxdna: Fix an integer overflow in aie2_query_ctx_status_array()
|
2025-12-24 |
| CVE-2023-54067 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix race when deleting free space root from the dirty cow roots list
|
2025-12-24 |
| CVE-2022-50781 |
In the Linux kernel, the following vulnerability has been resolved:
amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table()
|
2025-12-24 |
| CVE-2023-54057 |
In the Linux kernel, the following vulnerability has been resolved:
iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter
|
2025-12-24 |
| CVE-2023-54002 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix assertion of exclop condition when starting balance
|
2025-12-24 |
| CVE-2023-54145 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: drop unnecessary user-triggerable WARN_ONCE in verifierl log
|
2025-12-24 |
| CVE-2023-54158 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: don't free qgroup space unless specified
|
2025-12-24 |
| CVE-2025-14424 |
GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of XCF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28376.
|
2025-12-23 |
| CVE-2025-68340 |
In the Linux kernel, the following vulnerability has been resolved:
team: Move team device type change at the end of team_port_add
|
2025-12-23 |
| CVE-2025-12839 |
Academy Software Foundation OpenEXR EXR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Academy Software Foundation OpenEXR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of EXR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27947.
|
2025-12-23 |
| CVE-2025-12495 |
Academy Software Foundation OpenEXR EXR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Academy Software Foundation OpenEXR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of EXR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27946.
|
2025-12-23 |
| CVE-2025-68341 |
In the Linux kernel, the following vulnerability has been resolved:
veth: reduce XDP no_direct return section to fix race
|
2025-12-23 |
| CVE-2025-14422 |
GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PNM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28273.
|
2025-12-23 |
| CVE-2025-68342 |
In the Linux kernel, the following vulnerability has been resolved:
can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing data
|
2025-12-23 |
| CVE-2025-68343 |
In the Linux kernel, the following vulnerability has been resolved:
can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing header
|
2025-12-23 |
| CVE-2025-12840 |
Academy Software Foundation OpenEXR EXR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Academy Software Foundation OpenEXR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of EXR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27948.
|
2025-12-23 |
| CVE-2025-68338 |
In the Linux kernel, the following vulnerability has been resolved:
net: dsa: microchip: Don't free uninitialized ksz_irq
|
2025-12-23 |
| CVE-2025-14423 |
GIMP LBM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of LBM files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28311.
|
2025-12-23 |
| CVE-2025-68615 |
net-snmp is a SNMP application library, tools and daemon. Prior to versions 5.9.5 and 5.10.pre2, a specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer overflow and the daemon to crash. This issue has been patched in versions 5.9.5 and 5.10.pre2.
|
2025-12-23 |
| CVE-2025-68339 |
In the Linux kernel, the following vulnerability has been resolved:
atm/fore200e: Fix possible data race in fore200e_open()
|
2025-12-23 |
| CVE-2025-14425 |
GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28248.
|
2025-12-23 |
| CVE-2025-68333 |
In the Linux kernel, the following vulnerability has been resolved:
sched_ext: Fix possible deadlock in the deferred_irq_workfn()
|
2025-12-22 |
| CVE-2025-68337 |
In the Linux kernel, the following vulnerability has been resolved:
jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted
|
2025-12-22 |
| CVE-2025-68336 |
In the Linux kernel, the following vulnerability has been resolved:
locking/spinlock/debug: Fix data-race in do_raw_write_lock
|
2025-12-22 |
| CVE-2025-68331 |
In the Linux kernel, the following vulnerability has been resolved:
usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer
|
2025-12-22 |
| CVE-2025-68326 |
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/guc: Fix stack_depot usage
|
2025-12-22 |
| CVE-2025-68335 |
In the Linux kernel, the following vulnerability has been resolved:
comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel()
|
2025-12-22 |
| CVE-2025-68330 |
In the Linux kernel, the following vulnerability has been resolved:
iio: accel: bmc150: Fix irq assumption regression
|
2025-12-22 |
| CVE-2025-68332 |
In the Linux kernel, the following vulnerability has been resolved:
comedi: c6xdigio: Fix invalid PNP driver unregistration
|
2025-12-22 |
| CVE-2025-68334 |
In the Linux kernel, the following vulnerability has been resolved:
platform/x86/amd/pmc: Add support for Van Gogh SoC
|
2025-12-22 |
| CVE-2025-68329 |
In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs
|
2025-12-22 |
| CVE-2025-68327 |
In the Linux kernel, the following vulnerability has been resolved:
usb: renesas_usbhs: Fix synchronous external abort on unbind
|
2025-12-22 |
| CVE-2025-68328 |
In the Linux kernel, the following vulnerability has been resolved:
firmware: stratix10-svc: fix bug in saving controller data
|
2025-12-22 |
| CVE-2025-14178 |
NOTE: https://github.com/php/php-src/security/advisories/GHSA-h96m-rvf9-jgm2
NOTE: Fixed by: https://github.com/php/php-src/commit/e6d7d34c1ae46281993036189e3bcb6528911ce8 (php-8.4.16)
DEBIANBUG: [1123574]
|
2025-12-21 |
| CVE-2025-14177 |
NOTE: https://github.com/php/php-src/security/advisories/GHSA-3237-qqm7-mfv7
NOTE: https://github.com/php/php-src/commit/c5f28c7cf0a052f48e47877c7aa5c5bcc54f1cfc
DEBIANBUG: [1123574]
|
2025-12-21 |
| CVE-2025-14180 |
NOTE: https://github.com/php/php-src/security/advisories/GHSA-8xr5-qppj-gvwj
NOTE: Fixed by: https://github.com/php/php-src/commit/d521259e44288146aa3dc692bdf234cf45a4bd86 (php-8.4.16)
DEBIANBUG: [1123574]
|
2025-12-21 |
| CVE-2025-14946 |
A flaw was found in libnbd. A malicious actor could exploit this by convincing libnbd to open a specially crafted Uniform Resource Identifier (URI). This vulnerability arises because non-standard hostnames starting with '-o' are incorrectly interpreted as arguments to the Secure Shell (SSH) process, rather than as hostnames. This could lead to arbitrary code execution with the privileges of the user running libnbd.
|
2025-12-19 |
| CVE-2025-14876 |
A flaw was found in the virtio-crypto device of QEMU. A malicious guest operating system can exploit a missing length limit in the AKCIPHER path, leading to uncontrolled memory allocation. This can result in a denial of service (DoS) on the host system by causing the QEMU process to terminate unexpectedly.
|
2025-12-19 |
| CVE-2025-68325 |
In the Linux kernel, the following vulnerability has been resolved:
net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop
|
2025-12-18 |
| CVE-2025-59529 |
Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In versions up to and including 0.9-rc2, the simple protocol server ignores the documented client limit and accepts unlimited connections, allowing for easy local DoS. Although `CLIENTS_MAX` is defined, `server_work()` unconditionally `accept()`s and `client_new()` always appends the new client and increments `n_clients`. There is no check against the limit. When client cannot be accepted as a result of maximal socket number of avahi-daemon, it logs unconditionally error per each connection. Unprivileged local users can exhaust daemon memory and file descriptors, causing a denial of service system-wide for mDNS/DNS-SD. Exhausting local file descriptors causes increased system load caused by logging errors of each of request. Overloading prevents glibc calls using nss-mdns plugins to resolve `*.local.` names and link-local addresses. As of time of publication, no known patched versions are available, but a candidate fix is available in pull request 808, and some workarounds are available. Simple clients are offered for nss-mdns package functionality. It is not possible to disable the unix socket `/run/avahi-daemon/socket`, but resolution requests received via DBus are not affected directly. Tools avahi-resolve, avahi-resolve-address and avahi-resolve-host-name are not affected, they use DBus interface. It is possible to change permissions of unix socket after avahi-daemon is started. But avahi-daemon does not provide any configuration for it. Additional access restrictions like SELinux can also prevent unwanted tools to access the socket and keep resolution working for trusted users.
|
2025-12-18 |
| CVE-2025-68323 |
In the Linux kernel, the following vulnerability has been resolved:
usb: typec: ucsi: fix use-after-free caused by uec->work
|
2025-12-18 |
| CVE-2025-68161 |
The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName configuration attribute or the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system property is set to true.
This issue may allow a man-in-the-middle attacker to intercept or redirect log traffic under the following conditions:
* The attacker is able to intercept or redirect network traffic between the client and the log receiver.
* The attacker can present a server certificate issued by a certification authority trusted by the Socket Appender’s configured trust store (or by the default Java trust store if no custom trust store is configured).
Users are advised to upgrade to Apache Log4j Core version 2.25.3, which addresses this issue.
As an alternative mitigation, the Socket Appender may be configured to use a private or restricted trust root to limit the set of trusted certificates.
|
2025-12-18 |
| CVE-2025-68469 |
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.1-14, ImageMagick crashes when processing a crafted TIFF file. Version 7.1.1-14 fixes the issue.
|
2025-12-18 |
| CVE-2025-14744 |
Unicode RTLO characters could allow malicious websites to spoof filenames in the downloads UI for Firefox for iOS, potentially tricking users into saving files of an unexpected file type. This vulnerability affects Firefox for iOS < 144.0.
|
2025-12-18 |
| CVE-2025-68324 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: imm: Fix use-after-free bug caused by unfinished delayed work
|
2025-12-18 |
| CVE-2025-14860 |
Use-after-free in the Disability Access APIs component. This vulnerability affects Firefox < 146.0.1.
|
2025-12-18 |
| CVE-2025-14861 |
Memory safety bugs present in Firefox 146. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 146.0.1.
|
2025-12-18 |
| CVE-2025-43531 |
A flaw was found in WebKitGTK. Processing malicious web content can cause a race condition due to improper state handling and result in an unexpected process crash.
|
2025-12-17 |
| CVE-2025-43536 |
A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in an unexpected process crash.
|
2025-12-17 |
| CVE-2025-68114 |
Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, an unchecked vsnprintf return in SStream_concat lets a malicious cs_opt_mem.vsnprintf drive SStream’s index negative or past the end, leading to a stack buffer underflow/overflow when the next write occurs. Commit 2c7797182a1618be12017d7d41e0b6581d5d529e fixes the issue.
|
2025-12-17 |
| CVE-2025-43535 |
A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.
|
2025-12-17 |
| CVE-2025-43529 |
A flaw was found in webkitgtk where when processing a maliciously crafted web content a use-after-free type of weaknesses may be triggered leading to a remote code execution in the client machine.
|
2025-12-17 |
| CVE-2025-67873 |
Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, Skipdata length is not bounds-checked, so a user-provided skipdata callback can make cs_disasm/cs_disasm_iter memcpy more than 24 bytes into cs_insn.bytes, causing a heap buffer overflow in the disassembly path. Commit cbef767ab33b82166d263895f24084b75b316df3 fixes the issue.
|
2025-12-17 |
| CVE-2024-29370 |
In python-jose 3.3.0 (specifically jwe.decrypt), a vulnerability allows an attacker to cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.
|
2025-12-17 |
| CVE-2025-43501 |
A flaw was found in WebKitGTK. Processing malicious web content can cause a buffer overflow due to improper memory handling and result in an unexpected process crash.
|
2025-12-17 |
| CVE-2025-43541 |
A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.
|
2025-12-17 |
| CVE-2025-68118 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.20.0, a vulnerability exists in FreeRDP’s certificate handling code on Windows platforms. The function `freerdp_certificate_data_hash_ uses` the Microsoft-specific `_snprintf` function to format certificate cache filenames without guaranteeing NUL termination when truncation occurs. According to Microsoft documentation, `_snprintf` does not append a terminating NUL byte if the formatted output exceeds the destination buffer size. If an attacker controls the hostname value (for example via server redirection or a crafted .rdp file), the resulting filename buffer may not be NUL-terminated. Subsequent string operations performed on this buffer may read beyond the allocated memory region, resulting in a heap-based out-of-bounds read. In default configurations, the connection is typically terminated before sensitive data can be meaningfully exposed, but unintended memory read or a client crash may still occur under certain conditions. Version 3.20.0 has a patch for the issue.
|
2025-12-17 |
| CVE-2025-40360 |
In the Linux kernel, the following vulnerability has been resolved:
drm/sysfb: Do not dereference NULL pointer in plane reset
|
2025-12-16 |
| CVE-2025-68303 |
In the Linux kernel, the following vulnerability has been resolved:
platform/x86: intel: punit_ipc: fix memory corruption
|
2025-12-16 |
| CVE-2025-68306 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btusb: mediatek: Fix kernel crash when releasing mtk iso interface
|
2025-12-16 |
| CVE-2025-68211 |
In the Linux kernel, the following vulnerability has been resolved:
ksm: use range-walk function to jump over holes in scan_get_next_rmap_item
|
2025-12-16 |
| CVE-2025-40357 |
In the Linux kernel, the following vulnerability has been resolved:
net/smc: fix general protection fault in __smc_diag_dump
|
2025-12-16 |
| CVE-2025-68167 |
In the Linux kernel, the following vulnerability has been resolved:
gpiolib: fix invalid pointer access in debugfs
|
2025-12-16 |
| CVE-2025-68320 |
In the Linux kernel, the following vulnerability has been resolved:
lan966x: Fix sleeping in atomic context
|
2025-12-16 |
| CVE-2025-68230 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: fix gpu page fault after hibernation on PF passthrough
|
2025-12-16 |
| CVE-2025-68283 |
In the Linux kernel, the following vulnerability has been resolved:
libceph: replace BUG_ON with bounds check for map->max_osd
|
2025-12-16 |
| CVE-2025-68229 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show()
|
2025-12-16 |
| CVE-2025-68175 |
In the Linux kernel, the following vulnerability has been resolved:
media: nxp: imx8-isi: Fix streaming cleanup on release
|
2025-12-16 |
| CVE-2025-68169 |
In the Linux kernel, the following vulnerability has been resolved:
netpoll: Fix deadlock in memory allocation under spinlock
|
2025-12-16 |
| CVE-2025-68205 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: hda/hdmi: Fix breakage at probing nvhdmi-mcp driver
|
2025-12-16 |
| CVE-2025-68193 |
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/guc: Add devm release action to safely tear down CT
|
2025-12-16 |
| CVE-2025-68188 |
In the Linux kernel, the following vulnerability has been resolved:
tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check()
|
2025-12-16 |
| CVE-2025-40358 |
In the Linux kernel, the following vulnerability has been resolved:
riscv: stacktrace: Disable KASAN checks for non-current tasks
|
2025-12-16 |
| CVE-2025-68146 |
filelock is a platform-independent file lock for Python. In versions prior to 3.20.1, a Time-of-Check-Time-of-Use (TOCTOU) race condition allows local attackers to corrupt or truncate arbitrary user files through symlink attacks. The vulnerability exists in both Unix and Windows lock file creation where filelock checks if a file exists before opening it with O_TRUNC. An attacker can create a symlink pointing to a victim file in the time gap between the check and open, causing os.open() to follow the symlink and truncate the target file. All users of filelock on Unix, Linux, macOS, and Windows systems are impacted. The vulnerability cascades to dependent libraries. The attack requires local filesystem access and ability to create symlinks (standard user permissions on Unix; Developer Mode on Windows 10+). Exploitation succeeds within 1-3 attempts when lock file paths are predictable. The issue is fixed in version 3.20.1. If immediate upgrade is not possible, use SoftFileLock instead of UnixFileLock/WindowsFileLock (note: different locking semantics, may not be suitable for all use cases); ensure lock file directories have restrictive permissions (chmod 0700) to prevent untrusted users from creating symlinks; and/or monitor lock file directories for suspicious symlinks before running trusted applications. These workarounds provide only partial mitigation. The race condition remains exploitable. Upgrading to version 3.20.1 is strongly recommended.
|
2025-12-16 |
| CVE-2025-68227 |
In the Linux kernel, the following vulnerability has been resolved:
mptcp: Fix proto fallback detection with BPF
|
2025-12-16 |
| CVE-2025-68231 |
In the Linux kernel, the following vulnerability has been resolved:
mm/mempool: fix poisoning order>0 pages with HIGHMEM
|
2025-12-16 |
| CVE-2025-68214 |
In the Linux kernel, the following vulnerability has been resolved:
timers: Fix NULL function pointer race in timer_shutdown_sync()
|
2025-12-16 |
| CVE-2025-68284 |
In the Linux kernel, the following vulnerability has been resolved:
libceph: prevent potential out-of-bounds writes in handle_auth_session_key()
|
2025-12-16 |
| CVE-2025-40346 |
In the Linux kernel, the following vulnerability has been resolved:
arch_topology: Fix incorrect error check in topology_parse_cpu_capacity()
|
2025-12-16 |
| CVE-2025-68190 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked()
|
2025-12-16 |
| CVE-2025-40362 |
In the Linux kernel, the following vulnerability has been resolved:
ceph: fix multifs mds auth caps issue
|
2025-12-16 |
| CVE-2025-68257 |
In the Linux kernel, the following vulnerability has been resolved:
comedi: check device's attached status in compat ioctls
|
2025-12-16 |
| CVE-2025-68222 |
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc
|
2025-12-16 |
| CVE-2025-40355 |
In the Linux kernel, the following vulnerability has been resolved:
sysfs: check visibility before changing group attribute ownership
|
2025-12-16 |
| CVE-2025-68234 |
In the Linux kernel, the following vulnerability has been resolved:
io_uring/cmd_net: fix wrong argument types for skb_queue_splice()
|
2025-12-16 |
| CVE-2025-68314 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm: make sure last_fence is always updated
|
2025-12-16 |
| CVE-2025-68196 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Cache streams targeting link when performing LT automation
|
2025-12-16 |
| CVE-2025-68256 |
In the Linux kernel, the following vulnerability has been resolved:
staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser
|
2025-12-16 |
| CVE-2025-68295 |
In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix memory leak in cifs_construct_tcon()
|
2025-12-16 |
| CVE-2025-68194 |
In the Linux kernel, the following vulnerability has been resolved:
media: imon: make send_packet() more robust
|
2025-12-16 |
| CVE-2025-68215 |
In the Linux kernel, the following vulnerability has been resolved:
ice: fix PTP cleanup on driver removal in error path
|
2025-12-16 |
| CVE-2025-68238 |
In the Linux kernel, the following vulnerability has been resolved:
mtd: rawnand: cadence: fix DMA device NULL pointer dereference
|
2025-12-16 |
| CVE-2025-68218 |
In the Linux kernel, the following vulnerability has been resolved:
nvme-multipath: fix lockdep WARN due to partition scan work
|
2025-12-16 |
| CVE-2025-68301 |
In the Linux kernel, the following vulnerability has been resolved:
net: atlantic: fix fragment overflow handling in RX path
|
2025-12-16 |
| CVE-2025-40353 |
In the Linux kernel, the following vulnerability has been resolved:
arm64: mte: Do not warn if the page is already tagged in copy_highpage()
|
2025-12-16 |
| CVE-2025-68308 |
In the Linux kernel, the following vulnerability has been resolved:
can: kvaser_usb: leaf: Fix potential infinite loop in command parsers
|
2025-12-16 |
| CVE-2025-68255 |
In the Linux kernel, the following vulnerability has been resolved:
staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing
|
2025-12-16 |
| CVE-2025-68187 |
In the Linux kernel, the following vulnerability has been resolved:
net: mdio: Check regmap pointer returned by device_node_to_regmap()
|
2025-12-16 |
| CVE-2025-68170 |
In the Linux kernel, the following vulnerability has been resolved:
drm/radeon: Do not kfree() devres managed rdev
|
2025-12-16 |
| CVE-2025-68237 |
In the Linux kernel, the following vulnerability has been resolved:
mtdchar: fix integer overflow in read/write ioctls
|
2025-12-16 |
| CVE-2025-68289 |
In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: f_eem: Fix memory leak in eem_unwrap
|
2025-12-16 |
| CVE-2025-68233 |
In the Linux kernel, the following vulnerability has been resolved:
drm/tegra: Add call to put_pid()
|
2025-12-16 |
| CVE-2025-68292 |
In the Linux kernel, the following vulnerability has been resolved:
mm/memfd: fix information leak in hugetlb folios
|
2025-12-16 |
| CVE-2025-68212 |
In the Linux kernel, the following vulnerability has been resolved:
fs: Fix uninitialized 'offp' in statmount_string()
|
2025-12-16 |
| CVE-2025-68262 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: zstd - fix double-free in per-CPU stream cleanup
|
2025-12-16 |
| CVE-2025-68197 |
In the Linux kernel, the following vulnerability has been resolved:
bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap()
|
2025-12-16 |
| CVE-2025-68221 |
In the Linux kernel, the following vulnerability has been resolved:
mptcp: fix address removal logic in mptcp_pm_nl_rm_addr
|
2025-12-16 |
| CVE-2025-68195 |
In the Linux kernel, the following vulnerability has been resolved:
x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode
|
2025-12-16 |
| CVE-2025-68297 |
In the Linux kernel, the following vulnerability has been resolved:
ceph: fix crash in process_v2_sparse_read() for encrypted directories
|
2025-12-16 |
| CVE-2025-68244 |
In the Linux kernel, the following vulnerability has been resolved:
drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD
|
2025-12-16 |
| CVE-2025-68254 |
In the Linux kernel, the following vulnerability has been resolved:
staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing
|
2025-12-16 |
| CVE-2025-68293 |
In the Linux kernel, the following vulnerability has been resolved:
mm/huge_memory: fix NULL pointer deference when splitting folio
|
2025-12-16 |
| CVE-2025-68319 |
In the Linux kernel, the following vulnerability has been resolved:
netconsole: Acquire su_mutex before navigating configs hierarchy
|
2025-12-16 |
| CVE-2025-68223 |
In the Linux kernel, the following vulnerability has been resolved:
drm/radeon: delete radeon_fence_process in is_signaled, no deadlock
|
2025-12-16 |
| CVE-2025-40361 |
In the Linux kernel, the following vulnerability has been resolved:
fs: ext4: change GFP_KERNEL to GFP_NOFS to avoid deadlock
|
2025-12-16 |
| CVE-2025-40350 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding RQ
|
2025-12-16 |
| CVE-2025-68247 |
In the Linux kernel, the following vulnerability has been resolved:
posix-timers: Plug potential memory leak in do_timer_create()
|
2025-12-16 |
| CVE-2025-68224 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: core: Fix a regression triggered by scsi_host_busy()
|
2025-12-16 |
| CVE-2025-68204 |
In the Linux kernel, the following vulnerability has been resolved:
pmdomain: arm: scmi: Fix genpd leak on provider registration failure
|
2025-12-16 |
| CVE-2025-68174 |
In the Linux kernel, the following vulnerability has been resolved:
amd/amdkfd: enhance kfd process check in switch partition
|
2025-12-16 |
| CVE-2025-68246 |
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: close accepted socket when per-IP limit rejects connection
|
2025-12-16 |
| CVE-2025-68263 |
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: ipc: fix use-after-free in ipc_msg_send_request
|
2025-12-16 |
| CVE-2025-68219 |
In the Linux kernel, the following vulnerability has been resolved:
cifs: fix memory leak in smb3_fs_context_parse_param error path
|
2025-12-16 |
| CVE-2025-68225 |
In the Linux kernel, the following vulnerability has been resolved:
lib/test_kho: check if KHO is enabled
|
2025-12-16 |
| CVE-2025-68294 |
In the Linux kernel, the following vulnerability has been resolved:
io_uring/net: ensure vectored buffer node import is tied to notification
|
2025-12-16 |
| CVE-2025-68309 |
In the Linux kernel, the following vulnerability has been resolved:
PCI/AER: Fix NULL pointer access by aer_info
|
2025-12-16 |
| CVE-2025-68288 |
In the Linux kernel, the following vulnerability has been resolved:
usb: storage: Fix memory leak in USB bulk transport
|
2025-12-16 |
| CVE-2025-68313 |
In the Linux kernel, the following vulnerability has been resolved:
x86/CPU/AMD: Add RDSEED fix for Zen5
|
2025-12-16 |
| CVE-2025-68236 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: ufs: ufs-qcom: Fix UFS OCP issue during UFS power down (PC=3)
|
2025-12-16 |
| CVE-2025-68201 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: remove two invalid BUG_ON()s
|
2025-12-16 |
| CVE-2025-68185 |
In the Linux kernel, the following vulnerability has been resolved:
nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode dereferencing
|
2025-12-16 |
| CVE-2025-68198 |
In the Linux kernel, the following vulnerability has been resolved:
crash: fix crashkernel resource shrink
|
2025-12-16 |
| CVE-2025-40349 |
In the Linux kernel, the following vulnerability has been resolved:
hfs: validate record offset in hfsplus_bmap_alloc
|
2025-12-16 |
| CVE-2025-40356 |
In the Linux kernel, the following vulnerability has been resolved:
spi: rockchip-sfc: Fix DMA-API usage
|
2025-12-16 |
| CVE-2025-68282 |
In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: udc: fix use-after-free in usb_gadget_state_work
|
2025-12-16 |
| CVE-2025-68285 |
In the Linux kernel, the following vulnerability has been resolved:
libceph: fix potential use-after-free in have_mon_and_osd_map()
|
2025-12-16 |
| CVE-2025-68317 |
In the Linux kernel, the following vulnerability has been resolved:
io_uring/zctx: check chained notif contexts
|
2025-12-16 |
| CVE-2025-68245 |
In the Linux kernel, the following vulnerability has been resolved:
net: netpoll: fix incorrect refcount handling causing incorrect cleanup
|
2025-12-16 |
| CVE-2025-68217 |
In the Linux kernel, the following vulnerability has been resolved:
Input: pegasus-notetaker - fix potential out-of-bounds access
|
2025-12-16 |
| CVE-2025-68310 |
In the Linux kernel, the following vulnerability has been resolved:
s390/pci: Avoid deadlock between PCI error recovery and mlx5 crdump
|
2025-12-16 |
| CVE-2025-68241 |
In the Linux kernel, the following vulnerability has been resolved:
ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe
|
2025-12-16 |
| CVE-2025-68261 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock()
|
2025-12-16 |
| CVE-2025-68307 |
In the Linux kernel, the following vulnerability has been resolved:
can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs
|
2025-12-16 |
| CVE-2025-68207 |
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/guc: Synchronize Dead CT worker with unbind
|
2025-12-16 |
| CVE-2025-68322 |
In the Linux kernel, the following vulnerability has been resolved:
parisc: Avoid crash due to unaligned access in unwinder
|
2025-12-16 |
| CVE-2025-68202 |
In the Linux kernel, the following vulnerability has been resolved:
sched_ext: Fix unsafe locking in the scx_dump_state()
|
2025-12-16 |
| CVE-2025-68311 |
In the Linux kernel, the following vulnerability has been resolved:
tty: serial: ip22zilog: Use platform device for probing
|
2025-12-16 |
| CVE-2025-68290 |
In the Linux kernel, the following vulnerability has been resolved:
most: usb: fix double free on late probe failure
|
2025-12-16 |
| CVE-2025-68210 |
In the Linux kernel, the following vulnerability has been resolved:
erofs: avoid infinite loop due to incomplete zstd-compressed data
|
2025-12-16 |
| CVE-2025-68177 |
In the Linux kernel, the following vulnerability has been resolved:
cpufreq/longhaul: handle NULL policy in longhaul_exit
|
2025-12-16 |
| CVE-2025-68232 |
In the Linux kernel, the following vulnerability has been resolved:
veth: more robust handing of race to avoid txq getting stuck
|
2025-12-16 |
| CVE-2025-68318 |
In the Linux kernel, the following vulnerability has been resolved:
clk: thead: th1520-ap: set all AXI clocks to CLK_IS_CRITICAL
|
2025-12-16 |
| CVE-2025-68216 |
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: BPF: Disable trampoline for kernel module function trace
|
2025-12-16 |
| CVE-2025-68302 |
In the Linux kernel, the following vulnerability has been resolved:
net: sxgbe: fix potential NULL dereference in sxgbe_rx()
|
2025-12-16 |
| CVE-2025-68243 |
In the Linux kernel, the following vulnerability has been resolved:
NFS: Check the TLS certificate fields in nfs_match_client()
|
2025-12-16 |
| CVE-2025-68299 |
In the Linux kernel, the following vulnerability has been resolved:
afs: Fix delayed allocation of a cell's anonymous key
|
2025-12-16 |
| CVE-2025-68199 |
In the Linux kernel, the following vulnerability has been resolved:
codetag: debug: handle existing CODETAG_EMPTY in mark_objexts_empty for slabobj_ext
|
2025-12-16 |
| CVE-2025-68300 |
In the Linux kernel, the following vulnerability has been resolved:
fs/namespace: fix reference leak in grab_requested_mnt_ns
|
2025-12-16 |
| CVE-2025-68228 |
In the Linux kernel, the following vulnerability has been resolved:
drm/plane: Fix create_in_format_blob() return value
|
2025-12-16 |
| CVE-2025-68239 |
In the Linux kernel, the following vulnerability has been resolved:
binfmt_misc: restore write access before closing files opened by open_exec()
|
2025-12-16 |
| CVE-2025-68259 |
In the Linux kernel, the following vulnerability has been resolved:
KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced
|
2025-12-16 |
| CVE-2025-68286 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Check NULL before accessing
|
2025-12-16 |
| CVE-2025-68220 |
In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: ti: netcp: Standardize knav_dma_open_channel to return NULL on error
|
2025-12-16 |
| CVE-2025-68200 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Add bpf_prog_run_data_pointers()
|
2025-12-16 |
| CVE-2025-40348 |
In the Linux kernel, the following vulnerability has been resolved:
slab: Avoid race on slab->obj_exts in alloc_slab_obj_exts
|
2025-12-16 |
| CVE-2025-40347 |
In the Linux kernel, the following vulnerability has been resolved:
net: enetc: fix the deadlock of enetc_mdio_lock
|
2025-12-16 |
| CVE-2025-68209 |
In the Linux kernel, the following vulnerability has been resolved:
mlx5: Fix default values in create CQ
|
2025-12-16 |
| CVE-2025-68173 |
In the Linux kernel, the following vulnerability has been resolved:
ftrace: Fix softlockup in ftrace_module_enable
|
2025-12-16 |
| CVE-2025-68251 |
In the Linux kernel, the following vulnerability has been resolved:
erofs: avoid infinite loops due to corrupted subpage compact indexes
|
2025-12-16 |
| CVE-2025-40359 |
In the Linux kernel, the following vulnerability has been resolved:
perf/x86/intel: Fix KASAN global-out-of-bounds warning
|
2025-12-16 |
| CVE-2025-68298 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btusb: mediatek: Avoid btusb_mtk_claim_iso_intf() NULL deref
|
2025-12-16 |
| CVE-2025-68213 |
In the Linux kernel, the following vulnerability has been resolved:
idpf: fix possible vport_config NULL pointer deref in remove
|
2025-12-16 |
| CVE-2025-40354 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: increase max link count and fix link->enc NULL pointer access
|
2025-12-16 |
| CVE-2025-68240 |
In the Linux kernel, the following vulnerability has been resolved:
nilfs2: avoid having an active sc_timer before freeing sci
|
2025-12-16 |
| CVE-2025-68265 |
In the Linux kernel, the following vulnerability has been resolved:
nvme: fix admin request_queue lifetime
|
2025-12-16 |
| CVE-2025-40351 |
In the Linux kernel, the following vulnerability has been resolved:
hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()
|
2025-12-16 |
| CVE-2025-68321 |
In the Linux kernel, the following vulnerability has been resolved:
page_pool: always add GFP_NOWARN for ATOMIC allocations
|
2025-12-16 |
| CVE-2025-68315 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to detect potential corrupted nid in free_nid_list
|
2025-12-16 |
| CVE-2025-68250 |
In the Linux kernel, the following vulnerability has been resolved:
hung_task: fix warnings caused by unaligned lock pointers
|
2025-12-16 |
| CVE-2025-68226 |
In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix incomplete backport in cfids_invalidation_worker()
|
2025-12-16 |
| CVE-2025-68182 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: fix potential use after free in iwl_mld_remove_link()
|
2025-12-16 |
| CVE-2025-68252 |
In the Linux kernel, the following vulnerability has been resolved:
misc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup
|
2025-12-16 |
| CVE-2025-68253 |
In the Linux kernel, the following vulnerability has been resolved:
mm: don't spin in add_stack_record when gfp flags don't allow
|
2025-12-16 |
| CVE-2025-68184 |
In the Linux kernel, the following vulnerability has been resolved:
drm/mediatek: Disable AFBC support on Mediatek DRM driver
|
2025-12-16 |
| CVE-2025-68168 |
In the Linux kernel, the following vulnerability has been resolved:
jfs: fix uninitialized waitqueue in transaction manager
|
2025-12-16 |
| CVE-2025-68235 |
In the Linux kernel, the following vulnerability has been resolved:
nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot
|
2025-12-16 |
| CVE-2025-68264 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: refresh inline data size before write operations
|
2025-12-16 |
| CVE-2025-68291 |
In the Linux kernel, the following vulnerability has been resolved:
mptcp: Initialise rcv_mss before calling tcp_send_active_reset() in mptcp_do_fastclose().
|
2025-12-16 |
| CVE-2025-68183 |
In the Linux kernel, the following vulnerability has been resolved:
ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr
|
2025-12-16 |
| CVE-2025-68181 |
In the Linux kernel, the following vulnerability has been resolved:
drm/radeon: Remove calls to drm_put_dev()
|
2025-12-16 |
| CVE-2025-68296 |
In the Linux kernel, the following vulnerability has been resolved:
drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup
|
2025-12-16 |
| CVE-2025-68260 |
In the Linux kernel, the following vulnerability has been resolved:
rust_binder: fix race condition on death_list
|
2025-12-16 |
| CVE-2025-68316 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: ufs: core: Fix invalid probe error return value
|
2025-12-16 |
| CVE-2025-68266 |
In the Linux kernel, the following vulnerability has been resolved:
bfs: Reconstruct file type when loading from disk
|
2025-12-16 |
| CVE-2025-40352 |
In the Linux kernel, the following vulnerability has been resolved:
platform/mellanox: mlxbf-pmc: add sysfs_attr_init() to count_clock init
|
2025-12-16 |
| CVE-2025-68171 |
In the Linux kernel, the following vulnerability has been resolved:
x86/fpu: Ensure XFD state on signal delivery
|
2025-12-16 |
| CVE-2025-68176 |
In the Linux kernel, the following vulnerability has been resolved:
PCI: cadence: Check for the existence of cdns_pcie::ops before using it
|
2025-12-16 |
| CVE-2025-68249 |
In the Linux kernel, the following vulnerability has been resolved:
most: usb: hdm_probe: Fix calling put_device() before device initialization
|
2025-12-16 |
| CVE-2025-68156 |
Expr is an expression language and expression evaluation for Go. Prior to version 1.17.7, several builtin functions in Expr, including `flatten`, `min`, `max`, `mean`, and `median`, perform recursive traversal over user-provided data structures without enforcing a maximum recursion depth. If the evaluation environment contains deeply nested or cyclic data structures, these functions may recurse indefinitely until exceed the Go runtime stack limit. This results in a stack overflow panic, causing the host application to crash. While exploitability depends on whether an attacker can influence or inject cyclic or pathologically deep data into the
evaluation environment, this behavior represents a denial-of-service (DoS) risk and affects overall library robustness. Instead of returning a recoverable evaluation error, the process may terminate unexpectedly. In affected versions, evaluation of expressions that invoke certain builtin functions on untrusted or insufficiently validated data structures can lead to a process-level crash due to stack exhaustion. This issue is most relevant in scenarios where Expr is used to evaluate expressions against externally supplied or dynamically constructed environments; cyclic references (directly or indirectly) can be introduced into arrays, maps, or structs; and there are no application-level safeguards preventing deeply nested input data. In typical use cases with controlled, acyclic data, the issue may not manifest. However, when present, the resulting panic can be used to reliably crash the application, constituting a denial of service. The issue has been fixed in the v1.17.7 versions of Expr. The patch introduces a maximum recursion depth limit for affected builtin functions. When this limit is exceeded, evaluation aborts gracefully and returns a descriptive error instead of panicking. Additionally, the maximum depth can be customized by users via `builtin.MaxDepth`, allowing applications with legitimate deep structures to raise the limit in a controlled manner. Users are strongly encouraged to upgrade to the patched release, which includes both the recursion guard and comprehensive test coverage to prevent regressions. For users who cannot immediately upgrade, some mitigations are recommended. Ensure that evaluation environments cannot contain cyclic references, validate or sanitize externally supplied data structures before passing them to Expr, and/or wrap expression evaluation with panic recovery to prevent a full process crash (as a last-resort defensive measure). These workarounds reduce risk but do not fully eliminate the issue without the patch.
|
2025-12-16 |
| CVE-2025-68191 |
In the Linux kernel, the following vulnerability has been resolved:
udp_tunnel: use netdev_warn() instead of netdev_WARN()
|
2025-12-16 |
| CVE-2025-68186 |
In the Linux kernel, the following vulnerability has been resolved:
ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader catches up
|
2025-12-16 |
| CVE-2025-68248 |
In the Linux kernel, the following vulnerability has been resolved:
vmw_balloon: indicate success when effectively deflating during migration
|
2025-12-16 |
| CVE-2025-68312 |
In the Linux kernel, the following vulnerability has been resolved:
usbnet: Prevents free active kevent
|
2025-12-16 |
| CVE-2025-68305 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_sock: Prevent race in socket write iter and sock bind
|
2025-12-16 |
| CVE-2025-68172 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: aspeed - fix double free caused by devm
|
2025-12-16 |
| CVE-2025-68287 |
In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths
|
2025-12-16 |
| CVE-2025-68304 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_core: lookup hci_conn on RX path on protocol side
|
2025-12-16 |
| CVE-2025-68206 |
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_ct: add seqadj extension for natted connections
|
2025-12-16 |
| CVE-2025-68281 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: SDCA: bug fix while parsing mipi-sdca-control-cn-list
|
2025-12-16 |
| CVE-2025-68258 |
In the Linux kernel, the following vulnerability has been resolved:
comedi: multiq3: sanitize config options in multiq3_attach()
|
2025-12-16 |
| CVE-2025-68192 |
In the Linux kernel, the following vulnerability has been resolved:
net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup
|
2025-12-16 |
| CVE-2025-68242 |
In the Linux kernel, the following vulnerability has been resolved:
NFS: Fix LTP test failures when timestamps are delegated
|
2025-12-16 |
| CVE-2025-68179 |
In the Linux kernel, the following vulnerability has been resolved:
s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP
|
2025-12-16 |
| CVE-2025-68208 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: account for current allocated stack depth in widen_imprecise_scalars()
|
2025-12-16 |
| CVE-2025-40363 |
In the Linux kernel, the following vulnerability has been resolved:
net: ipv6: fix field-spanning memcpy warning in AH output
|
2025-12-16 |
| CVE-2025-68180 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Fix NULL deref in debugfs odm_combine_segments
|
2025-12-16 |
| CVE-2025-68189 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm: Fix GEM free for imported dma-bufs
|
2025-12-16 |
| CVE-2025-68178 |
In the Linux kernel, the following vulnerability has been resolved:
blk-cgroup: fix possible deadlock while configuring policy
|
2025-12-16 |
| CVE-2025-14714 |
An Authentication Bypass vulnerability existed where the application bundled an interpreter (Python) that inherits the Transparency, Consent, and Control (TCC) permissions granted by the user to the main application bundle
By executing the bundled interpreter directly the attacker's scripts run with the application's TCC privileges
In fixed versions parent-constraints are used to allow only the main application to launch interpreter with those permissions
This issue affects LibreOffice on macOS: from 25.2 before < 25.2.4.
|
2025-12-15 |
| CVE-2025-67899 |
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
|
2025-12-14 |
| CVE-2025-67726 |
Tornado is a Python web framework and asynchronous networking library. Versions 6.5.2 and below use an inefficient algorithm when parsing parameters for HTTP header values, potentially causing a DoS. The _parseparam function in httputil.py is used to parse specific HTTP header values, such as those in multipart/form-data and repeatedly calls string.count() within a nested loop while processing quoted semicolons. If an attacker sends a request with a large number of maliciously crafted parameters in a Content-Disposition header, the server's CPU usage increases quadratically (O(n²)) during parsing. Due to Tornado's single event loop architecture, a single malicious request can cause the entire server to become unresponsive for an extended period. This issue is fixed in version 6.5.3.
|
2025-12-12 |
| CVE-2025-40345 |
In the Linux kernel, the following vulnerability has been resolved:
usb: storage: sddr55: Reject out-of-bound new_pba
|
2025-12-12 |
| CVE-2025-67725 |
Tornado is a Python web framework and asynchronous networking library. In versions 6.5.2 and below, a single maliciously crafted HTTP request can block the server's event loop for an extended period, caused by the HTTPHeaders.add method. The function accumulates values using string concatenation when the same header name is repeated, causing a Denial of Service (DoS). Due to Python string immutability, each concatenation copies the entire string, resulting in O(n²) time complexity. The severity can vary from high if max_header_size has been increased from its default, to low if it has its default value of 64KB. This issue is fixed in version 6.5.3.
|
2025-12-12 |
| CVE-2025-67724 |
Tornado is a Python web framework and asynchronous networking library. In versions 6.5.2 and below, the supplied reason phrase is used unescaped in HTTP headers (where it could be used for header injection) or in HTML in the default error page (where it could be used for XSS) and can be exploited by passing untrusted or malicious data into the reason argument. Used by both RequestHandler.set_status and tornado.web.HTTPError, the argument is designed to allow applications to pass custom "reason" phrases (the "Not Found" in HTTP/1.1 404 Not Found) to the HTTP status line (mainly for non-standard status codes). This issue is fixed in version 6.5.3.
|
2025-12-12 |
| CVE-2025-9615 |
A normal (non-admin) user could specify a path to other user's certificate and use it to authenticate, for example, in a VPN server or a 802.1X protected WiFi. Avoid both possible ways how they can do that.
|
2025-12-12 |
| CVE-2025-14512 |
A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.
|
2025-12-11 |
| CVE-2025-14523 |
A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to one backend but the backend interprets it as destined for another host. This discrepancy enables request-smuggling style attacks, cache poisoning, or bypassing host-based access controls when an attacker supplies duplicate Host headers.
|
2025-12-11 |
| CVE-2025-66628 |
ImageMagick is a software suite to create, edit, compose, or convert bitmap images. In versions 7.1.2-9 and prior, the TIM (PSX TIM) image parser contains a critical integer overflow vulnerability in its ReadTIMImage function (coders/tim.c). The code reads width and height (16-bit values) from the file header and calculates image_size = 2 * width * height without checking for overflow. On 32-bit systems (or where size_t is 32-bit), this calculation can overflow if width and height are large (e.g., 65535), wrapping around to a small value. This results in a small heap allocation via AcquireQuantumMemory and later operations relying on the dimensions can trigger an out of bounds read. This issue is fixed in version 7.1.2-10.
|
2025-12-10 |
| CVE-2025-66004 |
A Path Traversal vulnerability in usbmuxd allows local users to escalate to the service user.
|
2025-12-10 |
| CVE-2023-53864 |
In the Linux kernel, the following vulnerability has been resolved:
drm/mxsfb: Disable overlay plane in mxsfb_plane_overlay_atomic_disable()
|
2025-12-09 |
| CVE-2022-50665 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: fix failed to find the peer with peer_id 0 when disconnected
|
2025-12-09 |
| CVE-2025-14324 |
JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 146, Firefox ESR < 115.31, and Firefox ESR < 140.6.
|
2025-12-09 |
| CVE-2022-50649 |
In the Linux kernel, the following vulnerability has been resolved:
power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type()
|
2025-12-09 |
| CVE-2022-50644 |
In the Linux kernel, the following vulnerability has been resolved:
clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe
|
2025-12-09 |
| CVE-2022-50660 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ipw2200: fix memory leak in ipw_wdev_init()
|
2025-12-09 |
| CVE-2022-50640 |
In the Linux kernel, the following vulnerability has been resolved:
mmc: core: Fix kernel panic when remove non-standard SDIO card
|
2025-12-09 |
| CVE-2023-53804 |
In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode()
|
2025-12-09 |
| CVE-2023-53811 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/irdma: Cap MSIX used to online CPUs + 1
|
2025-12-09 |
| CVE-2023-53851 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dp: Drop aux devices together with DP controller
|
2025-12-09 |
| CVE-2022-50641 |
In the Linux kernel, the following vulnerability has been resolved:
HSI: omap_ssi: Fix refcount leak in ssi_probe
|
2025-12-09 |
| CVE-2025-40339 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: fix nullptr err of vm_handle_moved
|
2025-12-09 |
| CVE-2025-14328 |
Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 146 and Firefox ESR < 140.6.
|
2025-12-09 |
| CVE-2025-40335 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: validate userq input args
|
2025-12-09 |
| CVE-2023-53854 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: mediatek: mt8186: Fix use-after-free in driver remove path
|
2025-12-09 |
| CVE-2023-53826 |
In the Linux kernel, the following vulnerability has been resolved:
ubi: Fix UAF wear-leveling entry in eraseblk_count_seq_show()
|
2025-12-09 |
| CVE-2023-53845 |
In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix infinite loop in nilfs_mdt_get_block()
|
2025-12-09 |
| CVE-2023-53827 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp}
|
2025-12-09 |
| CVE-2022-50653 |
In the Linux kernel, the following vulnerability has been resolved:
mmc: atmel-mci: fix return value check of mmc_add_host()
|
2025-12-09 |
| CVE-2023-53818 |
In the Linux kernel, the following vulnerability has been resolved:
ARM: zynq: Fix refcount leak in zynq_early_slcr_init
|
2025-12-09 |
| CVE-2023-53844 |
In the Linux kernel, the following vulnerability has been resolved:
drm/ttm: Don't leak a resource on swapout move error
|
2025-12-09 |
| CVE-2023-53789 |
In the Linux kernel, the following vulnerability has been resolved:
iommu/amd: Improve page fault error reporting
|
2025-12-09 |
| CVE-2023-53841 |
In the Linux kernel, the following vulnerability has been resolved:
devlink: report devlink_port_type_warn source device
|
2025-12-09 |
| CVE-2025-40327 |
In the Linux kernel, the following vulnerability has been resolved:
perf/core: Fix system hang caused by cpu-clock usage
|
2025-12-09 |
| CVE-2022-50679 |
In the Linux kernel, the following vulnerability has been resolved:
i40e: Fix DMA mappings leak
|
2025-12-09 |
| CVE-2023-53800 |
In the Linux kernel, the following vulnerability has been resolved:
ubi: Fix use-after-free when volume resizing failed
|
2025-12-09 |
| CVE-2023-53842 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove
|
2025-12-09 |
| CVE-2025-2296 |
EDK2 contains a vulnerability in BIOS where an attacker may cause “ Improper Input Validation” by local access. Successful exploitation of this vulnerability could alter control flow in unexpected ways, potentially allowing arbitrary command execution and impacting Confidentiality, Integrity, and Availability.
|
2025-12-09 |
| CVE-2025-14331 |
Same-origin policy bypass in the Request Handling component. This vulnerability affects Firefox < 146, Firefox ESR < 115.31, and Firefox ESR < 140.6.
|
2025-12-09 |
| CVE-2023-53779 |
In the Linux kernel, the following vulnerability has been resolved:
mfd: dln2: Fix memory leak in dln2_probe()
|
2025-12-09 |
| CVE-2024-38798 |
EDK2 contains a vulnerability in BIOS where an attacker may cause “Exposure of Sensitive Information to an Unauthorized Actor” by local access. Successful exploitation of this vulnerability will lead to possible information disclosure or escalation of privilege and impact Confidentiality.
|
2025-12-09 |
| CVE-2023-53831 |
In the Linux kernel, the following vulnerability has been resolved:
net: read sk->sk_family once in sk_mc_loop()
|
2025-12-09 |
| CVE-2023-53793 |
In the Linux kernel, the following vulnerability has been resolved:
perf tool x86: Fix perf_env memory leak
|
2025-12-09 |
| CVE-2022-50674 |
In the Linux kernel, the following vulnerability has been resolved:
riscv: vdso: fix NULL deference in vdso_join_timens() when vfork
|
2025-12-09 |
| CVE-2025-40332 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix mmap write lock not release
|
2025-12-09 |
| CVE-2023-53817 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
|
2025-12-09 |
| CVE-2023-53792 |
In the Linux kernel, the following vulnerability has been resolved:
nvme-core: fix memory leak in dhchap_ctrl_secret
|
2025-12-09 |
| CVE-2022-50635 |
In the Linux kernel, the following vulnerability has been resolved:
powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe()
|
2025-12-09 |
| CVE-2023-53850 |
In the Linux kernel, the following vulnerability has been resolved:
iavf: use internal state to free traffic IRQs
|
2025-12-09 |
| CVE-2023-53852 |
In the Linux kernel, the following vulnerability has been resolved:
nvme-core: fix memory leak in dhchap_secret_store
|
2025-12-09 |
| CVE-2023-53823 |
In the Linux kernel, the following vulnerability has been resolved:
block/rq_qos: protect rq_qos apis with a new lock
|
2025-12-09 |
| CVE-2023-53833 |
In the Linux kernel, the following vulnerability has been resolved:
drm/i915: Fix NULL ptr deref by checking new_crtc_state
|
2025-12-09 |
| CVE-2023-53856 |
In the Linux kernel, the following vulnerability has been resolved:
of: overlay: Call of_changeset_init() early
|
2025-12-09 |
| CVE-2022-50639 |
In the Linux kernel, the following vulnerability has been resolved:
io-wq: Fix memory leak in worker creation
|
2025-12-09 |
| CVE-2022-50654 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix panic due to wrong pageattr of im->image
|
2025-12-09 |
| CVE-2025-14087 |
Buffer underflow on Glib through glib/gvariant via bytestring_parse() or string_parse() leads to OOB Write.
|
2025-12-09 |
| CVE-2025-14329 |
Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 146 and Firefox ESR < 140.6.
|
2025-12-09 |
| CVE-2023-53807 |
In the Linux kernel, the following vulnerability has been resolved:
clk: clocking-wizard: Fix Oops in clk_wzrd_register_divider()
|
2025-12-09 |
| CVE-2023-53819 |
In the Linux kernel, the following vulnerability has been resolved:
amdgpu: validate offset_in_bo of drm_amdgpu_gem_va
|
2025-12-09 |
| CVE-2025-14332 |
Memory safety bugs present in Firefox 145 and Thunderbird 145. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 146.
|
2025-12-09 |
| CVE-2025-40333 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix infinite loop in __insert_extent_tree()
|
2025-12-09 |
| CVE-2023-53778 |
In the Linux kernel, the following vulnerability has been resolved:
accel/qaic: Clean up integer overflow checking in map_user_pages()
|
2025-12-09 |
| CVE-2023-53808 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mwifiex: fix memory leak in mwifiex_histogram_read()
|
2025-12-09 |
| CVE-2023-53812 |
In the Linux kernel, the following vulnerability has been resolved:
media: mediatek: vcodec: fix decoder disable pm crash
|
2025-12-09 |
| CVE-2022-50677 |
In the Linux kernel, the following vulnerability has been resolved:
ipmi: fix use after free in _ipmi_destroy_user()
|
2025-12-09 |
| CVE-2023-53863 |
In the Linux kernel, the following vulnerability has been resolved:
netlink: do not hard code device address lenth in fdb dumps
|
2025-12-09 |
| CVE-2023-53853 |
In the Linux kernel, the following vulnerability has been resolved:
netlink: annotate accesses to nlk->cb_running
|
2025-12-09 |
| CVE-2023-53795 |
In the Linux kernel, the following vulnerability has been resolved:
iommufd: IOMMUFD_DESTROY should not increase the refcount
|
2025-12-09 |
| CVE-2023-53816 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: fix potential kgd_mem UAFs
|
2025-12-09 |
| CVE-2025-14327 |
Spoofing issue in the Downloads Panel component. This vulnerability affects Firefox < 146.
|
2025-12-09 |
| CVE-2022-50642 |
In the Linux kernel, the following vulnerability has been resolved:
platform/chrome: cros_ec_typec: zero out stale pointers
|
2025-12-09 |
| CVE-2025-40330 |
In the Linux kernel, the following vulnerability has been resolved:
bnxt_en: Shutdown FW DMA in bnxt_shutdown()
|
2025-12-09 |
| CVE-2023-53798 |
In the Linux kernel, the following vulnerability has been resolved:
ethtool: Fix uninitialized number of lanes
|
2025-12-09 |
| CVE-2023-53806 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: populate subvp cmd info only for the top pipe
|
2025-12-09 |
| CVE-2025-14321 |
Use-after-free in the WebRTC: Signaling component. This vulnerability affects Firefox < 146 and Firefox ESR < 140.6.
|
2025-12-09 |
| CVE-2023-53814 |
In the Linux kernel, the following vulnerability has been resolved:
PCI: Fix dropping valid root bus resources with .end = zero
|
2025-12-09 |
| CVE-2022-50643 |
In the Linux kernel, the following vulnerability has been resolved:
cifs: Fix xid leak in cifs_copy_file_range()
|
2025-12-09 |
| CVE-2023-53825 |
In the Linux kernel, the following vulnerability has been resolved:
kcm: Fix error handling for SOCK_DGRAM in kcm_sendmsg().
|
2025-12-09 |
| CVE-2022-50633 |
In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: qcom: Fix memory leak in dwc3_qcom_interconnect_init
|
2025-12-09 |
| CVE-2022-50634 |
In the Linux kernel, the following vulnerability has been resolved:
power: supply: cw2015: Fix potential null-ptr-deref in cw_bat_probe()
|
2025-12-09 |
| CVE-2022-50664 |
In the Linux kernel, the following vulnerability has been resolved:
media: dvb-frontends: fix leak of memory fw
|
2025-12-09 |
| CVE-2022-50673 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix use-after-free in ext4_orphan_cleanup
|
2025-12-09 |
| CVE-2023-53861 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: correct grp validation in ext4_mb_good_group
|
2025-12-09 |
| CVE-2023-53848 |
In the Linux kernel, the following vulnerability has been resolved:
md/raid5-cache: fix a deadlock in r5l_exit_log()
|
2025-12-09 |
| CVE-2022-50676 |
In the Linux kernel, the following vulnerability has been resolved:
net: rds: don't hold sock lock when cancelling work from rds_tcp_reset_callbacks()
|
2025-12-09 |
| CVE-2023-53849 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm: fix workqueue leak on bind errors
|
2025-12-09 |
| CVE-2023-53802 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function
|
2025-12-09 |
| CVE-2022-50672 |
In the Linux kernel, the following vulnerability has been resolved:
mailbox: zynq-ipi: fix error handling while device_register() fails
|
2025-12-09 |
| CVE-2023-53858 |
In the Linux kernel, the following vulnerability has been resolved:
tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error
|
2025-12-09 |
| CVE-2022-50663 |
In the Linux kernel, the following vulnerability has been resolved:
net: stmmac: fix possible memory leak in stmmac_dvr_probe()
|
2025-12-09 |
| CVE-2023-53801 |
In the Linux kernel, the following vulnerability has been resolved:
iommu/sprd: Release dma buffer to avoid memory leak
|
2025-12-09 |
| CVE-2023-53799 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: api - Use work queue in crypto_destroy_instance
|
2025-12-09 |
| CVE-2023-53834 |
In the Linux kernel, the following vulnerability has been resolved:
iio: adc: ina2xx: avoid NULL pointer dereference on OF device match
|
2025-12-09 |
| CVE-2023-53783 |
In the Linux kernel, the following vulnerability has been resolved:
blk-iocost: fix divide by 0 error in calc_lcoefs()
|
2025-12-09 |
| CVE-2025-40337 |
In the Linux kernel, the following vulnerability has been resolved:
net: stmmac: Correctly handle Rx checksum offload errors
|
2025-12-09 |
| CVE-2023-53836 |
In the Linux kernel, the following vulnerability has been resolved:
bpf, sockmap: Fix skb refcnt race after locking changes
|
2025-12-09 |
| CVE-2023-53820 |
In the Linux kernel, the following vulnerability has been resolved:
loop: loop_set_status_from_info() check before assignment
|
2025-12-09 |
| CVE-2023-53838 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: synchronize atomic write aborts
|
2025-12-09 |
| CVE-2025-40338 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: Intel: avs: Do not share the name pointer between components
|
2025-12-09 |
| CVE-2022-50655 |
In the Linux kernel, the following vulnerability has been resolved:
ppp: associate skb with a device at tx
|
2025-12-09 |
| CVE-2023-53796 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix information leak in f2fs_move_inline_dirents()
|
2025-12-09 |
| CVE-2025-40336 |
In the Linux kernel, the following vulnerability has been resolved:
drm/gpusvm: fix hmm_pfn_to_map_order() usage
|
2025-12-09 |
| CVE-2025-40328 |
In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in smb2_close_cached_fid()
|
2025-12-09 |
| CVE-2023-53791 |
In the Linux kernel, the following vulnerability has been resolved:
md: fix warning for holder mismatch from export_rdev()
|
2025-12-09 |
| CVE-2022-50648 |
In the Linux kernel, the following vulnerability has been resolved:
ftrace: Fix recursive locking direct_mutex in ftrace_modify_direct_caller
|
2025-12-09 |
| CVE-2023-53809 |
In the Linux kernel, the following vulnerability has been resolved:
l2tp: Avoid possible recursive deadlock in l2tp_tunnel_register()
|
2025-12-09 |
| CVE-2025-14333 |
Memory safety bugs present in Firefox ESR 140.5, Thunderbird ESR 140.5, Firefox 145 and Thunderbird 145. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 146 and Firefox ESR < 140.6.
|
2025-12-09 |
| CVE-2022-50662 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/hns: fix memory leak in hns_roce_alloc_mr()
|
2025-12-09 |
| CVE-2023-53855 |
In the Linux kernel, the following vulnerability has been resolved:
net: dsa: ocelot: call dsa_tag_8021q_unregister() under rtnl_lock() on driver remove
|
2025-12-09 |
| CVE-2022-50647 |
In the Linux kernel, the following vulnerability has been resolved:
RISC-V: Make port I/O string accessors actually work
|
2025-12-09 |
| CVE-2023-53784 |
In the Linux kernel, the following vulnerability has been resolved:
drm: bridge: dw_hdmi: fix connector access for scdc
|
2025-12-09 |
| CVE-2023-53839 |
In the Linux kernel, the following vulnerability has been resolved:
dccp: fix data-race around dp->dccps_mss_cache
|
2025-12-09 |
| CVE-2023-53815 |
In the Linux kernel, the following vulnerability has been resolved:
posix-timers: Prevent RT livelock in itimer_delete()
|
2025-12-09 |
| CVE-2025-14326 |
Use-after-free in the Audio/Video: GMP component. This vulnerability affects Firefox < 146.
|
2025-12-09 |
| CVE-2023-53843 |
In the Linux kernel, the following vulnerability has been resolved:
net: openvswitch: reject negative ifindex
|
2025-12-09 |
| CVE-2025-14323 |
Privilege escalation in the DOM: Notifications component. This vulnerability affects Firefox < 146, Firefox ESR < 115.31, and Firefox ESR < 140.6.
|
2025-12-09 |
| CVE-2022-50637 |
In the Linux kernel, the following vulnerability has been resolved:
cpufreq: qcom-hw: Fix memory leak in qcom_cpufreq_hw_read_lut()
|
2025-12-09 |
| CVE-2025-40344 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: Intel: avs: Disable periods-elapsed work when closing PCM
|
2025-12-09 |
| CVE-2023-53859 |
In the Linux kernel, the following vulnerability has been resolved:
s390/idle: mark arch_cpu_idle() noinstr
|
2025-12-09 |
| CVE-2025-40334 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: validate userq buffer virtual address and size
|
2025-12-09 |
| CVE-2025-40340 |
In the Linux kernel, the following vulnerability has been resolved:
drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test.
|
2025-12-09 |
| CVE-2023-53860 |
In the Linux kernel, the following vulnerability has been resolved:
dm: don't attempt to queue IO under RCU protection
|
2025-12-09 |
| CVE-2023-53857 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: bpf_sk_storage: Fix invalid wait context lockdep report
|
2025-12-09 |
| CVE-2022-50650 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix reference state management for synchronous callbacks
|
2025-12-09 |
| CVE-2022-50661 |
In the Linux kernel, the following vulnerability has been resolved:
seccomp: Move copy_seccomp() to no failure path.
|
2025-12-09 |
| CVE-2022-50671 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/rxe: Fix "kernel NULL pointer dereference" error
|
2025-12-09 |
| CVE-2023-53832 |
In the Linux kernel, the following vulnerability has been resolved:
md/raid10: fix null-ptr-deref in raid10_sync_request
|
2025-12-09 |
| CVE-2023-53782 |
In the Linux kernel, the following vulnerability has been resolved:
dccp: Fix out of bounds access in DCCP error handler
|
2025-12-09 |
| CVE-2025-40342 |
In the Linux kernel, the following vulnerability has been resolved:
nvme-fc: use lock accessing port_state and rport state
|
2025-12-09 |
| CVE-2023-53830 |
In the Linux kernel, the following vulnerability has been resolved:
platform/x86: think-lmi: Fix memory leak when showing current settings
|
2025-12-09 |
| CVE-2023-53810 |
In the Linux kernel, the following vulnerability has been resolved:
blk-mq: release crypto keyslot before reporting I/O complete
|
2025-12-09 |
| CVE-2022-50670 |
In the Linux kernel, the following vulnerability has been resolved:
mmc: omap_hsmmc: fix return value check of mmc_add_host()
|
2025-12-09 |
| CVE-2022-50636 |
In the Linux kernel, the following vulnerability has been resolved:
PCI: Fix pci_device_is_present() for VFs by checking PF
|
2025-12-09 |
| CVE-2022-50658 |
In the Linux kernel, the following vulnerability has been resolved:
cpufreq: qcom: fix memory leak in error path
|
2025-12-09 |
| CVE-2025-14322 |
Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. This vulnerability affects Firefox < 146, Firefox ESR < 115.31, and Firefox ESR < 140.6.
|
2025-12-09 |
| CVE-2022-50638 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix bug_on in __es_tree_search caused by bad boot loader inode
|
2025-12-09 |
| CVE-2023-53837 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm: fix NULL-deref on snapshot tear down
|
2025-12-09 |
| CVE-2025-40331 |
In the Linux kernel, the following vulnerability has been resolved:
sctp: Prevent TOCTOU out-of-bounds write
|
2025-12-09 |
| CVE-2025-14325 |
JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 146 and Firefox ESR < 140.6.
|
2025-12-09 |
| CVE-2022-50646 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: hpsa: Fix possible memory leak in hpsa_init_one()
|
2025-12-09 |
| CVE-2023-53813 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix rbtree traversal bug in ext4_mb_use_preallocated
|
2025-12-09 |
| CVE-2022-50632 |
In the Linux kernel, the following vulnerability has been resolved:
drivers: perf: marvell_cn10k: Fix hotplug callback leak in tad_pmu_init()
|
2025-12-09 |
| CVE-2022-50666 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/siw: Fix QP destroy to wait for all references dropped.
|
2025-12-09 |
| CVE-2022-50656 |
In the Linux kernel, the following vulnerability has been resolved:
nfc: pn533: Clear nfc_target before being used
|
2025-12-09 |
| CVE-2023-53824 |
In the Linux kernel, the following vulnerability has been resolved:
netlink: annotate lockless accesses to nlk->max_recvmsg_len
|
2025-12-09 |
| CVE-2023-53781 |
In the Linux kernel, the following vulnerability has been resolved:
smc: Fix use-after-free in tcp_write_timer_handler().
|
2025-12-09 |
| CVE-2023-53829 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: flush inode if atomic file is aborted
|
2025-12-09 |
| CVE-2023-53790 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Zeroing allocated object from slab in bpf memory allocator
|
2025-12-09 |
| CVE-2023-53846 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to do sanity check on direct node in truncate_dnode()
|
2025-12-09 |
| CVE-2023-53866 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: soc-compress: Reposition and add pcm_mutex
|
2025-12-09 |
| CVE-2022-50675 |
In the Linux kernel, the following vulnerability has been resolved:
arm64: mte: Avoid setting PG_mte_tagged if no tags cleared or restored
|
2025-12-09 |
| CVE-2022-50651 |
In the Linux kernel, the following vulnerability has been resolved:
ethtool: eeprom: fix null-deref on genl_info in dump
|
2025-12-09 |
| CVE-2023-53777 |
In the Linux kernel, the following vulnerability has been resolved:
erofs: kill hooked chains to avoid loops on deduplicated compressed images
|
2025-12-09 |
| CVE-2023-53822 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: Ignore frags from uninitialized peer in dp.
|
2025-12-09 |
| CVE-2022-50659 |
In the Linux kernel, the following vulnerability has been resolved:
hwrng: geode - Fix PCI device refcount leak
|
2025-12-09 |
| CVE-2023-53862 |
In the Linux kernel, the following vulnerability has been resolved:
hfs: fix missing hfs_bnode_get() in __hfs_bnode_create
|
2025-12-09 |
| CVE-2022-50645 |
In the Linux kernel, the following vulnerability has been resolved:
EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper()
|
2025-12-09 |
| CVE-2023-53780 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: fix FCLK pstate change underflow
|
2025-12-09 |
| CVE-2022-50669 |
In the Linux kernel, the following vulnerability has been resolved:
misc: ocxl: fix possible name leak in ocxl_file_register_afu()
|
2025-12-09 |
| CVE-2025-40329 |
In the Linux kernel, the following vulnerability has been resolved:
drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb
|
2025-12-09 |
| CVE-2022-50668 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix deadlock due to mbcache entry corruption
|
2025-12-09 |
| CVE-2023-53785 |
In the Linux kernel, the following vulnerability has been resolved:
mt76: mt7921: don't assume adequate headroom for SDIO headers
|
2025-12-09 |
| CVE-2022-50631 |
In the Linux kernel, the following vulnerability has been resolved:
RISC-V: kexec: Fix memory leak of fdt buffer
|
2025-12-09 |
| CVE-2023-53828 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor()
|
2025-12-09 |
| CVE-2023-53786 |
In the Linux kernel, the following vulnerability has been resolved:
dm flakey: fix a crash with invalid table line
|
2025-12-09 |
| CVE-2022-50667 |
In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx: Fix memory leak in vmw_mksstat_add_ioctl()
|
2025-12-09 |
| CVE-2023-53794 |
In the Linux kernel, the following vulnerability has been resolved:
cifs: fix session state check in reconnect to avoid use-after-free issue
|
2025-12-09 |
| CVE-2023-53797 |
In the Linux kernel, the following vulnerability has been resolved:
HID: wacom: Use ktime_t rather than int when dealing with timestamps
|
2025-12-09 |
| CVE-2025-40343 |
In the Linux kernel, the following vulnerability has been resolved:
nvmet-fc: avoid scheduling association deletion twice
|
2025-12-09 |
| CVE-2023-53787 |
In the Linux kernel, the following vulnerability has been resolved:
regulator: da9063: fix null pointer deref with partial DT config
|
2025-12-09 |
| CVE-2023-53865 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix warning when putting transaction with qgroups enabled after abort
|
2025-12-09 |
| CVE-2023-53803 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process()
|
2025-12-09 |
| CVE-2025-40341 |
In the Linux kernel, the following vulnerability has been resolved:
futex: Don't leak robust_list pointer on exec race
|
2025-12-09 |
| CVE-2025-14330 |
JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 146 and Firefox ESR < 140.6.
|
2025-12-09 |
| CVE-2023-53847 |
In the Linux kernel, the following vulnerability has been resolved:
usb-storage: alauda: Fix uninit-value in alauda_check_media()
|
2025-12-09 |
| CVE-2023-53821 |
In the Linux kernel, the following vulnerability has been resolved:
ip6_vti: fix slab-use-after-free in decode_session6
|
2025-12-09 |
| CVE-2023-53788 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set()
|
2025-12-09 |
| CVE-2023-53840 |
In the Linux kernel, the following vulnerability has been resolved:
usb: early: xhci-dbc: Fix a potential out-of-bound memory access
|
2025-12-09 |
| CVE-2022-50678 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: brcmfmac: fix invalid address access when enabling SCAN log level
|
2025-12-09 |
| CVE-2022-50652 |
In the Linux kernel, the following vulnerability has been resolved:
uio: uio_dmem_genirq: Fix missing unlock in irq configuration
|
2025-12-09 |
| CVE-2022-50657 |
In the Linux kernel, the following vulnerability has been resolved:
riscv: mm: add missing memcpy in kasan_init
|
2025-12-09 |
| CVE-2025-40296 |
In the Linux kernel, the following vulnerability has been resolved:
platform/x86: int3472: Fix double free of GPIO device during unregister
|
2025-12-08 |
| CVE-2025-40302 |
In the Linux kernel, the following vulnerability has been resolved:
media: videobuf2: forbid remove_bufs when legacy fileio is active
|
2025-12-08 |
| CVE-2025-40322 |
In the Linux kernel, the following vulnerability has been resolved:
fbdev: bitblit: bound-check glyph index in bit_putcs*
|
2025-12-08 |
| CVE-2022-50619 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix memory leak in kfd_mem_dmamap_userptr()
|
2025-12-08 |
| CVE-2022-50618 |
In the Linux kernel, the following vulnerability has been resolved:
mmc: meson-gx: fix return value check of mmc_add_host()
|
2025-12-08 |
| CVE-2022-50616 |
In the Linux kernel, the following vulnerability has been resolved:
regulator: core: Use different devices for resource allocation and DT lookup
|
2025-12-08 |
| CVE-2025-40309 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: SCO: Fix UAF on sco_conn_free
|
2025-12-08 |
| CVE-2022-50620 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to invalidate dcc->f2fs_issue_discard in error path
|
2025-12-08 |
| CVE-2025-40320 |
In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential cfid UAF in smb2_query_info_compound
|
2025-12-08 |
| CVE-2023-53758 |
In the Linux kernel, the following vulnerability has been resolved:
spi: atmel-quadspi: Free resources even if runtime resume failed in .remove()
|
2025-12-08 |
| CVE-2025-40305 |
In the Linux kernel, the following vulnerability has been resolved:
9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN
|
2025-12-08 |
| CVE-2025-40326 |
In the Linux kernel, the following vulnerability has been resolved:
NFSD: Define actions for the new time_deleg FATTR4 attributes
|
2025-12-08 |
| CVE-2025-40318 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once
|
2025-12-08 |
| CVE-2025-40291 |
In the Linux kernel, the following vulnerability has been resolved:
io_uring: fix regbuf vector size truncation
|
2025-12-08 |
| CVE-2022-50623 |
In the Linux kernel, the following vulnerability has been resolved:
fpga: prevent integer overflow in dfl_feature_ioctl_set_irq()
|
2025-12-08 |
| CVE-2022-50630 |
In the Linux kernel, the following vulnerability has been resolved:
mm: hugetlb: fix UAF in hugetlb_handle_userfault
|
2025-12-08 |
| CVE-2023-53764 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Handle lock during peer_id find
|
2025-12-08 |
| CVE-2025-40295 |
In the Linux kernel, the following vulnerability has been resolved:
fscrypt: fix left shift underflow when inode->i_blkbits > PAGE_SHIFT
|
2025-12-08 |
| CVE-2023-53747 |
In the Linux kernel, the following vulnerability has been resolved:
vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF
|
2025-12-08 |
| CVE-2025-40304 |
In the Linux kernel, the following vulnerability has been resolved:
fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds
|
2025-12-08 |
| CVE-2023-53750 |
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: freescale: Fix a memory out of bounds when num_configs is 1
|
2025-12-08 |
| CVE-2025-40324 |
In the Linux kernel, the following vulnerability has been resolved:
NFSD: Fix crash in nfsd4_read_release()
|
2025-12-08 |
| CVE-2025-40323 |
In the Linux kernel, the following vulnerability has been resolved:
fbcon: Set fb_display[i]->mode to NULL when the mode is released
|
2025-12-08 |
| CVE-2022-50625 |
In the Linux kernel, the following vulnerability has been resolved:
serial: amba-pl011: avoid SBSA UART accessing DMACR register
|
2025-12-08 |
| CVE-2023-53759 |
In the Linux kernel, the following vulnerability has been resolved:
HID: hidraw: fix data race on device refcount
|
2025-12-08 |
| CVE-2022-50629 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: rsi: Fix memory leak in rsi_coex_attach()
|
2025-12-08 |
| CVE-2025-40297 |
In the Linux kernel, the following vulnerability has been resolved:
net: bridge: fix use-after-free due to MST port state bypass
|
2025-12-08 |
| CVE-2025-40321 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode
|
2025-12-08 |
| CVE-2023-53757 |
In the Linux kernel, the following vulnerability has been resolved:
irqchip/irq-mvebu-gicp: Fix refcount leak in mvebu_gicp_probe
|
2025-12-08 |
| CVE-2023-53751 |
In the Linux kernel, the following vulnerability has been resolved:
cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname
|
2025-12-08 |
| CVE-2025-40299 |
In the Linux kernel, the following vulnerability has been resolved:
gve: Implement gettimex64 with -EOPNOTSUPP
|
2025-12-08 |
| CVE-2022-50624 |
In the Linux kernel, the following vulnerability has been resolved:
net: netsec: fix error handling in netsec_register_mdio()
|
2025-12-08 |
| CVE-2022-50614 |
In the Linux kernel, the following vulnerability has been resolved:
misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic
|
2025-12-08 |
| CVE-2025-40315 |
In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: f_fs: Fix epfile null pointer access after ep enable.
|
2025-12-08 |
| CVE-2025-40314 |
In the Linux kernel, the following vulnerability has been resolved:
usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget
|
2025-12-08 |
| CVE-2025-40319 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Sync pending IRQ work before freeing ring buffer
|
2025-12-08 |
| CVE-2023-53756 |
In the Linux kernel, the following vulnerability has been resolved:
KVM: VMX: Fix crash due to uninitialized current_vmcs
|
2025-12-08 |
| CVE-2023-53744 |
In the Linux kernel, the following vulnerability has been resolved:
soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe
|
2025-12-08 |
| CVE-2025-40311 |
In the Linux kernel, the following vulnerability has been resolved:
accel/habanalabs: support mapping cb with vmalloc-backed coherent memory
|
2025-12-08 |
| CVE-2025-40292 |
In the Linux kernel, the following vulnerability has been resolved:
virtio-net: fix received length check in big packets
|
2025-12-08 |
| CVE-2023-53760 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: ufs: core: mcq: Fix &hwq->cq_lock deadlock issue
|
2025-12-08 |
| CVE-2022-50615 |
In the Linux kernel, the following vulnerability has been resolved:
perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map()
|
2025-12-08 |
| CVE-2025-40294 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern()
|
2025-12-08 |
| CVE-2023-53748 |
In the Linux kernel, the following vulnerability has been resolved:
media: mediatek: vcodec: Fix potential array out-of-bounds in decoder queue_setup
|
2025-12-08 |
| CVE-2025-40313 |
In the Linux kernel, the following vulnerability has been resolved:
ntfs3: pretend $Extend records as regular files
|
2025-12-08 |
| CVE-2023-53753 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: fix mapping to non-allocated address
|
2025-12-08 |
| CVE-2022-50622 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix potential memory leak in ext4_fc_record_modified_inode()
|
2025-12-08 |
| CVE-2022-50627 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: fix monitor mode bringup crash
|
2025-12-08 |
| CVE-2022-50628 |
In the Linux kernel, the following vulnerability has been resolved:
drm/gud: Fix UBSAN warning
|
2025-12-08 |
| CVE-2023-53765 |
In the Linux kernel, the following vulnerability has been resolved:
dm cache: free background tracker's queued work in btracker_destroy
|
2025-12-08 |
| CVE-2025-40301 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_event: validate skb length for unknown CC opcode
|
2025-12-08 |
| CVE-2025-40293 |
In the Linux kernel, the following vulnerability has been resolved:
iommufd: Don't overflow during division for dirty tracking
|
2025-12-08 |
| CVE-2023-53742 |
In the Linux kernel, the following vulnerability has been resolved:
kcsan: Avoid READ_ONCE() in read_instrumented_memory()
|
2025-12-08 |
| CVE-2025-40312 |
In the Linux kernel, the following vulnerability has been resolved:
jfs: Verify inode mode when loading from disk
|
2025-12-08 |
| CVE-2025-40317 |
In the Linux kernel, the following vulnerability has been resolved:
regmap: slimbus: fix bus_context pointer in regmap init calls
|
2025-12-08 |
| CVE-2023-53755 |
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: ptdma: check for null desc before calling pt_cmd_callback
|
2025-12-08 |
| CVE-2022-50626 |
In the Linux kernel, the following vulnerability has been resolved:
media: dvb-usb: fix memory leak in dvb_usb_adapter_init()
|
2025-12-08 |
| CVE-2023-53769 |
In the Linux kernel, the following vulnerability has been resolved:
virt/coco/sev-guest: Double-buffer messages
|
2025-12-08 |
| CVE-2025-62408 |
Use after free due to connection being cleaned up after error
|
2025-12-08 |
| CVE-2023-53767 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix memory leak in ath12k_qmi_driver_event_work()
|
2025-12-08 |
| CVE-2025-40310 |
In the Linux kernel, the following vulnerability has been resolved:
amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw
|
2025-12-08 |
| CVE-2023-53749 |
In the Linux kernel, the following vulnerability has been resolved:
x86: fix clear_user_rep_good() exception handling annotation
|
2025-12-08 |
| CVE-2023-53762 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync
|
2025-12-08 |
| CVE-2023-53752 |
In the Linux kernel, the following vulnerability has been resolved:
net: deal with integer overflows in kmalloc_reserve()
|
2025-12-08 |
| CVE-2025-40303 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: ensure no dirty metadata is written back for an fs with errors
|
2025-12-08 |
| CVE-2023-53763 |
In the Linux kernel, the following vulnerability has been resolved:
Revert "f2fs: fix to do sanity check on extent cache correctly"
|
2025-12-08 |
| CVE-2023-53768 |
In the Linux kernel, the following vulnerability has been resolved:
regmap-irq: Fix out-of-bounds access when allocating config buffers
|
2025-12-08 |
| CVE-2023-53745 |
In the Linux kernel, the following vulnerability has been resolved:
um: vector: Fix memory leak in vector_config
|
2025-12-08 |
| CVE-2025-40306 |
In the Linux kernel, the following vulnerability has been resolved:
orangefs: fix xattr related buffer overflow...
|
2025-12-08 |
| CVE-2023-53746 |
In the Linux kernel, the following vulnerability has been resolved:
s390/vfio-ap: fix memory leak in vfio_ap device driver
|
2025-12-08 |
| CVE-2025-40316 |
In the Linux kernel, the following vulnerability has been resolved:
drm/mediatek: Fix device use-after-free on unbind
|
2025-12-08 |
| CVE-2025-40290 |
In the Linux kernel, the following vulnerability has been resolved:
xsk: avoid data corruption on cq descriptor number
|
2025-12-08 |
| CVE-2023-53761 |
In the Linux kernel, the following vulnerability has been resolved:
USB: usbtmc: Fix direction for 0-length ioctl control messages
|
2025-12-08 |
| CVE-2022-50621 |
In the Linux kernel, the following vulnerability has been resolved:
dm: verity-loadpin: Only trust verity targets with enforcement
|
2025-12-08 |
| CVE-2022-50583 |
In the Linux kernel, the following vulnerability has been resolved:
md/raid0, raid10: Don't set discard sectors for request queue
|
2025-12-08 |
| CVE-2023-53754 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup()
|
2025-12-08 |
| CVE-2025-40307 |
In the Linux kernel, the following vulnerability has been resolved:
exfat: validate cluster allocation bits of the allocation bitmap
|
2025-12-08 |
| CVE-2023-53766 |
In the Linux kernel, the following vulnerability has been resolved:
FS: JFS: Check for read-only mounted filesystem in txBegin
|
2025-12-08 |
| CVE-2025-40298 |
In the Linux kernel, the following vulnerability has been resolved:
gve: Implement settime64 with -EOPNOTSUPP
|
2025-12-08 |
| CVE-2022-50617 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu/powerplay/psm: Fix memory leak in power state init
|
2025-12-08 |
| CVE-2025-40308 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: bcsp: receive data only if registered
|
2025-12-08 |
| CVE-2023-53743 |
In the Linux kernel, the following vulnerability has been resolved:
PCI: Free released resource after coalescing
|
2025-12-08 |
| CVE-2025-40268 |
In the Linux kernel, the following vulnerability has been resolved:
cifs: client: fix memory leak in smb3_fs_context_parse_param
|
2025-12-06 |
| CVE-2025-40289 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM
|
2025-12-06 |
| CVE-2025-40270 |
In the Linux kernel, the following vulnerability has been resolved:
mm, swap: fix potential UAF issue for VMA readahead
|
2025-12-06 |
| CVE-2025-40288 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices
|
2025-12-06 |
| CVE-2025-40284 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: MGMT: cancel mesh send timer when hdev removed
|
2025-12-06 |
| CVE-2025-40272 |
In the Linux kernel, the following vulnerability has been resolved:
mm/secretmem: fix use-after-free race in fault handler
|
2025-12-06 |
| CVE-2025-40283 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF
|
2025-12-06 |
| CVE-2025-40273 |
In the Linux kernel, the following vulnerability has been resolved:
NFSD: free copynotify stateid in nfs4_free_ol_stateid()
|
2025-12-06 |
| CVE-2025-40286 |
In the Linux kernel, the following vulnerability has been resolved:
smb/server: fix possible memory leak in smb2_read()
|
2025-12-06 |
| CVE-2025-40269 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix potential overflow of PCM transfer buffer
|
2025-12-06 |
| CVE-2025-40276 |
In the Linux kernel, the following vulnerability has been resolved:
drm/panthor: Flush shmem writes before mapping buffers CPU-uncached
|
2025-12-06 |
| CVE-2025-40285 |
In the Linux kernel, the following vulnerability has been resolved:
smb/server: fix possible refcount leak in smb2_sess_setup()
|
2025-12-06 |
| CVE-2025-40282 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: 6lowpan: reset link-local header on ipv6 recv path
|
2025-12-06 |
| CVE-2025-40277 |
In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE
|
2025-12-06 |
| CVE-2025-40281 |
In the Linux kernel, the following vulnerability has been resolved:
sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto
|
2025-12-06 |
| CVE-2025-40278 |
In the Linux kernel, the following vulnerability has been resolved:
net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak
|
2025-12-06 |
| CVE-2025-40287 |
In the Linux kernel, the following vulnerability has been resolved:
exfat: fix improper check of dentry.stream.valid_size
|
2025-12-06 |
| CVE-2025-40279 |
In the Linux kernel, the following vulnerability has been resolved:
net: sched: act_connmark: initialize struct tc_ife to fix kernel leak
|
2025-12-06 |
| CVE-2025-40274 |
In the Linux kernel, the following vulnerability has been resolved:
KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying
|
2025-12-06 |
| CVE-2025-40275 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd
|
2025-12-06 |
| CVE-2025-40280 |
In the Linux kernel, the following vulnerability has been resolved:
tipc: Fix use-after-free in tipc_mon_reinit_self().
|
2025-12-06 |
| CVE-2025-40271 |
In the Linux kernel, the following vulnerability has been resolved:
fs/proc: fix uaf in proc_readdir_de()
|
2025-12-06 |
| CVE-2025-40267 |
In the Linux kernel, the following vulnerability has been resolved:
io_uring/rw: ensure allocated iovec gets cleared for early failure
|
2025-12-06 |
| CVE-2025-14104 |
A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.
|
2025-12-05 |
| CVE-2025-58098 |
Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives.
|
2025-12-05 |
| CVE-2025-55753 |
An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.
This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.
Users are recommended to upgrade to version 2.4.66, which fixes the issue.
|
2025-12-05 |
| CVE-2025-59775 |
Server-Side Request Forgery (SSRF) vulnerability
in Apache HTTP Server on Windows
with AllowEncodedSlashes On and MergeSlashes Off allows to potentially leak NTLM
hashes to a malicious server via SSRF and malicious requests or content
Users are recommended to upgrade to version 2.4.66, which fixes the issue.
|
2025-12-05 |
| CVE-2025-66471 |
urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.
|
2025-12-05 |
| CVE-2025-66200 |
mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.
|
2025-12-05 |
| CVE-2025-66418 |
urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.
|
2025-12-05 |
| CVE-2025-65082 |
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.
This issue affects Apache HTTP Server from 2.4.0 through 2.4.65.
Users are recommended to upgrade to version 2.4.66 which fixes the issue.
|
2025-12-05 |
| CVE-2025-40228 |
In the Linux kernel, the following vulnerability has been resolved:
mm/damon/sysfs: catch commit test ctx alloc failure
|
2025-12-04 |
| CVE-2025-40229 |
In the Linux kernel, the following vulnerability has been resolved:
mm/damon/core: fix potential memory leak by cleaning ops_filter in damon_destroy_scheme
|
2025-12-04 |
| CVE-2025-40259 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: sg: Do not sleep in atomic context
|
2025-12-04 |
| CVE-2025-40246 |
In the Linux kernel, the following vulnerability has been resolved:
xfs: fix out of bounds memory read error in symlink repair
|
2025-12-04 |
| CVE-2025-40216 |
In the Linux kernel, the following vulnerability has been resolved:
io_uring/rsrc: don't rely on user vaddr alignment
|
2025-12-04 |
| CVE-2025-40242 |
In the Linux kernel, the following vulnerability has been resolved:
gfs2: Fix unlikely race in gdlm_put_lock
|
2025-12-04 |
| CVE-2025-40250 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Clean up only new IRQ glue on request_irq() failure
|
2025-12-04 |
| CVE-2025-40248 |
In the Linux kernel, the following vulnerability has been resolved:
vsock: Ignore signal/timeout on connect() if already established
|
2025-12-04 |
| CVE-2025-40244 |
In the Linux kernel, the following vulnerability has been resolved:
hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()
|
2025-12-04 |
| CVE-2025-40265 |
In the Linux kernel, the following vulnerability has been resolved:
vfat: fix missing sb_min_blocksize() return value checks
|
2025-12-04 |
| CVE-2025-40238 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Fix IPsec cleanup over MPV device
|
2025-12-04 |
| CVE-2025-40239 |
In the Linux kernel, the following vulnerability has been resolved:
net: phy: micrel: always set shared->phydev for LAN8814
|
2025-12-04 |
| CVE-2025-40225 |
In the Linux kernel, the following vulnerability has been resolved:
drm/panthor: Fix kernel panic on partial unmap of a GPU VA region
|
2025-12-04 |
| CVE-2025-40251 |
In the Linux kernel, the following vulnerability has been resolved:
devlink: rate: Unset parent pointer in devl_rate_nodes_destroy
|
2025-12-04 |
| CVE-2025-40227 |
In the Linux kernel, the following vulnerability has been resolved:
mm/damon/sysfs: dealloc commit test ctx always
|
2025-12-04 |
| CVE-2025-40217 |
In the Linux kernel, the following vulnerability has been resolved:
pidfs: validate extensible ioctls
|
2025-12-04 |
| CVE-2025-66506 |
Fulcio is a free-to-use certificate authority for issuing code signing certificates for an OpenID Connect (OIDC) identity. Prior to 1.8.3, function identity.extractIssuerURL splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request with an (invalid) OIDC identity token in the payload containing many period characters, a call to extractIssuerURL incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This vulnerability is fixed in 1.8.3.
|
2025-12-04 |
| CVE-2025-40236 |
In the Linux kernel, the following vulnerability has been resolved:
virtio-net: zero unused hash fields
|
2025-12-04 |
| CVE-2025-40232 |
In the Linux kernel, the following vulnerability has been resolved:
rv: Fully convert enabled_monitors to use list_head as iterator
|
2025-12-04 |
| CVE-2025-40230 |
In the Linux kernel, the following vulnerability has been resolved:
mm: prevent poison consumption when splitting THP
|
2025-12-04 |
| CVE-2025-40264 |
In the Linux kernel, the following vulnerability has been resolved:
be2net: pass wrb_params in case of OS2BMC
|
2025-12-04 |
| CVE-2025-40214 |
In the Linux kernel, the following vulnerability has been resolved:
af_unix: Initialise scc_index in unix_add_edge().
|
2025-12-04 |
| CVE-2025-40234 |
In the Linux kernel, the following vulnerability has been resolved:
platform/x86: alienware-wmi-wmax: Fix NULL pointer dereference in sleep handlers
|
2025-12-04 |
| CVE-2025-40215 |
In the Linux kernel, the following vulnerability has been resolved:
xfrm: delete x->tunnel as we delete x
|
2025-12-04 |
| CVE-2025-40261 |
In the Linux kernel, the following vulnerability has been resolved:
nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl()
|
2025-12-04 |
| CVE-2025-40219 |
In the Linux kernel, the following vulnerability has been resolved:
PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV
|
2025-12-04 |
| CVE-2025-65637 |
A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with "token too long" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.
|
2025-12-04 |
| CVE-2025-40254 |
In the Linux kernel, the following vulnerability has been resolved:
net: openvswitch: remove never-working support for setting nsh fields
|
2025-12-04 |
| CVE-2025-40245 |
In the Linux kernel, the following vulnerability has been resolved:
nios2: ensure that memblock.current_limit is set when setting pfn limits
|
2025-12-04 |
| CVE-2025-40258 |
In the Linux kernel, the following vulnerability has been resolved:
mptcp: fix race condition in mptcp_schedule_work()
|
2025-12-04 |
| CVE-2025-40256 |
In the Linux kernel, the following vulnerability has been resolved:
xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added
|
2025-12-04 |
| CVE-2025-40252 |
In the Linux kernel, the following vulnerability has been resolved:
net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end()
|
2025-12-04 |
| CVE-2025-40255 |
In the Linux kernel, the following vulnerability has been resolved:
net: core: prevent NULL deref in generic_hwtstamp_ioctl_lower()
|
2025-12-04 |
| CVE-2025-66564 |
Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.
|
2025-12-04 |
| CVE-2025-14010 |
A flaw was found in ansible-collection-community-general. This vulnerability allows for information exposure (IE) of sensitive credentials, specifically plaintext passwords, via verbose output when running Ansible with debug modes. Attackers with access to logs could retrieve these secrets and potentially compromise Keycloak accounts or administrative access.
|
2025-12-04 |
| CVE-2025-40223 |
In the Linux kernel, the following vulnerability has been resolved:
most: usb: Fix use-after-free in hdm_disconnect
|
2025-12-04 |
| CVE-2025-40260 |
In the Linux kernel, the following vulnerability has been resolved:
sched_ext: Fix scx_enable() crash on helper kthread creation failure
|
2025-12-04 |
| CVE-2025-40220 |
In the Linux kernel, the following vulnerability has been resolved:
fuse: fix livelock in synchronous file put from fuseblk workers
|
2025-12-04 |
| CVE-2025-40266 |
In the Linux kernel, the following vulnerability has been resolved:
KVM: arm64: Check the untrusted offset in FF-A memory share
|
2025-12-04 |
| CVE-2025-66287 |
A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.
|
2025-12-04 |
| CVE-2025-40262 |
In the Linux kernel, the following vulnerability has been resolved:
Input: imx_sc_key - fix memory corruption on unload
|
2025-12-04 |
| CVE-2025-40224 |
In the Linux kernel, the following vulnerability has been resolved:
hwmon: (cgbc-hwmon) Add missing NULL check after devm_kzalloc()
|
2025-12-04 |
| CVE-2025-40240 |
In the Linux kernel, the following vulnerability has been resolved:
sctp: avoid NULL dereference when chunk data buffer is missing
|
2025-12-04 |
| CVE-2025-40235 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: directly free partially initialized fs_info in btrfs_check_leaked_roots()
|
2025-12-04 |
| CVE-2025-40231 |
In the Linux kernel, the following vulnerability has been resolved:
vsock: fix lock inversion in vsock_assign_transport()
|
2025-12-04 |
| CVE-2025-40243 |
In the Linux kernel, the following vulnerability has been resolved:
hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()
|
2025-12-04 |
| CVE-2025-40233 |
In the Linux kernel, the following vulnerability has been resolved:
ocfs2: clear extent cache after moving/defragmenting extents
|
2025-12-04 |
| CVE-2025-40263 |
In the Linux kernel, the following vulnerability has been resolved:
Input: cros_ec_keyb - fix an invalid memory access
|
2025-12-04 |
| CVE-2025-40222 |
In the Linux kernel, the following vulnerability has been resolved:
tty: serial: sh-sci: fix RSCI FIFO overrun handling
|
2025-12-04 |
| CVE-2025-40221 |
In the Linux kernel, the following vulnerability has been resolved:
media: pci: mg4b: fix uninitialized iio scan data
|
2025-12-04 |
| CVE-2025-40237 |
In the Linux kernel, the following vulnerability has been resolved:
fs/notify: call exportfs_encode_fid with s_umount
|
2025-12-04 |
| CVE-2025-40226 |
In the Linux kernel, the following vulnerability has been resolved:
firmware: arm_scmi: Account for failed debug initialization
|
2025-12-04 |
| CVE-2025-40253 |
In the Linux kernel, the following vulnerability has been resolved:
s390/ctcm: Fix double-kfree
|
2025-12-04 |
| CVE-2025-40249 |
In the Linux kernel, the following vulnerability has been resolved:
gpio: cdev: make sure the cdev fd is still active before emitting events
|
2025-12-04 |
| CVE-2025-40218 |
In the Linux kernel, the following vulnerability has been resolved:
mm/damon/vaddr: do not repeat pte_offset_map_lock() until success
|
2025-12-04 |
| CVE-2025-40257 |
In the Linux kernel, the following vulnerability has been resolved:
mptcp: fix a race in mptcp_pm_del_add_timer()
|
2025-12-04 |
| CVE-2025-40241 |
In the Linux kernel, the following vulnerability has been resolved:
erofs: fix crafted invalid cases for encoded extents
|
2025-12-04 |
| CVE-2025-40247 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm: Fix pgtable prealloc error path
|
2025-12-04 |
| CVE-2025-64527 |
Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, Envoy crashes when JWT authentication is configured with the remote JWKS fetching, allow_missing_or_failed is enabled, multiple JWT tokens are present in the request headers and the JWKS fetch fails. This is caused by a re-entry bug in the JwksFetcherImpl. When the first token's JWKS fetch fails, onJwksError() callback triggers processing of the second token, which calls fetch() again on the same fetcher object. The original callback's reset() then clears the second fetch's state (receiver_ and request_) which causes a crash when the async HTTP response arrives.
|
2025-12-03 |
| CVE-2025-12385 |
Allocation of Resources Without Limits or Throttling, Improper Validation of Specified Quantity in Input vulnerability in The Qt Company Qt on Windows, MacOS, Linux, iOS, Android, x86, ARM, 64 bit, 32 bit allows Excessive Allocation.
This issue affects users of the Text component in Qt Quick. Missing validation of the width and height in the <img> tag could cause an application to become unresponsive.
This issue affects Qt: from 5.0.0 through 6.5.10, from 6.6.0 through 6.8.5, from 6.9.0 through 6.10.0.
|
2025-12-03 |
| CVE-2025-61727 |
crypto/x509: excluded subdomain constraint does not restrict wildcard SANs
An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.
|
2025-12-03 |
| CVE-2025-13751 |
Interactive service agent in OpenVPN version 2.5.0 through 2.7_rc2 on Windows allows a local authenticated user to connect to the service and trigger an error causing a local denial of service.
|
2025-12-03 |
| CVE-2025-66453 |
Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.
|
2025-12-03 |
| CVE-2025-13947 |
A flaw was found in WebKitGTK. This vulnerability allows remote, user-assisted information disclosure that can reveal any file the user is permitted to read via abusing the file drag-and-drop mechanism where WebKitGTK does not verify that drag operations originate from outside the browser.
|
2025-12-03 |
| CVE-2025-66220 |
Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, Envoy’s mTLS certificate matcher for match_typed_subject_alt_names may incorrectly treat certificates containing an embedded null byte (\0) inside an OTHERNAME SAN value as valid matches.
|
2025-12-03 |
| CVE-2025-64763 |
Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, when Envoy is configured in TCP proxy mode to handle CONNECT requests, it accepts client data before issuing a 2xx response and forwards that data to the upstream TCP connection. If a forwarding proxy upstream from Envoy then responds with a non-2xx status, this can cause a de-synchronized CONNECT tunnel state. By default Envoy continues to allow early CONNECT data to avoid disrupting existing deployments. The envoy.reloadable_features.reject_early_connect_data runtime flag can be set to reject CONNECT requests that send data before a 2xx response when intermediaries upstream from Envoy may reject establishment of a CONNECT tunnel.
|
2025-12-03 |
| CVE-2025-13945 |
HTTP3 dissector crash in Wireshark 4.6.0 and 4.6.1 allows denial of service
|
2025-12-03 |
| CVE-2025-12084 |
When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.
|
2025-12-03 |
| CVE-2025-13946 |
MEGACO dissector infinite loop in Wireshark 4.6.0 to 4.6.1 and 4.4.0 to 4.4.11 allows denial of service
|
2025-12-03 |
| CVE-2025-66293 |
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng's simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng's internal state management. Upgrade to libpng 1.6.52 or later.
|
2025-12-03 |
| CVE-2025-65955 |
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.
|
2025-12-02 |
| CVE-2025-61729 |
Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
|
2025-12-02 |
| CVE-2025-66476 |
Vim is an open source, command line text editor. Prior to version 9.1.1947, an uncontrolled search path vulnerability on Windows allows Vim to execute malicious executables placed in the current working directory for the current edited file. On Windows, when using cmd.exe as a shell, Vim resolves external commands by searching the current working directory before system paths. When Vim invokes tools such as findstr for :grep, external commands or filters via :!, or compiler/:make commands, it may inadvertently run a malicious executable present in the same directory as the file being edited. The issue affects Vim for Windows prior to version 9.1.1947.
|
2025-12-02 |
| CVE-2025-13837 |
When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues
|
2025-12-01 |
| CVE-2025-13836 |
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
|
2025-12-01 |
| CVE-2025-66034 |
fontTools is a library for manipulating fonts, written in Python. In versions from 4.33.0 to before 4.60.2, the fonttools varLib (or python3 -m fontTools.varLib) script has an arbitrary file write vulnerability that leads to remote code execution when a malicious .designspace file is processed. The vulnerability affects the main() code path of fontTools.varLib, used by the fonttools varLib CLI and any code that invokes fontTools.varLib.main(). This issue has been patched in version 4.60.2.
|
2025-11-29 |
| CVE-2025-66221 |
Werkzeug is a comprehensive WSGI web application library. Prior to version 3.1.4, Werkzeug's safe_join function allows path segments with Windows device names. On Windows, there are special device names such as CON, AUX, etc that are implicitly present and readable in every directory. send_from_directory uses safe_join to safely serve files at user-specified paths under a directory. If the application is running on Windows, and the requested path ends with a special device name, the file will be opened successfully, but reading will hang indefinitely. This issue has been patched in version 3.1.4.
|
2025-11-29 |
| CVE-2025-13699 |
A flaw was found in MariaDB. This vulnerability allows remote attackers to execute arbitrary code on affected installations via improper validation of a user-supplied path prior to using it in file operations in the mariadb-dump utility, requiring user interaction.
|
2025-11-28 |
| CVE-2025-61915 |
A user in the lpadmin group can use the cups web ui to change the config and insert a malicious line.
Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write.
|
2025-11-28 |
| CVE-2025-66382 |
In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.
|
2025-11-28 |
| CVE-2025-58436 |
A client that connects to cupsd but sends slow messages, e.g. only one byte per second, delays cupsd as a whole, such that it becomes unusable by other clients.
|
2025-11-28 |
| CVE-2025-13674 |
BPv7 dissector crash in Wireshark 4.6.0 allows denial of service
|
2025-11-26 |
| CVE-2025-2486 |
The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733.
|
2025-11-26 |
| CVE-2025-13601 |
A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
|
2025-11-26 |
| CVE-2025-64720 |
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha × 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.
|
2025-11-25 |
| CVE-2025-64506 |
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.
|
2025-11-25 |
| CVE-2025-13502 |
A flaw was found in WebKitGTK and WPE WebKit. This vulnerability allows an out-of-bounds read and integer underflow, leading to a UIProcess crash (DoS) via a crafted payload to the GLib remote inspector server.
|
2025-11-25 |
| CVE-2025-65018 |
Heap buffer overflow in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds.
|
2025-11-25 |
| CVE-2025-64505 |
A heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access.
|
2025-11-25 |
| CVE-2025-40213 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete
|
2025-11-24 |
| CVE-2025-40212 |
In the Linux kernel, the following vulnerability has been resolved:
nfsd: fix refcount leak in nfsd_set_fh_dentry()
|
2025-11-24 |
| CVE-2025-9820 |
An attacker-controlled label (longer than 32 bytes) is copied into a 32-byte stack buffer without length checks, leading to out-of-bounds writes, process crash, or potential code execution depending on hardening.
|
2025-11-22 |
| CVE-2025-40211 |
In the Linux kernel, the following vulnerability has been resolved:
ACPI: video: Fix use-after-free in acpi_video_switch_brightness()
|
2025-11-21 |
| CVE-2025-13499 |
Kafka dissector crash in Wireshark 4.6.0 and 4.4.0 to 4.4.10 allows denial of service
|
2025-11-21 |
| CVE-2025-40209 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix memory leak of qgroup_list in btrfs_add_qgroup_relation
|
2025-11-21 |
| CVE-2025-12106 |
IPv6 address parsing: fix buffer overread on invalid input
NOTE: https://community.openvpn.net/Security%20Announcements/CVE-2025-12106
|
2025-11-21 |
| CVE-2025-40210 |
In the Linux kernel, the following vulnerability has been resolved:
Revert "NFSD: Remove the cap on number of operations per NFSv4 COMPOUND"
|
2025-11-21 |
| CVE-2025-13086 |
HMAC verification check: fix incorrect memcmp() call
NOTE: https://community.openvpn.net/Security%20Announcements/CVE-2025-13086
|
2025-11-21 |
| CVE-2025-64524 |
cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In versions 2.0.1 and prior, a heap-buffer-overflow vulnerability in the rastertopclx filter causes the program to crash with a segmentation fault when processing maliciously crafted input data. This issue can be exploited to trigger memory corruption, potentially leading to arbitrary code execution. This issue has been patched via commit 956283c.
|
2025-11-20 |
| CVE-2025-47914 |
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
|
2025-11-19 |
| CVE-2025-58181 |
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
|
2025-11-19 |
| CVE-2025-61664 |
A vulnerability in the GRUB2 bootloader has been identified in the normal module. This flaw, a memory Use After Free issue, occurs because the normal_exit command is not properly unregistered when its related module is unloaded. An attacker can exploit this condition by invoking the command after the module has been removed, causing the system to improperly access a previously freed memory location. This leads to a system crash or possible impacts in data confidentiality and integrity.
|
2025-11-18 |
| CVE-2025-61661 |
A vulnerability has been identified in the GRUB (Grand Unified Bootloader) component. This flaw occurs because the bootloader mishandles string conversion when reading information from a USB device, allowing an attacker to exploit inconsistent length values. A local attacker can connect a maliciously configured USB device during the boot sequence to trigger this issue. A successful exploitation may lead GRUB to crash, leading to a Denial of Service. Data corruption may be also possible, although given the complexity of the exploit the impact is most likely limited.
|
2025-11-18 |
| CVE-2025-54771 |
A use-after-free vulnerability has been identified in the GNU GRUB (Grand Unified Bootloader). The flaw occurs because the file-closing process incorrectly retains a memory pointer, leaving an invalid reference to a file system structure. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
|
2025-11-18 |
| CVE-2025-61663 |
A vulnerability has been identified in the GRUB2 bootloader's normal command that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the normal command is not properly unregistered when the module is unloaded. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability. Impact on the data integrity and confidentiality is also not discarded.
|
2025-11-18 |
| CVE-2025-61662 |
A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
|
2025-11-18 |
| CVE-2025-54770 |
A vulnerability has been identified in the GRUB2 bootloader's network module that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the net_set_vlan command is not properly unregistered when the network module is unloaded from memory. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability
|
2025-11-18 |
| CVE-2025-10158 |
A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The malicious rsync client requires at least read access to the remote rsync module in order to trigger the issue.
|
2025-11-18 |
| CVE-2025-64756 |
Glob matches files using patterns the shell uses. From versions 10.3.7 to 11.0.3, the glob CLI contains a command injection vulnerability in its -c/--cmd option that allows arbitrary command execution when processing files with malicious names. When glob -c <command> <patterns> are used, matched filenames are passed to a shell with shell: true, enabling shell metacharacters in filenames to trigger command injection and achieve arbitrary code execution under the user or CI account privileges. This issue has been patched in version 11.1.0.
|
2025-11-17 |
| CVE-2025-13193 |
A flaw was found in libvirt. External inactive snapshots for shut-down VMs are incorrectly created as world-readable, making it possible for unprivileged users to inspect the guest OS contents. This results in an information disclosure vulnerability.
|
2025-11-17 |
| CVE-2025-12817 |
Missing authorization in PostgreSQL CREATE STATISTICS command allows a table owner to achieve denial of service against other CREATE STATISTICS users by creating in any schema. A later CREATE STATISTICS for the same name, from a user having the CREATE privilege, would then fail. Versions before PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 are affected.
|
2025-11-13 |
| CVE-2025-12818 |
Integer wraparound in multiple PostgreSQL libpq client library functions allows an application input provider or network peer to cause libpq to undersize an allocation and write out-of-bounds by hundreds of megabytes. This results in a segmentation fault for the application using libpq. Versions before PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 are affected.
|
2025-11-13 |
| CVE-2025-11538 |
A vulnerability exists in Keycloak's server distribution where enabling debug mode (--debug <port>) insecurely defaults to binding the Java Debug Wire Protocol (JDWP) port to all network interfaces (0.0.0.0). This exposes the debug port to the local network, allowing an attacker on the same network segment to attach a remote debugger and achieve remote code execution within the Keycloak Java virtual machine.
|
2025-11-13 |
| CVE-2025-40177 |
In the Linux kernel, the following vulnerability has been resolved:
accel/qaic: Fix bootlog initialization ordering
|
2025-11-12 |
| CVE-2025-40208 |
In the Linux kernel, the following vulnerability has been resolved:
media: iris: fix module removal if firmware download failed
|
2025-11-12 |
| CVE-2025-40191 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix kfd process ref leaking when userptr unmapping
|
2025-11-12 |
| CVE-2025-40168 |
In the Linux kernel, the following vulnerability has been resolved:
smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().
|
2025-11-12 |
| CVE-2025-40118 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod
|
2025-11-12 |
| CVE-2025-40192 |
In the Linux kernel, the following vulnerability has been resolved:
Revert "ipmi: fix msg stack when IPMI is disconnected"
|
2025-11-12 |
| CVE-2025-40158 |
In the Linux kernel, the following vulnerability has been resolved:
ipv6: use RCU in ip6_output()
|
2025-11-12 |
| CVE-2025-40115 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: mpt3sas: Fix crash in transport port remove by using ioc_info()
|
2025-11-12 |
| CVE-2025-40150 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to avoid migrating empty section
|
2025-11-12 |
| CVE-2025-40110 |
In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx: Fix a null-ptr access in the cursor snooper
|
2025-11-12 |
| CVE-2025-40188 |
In the Linux kernel, the following vulnerability has been resolved:
pwm: berlin: Fix wrong register in suspend/resume
|
2025-11-12 |
| CVE-2025-40204 |
In the Linux kernel, the following vulnerability has been resolved:
sctp: Fix MAC comparison to be constant-time
|
2025-11-12 |
| CVE-2025-40137 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to truncate first page in error path of f2fs_truncate()
|
2025-11-12 |
| CVE-2025-40182 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: skcipher - Fix reqsize handling
|
2025-11-12 |
| CVE-2025-40139 |
In the Linux kernel, the following vulnerability has been resolved:
smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().
|
2025-11-12 |
| CVE-2025-40171 |
In the Linux kernel, the following vulnerability has been resolved:
nvmet-fc: move lsop put work to nvmet_fc_ls_req_op
|
2025-11-12 |
| CVE-2025-40197 |
In the Linux kernel, the following vulnerability has been resolved:
media: mc: Clear minor number before put device
|
2025-11-12 |
| CVE-2025-40190 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: guard against EA inode refcount underflow in xattr update
|
2025-11-12 |
| CVE-2025-40147 |
In the Linux kernel, the following vulnerability has been resolved:
blk-throttle: fix access race during throttle policy activation
|
2025-11-12 |
| CVE-2025-40181 |
In the Linux kernel, the following vulnerability has been resolved:
x86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP
|
2025-11-12 |
| CVE-2025-40199 |
In the Linux kernel, the following vulnerability has been resolved:
page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches
|
2025-11-12 |
| CVE-2025-40202 |
In the Linux kernel, the following vulnerability has been resolved:
ipmi: Rework user message limit handling
|
2025-11-12 |
| CVE-2025-40148 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Add NULL pointer checks in dc_stream cursor attribute functions
|
2025-11-12 |
| CVE-2025-40122 |
In the Linux kernel, the following vulnerability has been resolved:
perf/x86/intel: Fix IA32_PMC_x_CFG_B MSRs access error
|
2025-11-12 |
| CVE-2025-40201 |
In the Linux kernel, the following vulnerability has been resolved:
kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths
|
2025-11-12 |
| CVE-2025-40125 |
In the Linux kernel, the following vulnerability has been resolved:
blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx
|
2025-11-12 |
| CVE-2025-40145 |
In the Linux kernel, the following vulnerability has been resolved:
PCI/pwrctrl: Fix double cleanup on devm_add_action_or_reset() failure
|
2025-11-12 |
| CVE-2025-40173 |
In the Linux kernel, the following vulnerability has been resolved:
net/ip6_tunnel: Prevent perpetual tunnel growth
|
2025-11-12 |
| CVE-2025-40134 |
In the Linux kernel, the following vulnerability has been resolved:
dm: fix NULL pointer dereference in __dm_suspend()
|
2025-11-12 |
| CVE-2025-40189 |
In the Linux kernel, the following vulnerability has been resolved:
net: usb: lan78xx: Fix lost EEPROM read timeout error(-ETIMEDOUT) in lan78xx_read_raw_eeprom
|
2025-11-12 |
| CVE-2025-40162 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails
|
2025-11-12 |
| CVE-2025-59088 |
If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.
Amazon Linux Fix: The update, python-kdcproxy-0.3.3-1.amzn2.0.1, restricts DNS lookups to only explicitly configured Kerberos realms, preventing unauthorized network scanning. The fix introduces support for wildcard realm patterns to accommodate hierarchical structures, and adds optional parameters ("dns_realm_discovery" and "silence_port_warn") for backward compatibility. See package README for more information.
Action Required:
- If "use_dns" is set to false in your configuration; No action required
- If "use_dns" is true and you already define trusted realms in your configuration; No action required
- If "use_dns" is true and you rely on automatic DNS discovery; You must add your trusted realms to your configuration
|
2025-11-12 |
| CVE-2025-40131 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Fix peer lookup in ath12k_dp_mon_rx_deliver_msdu()
|
2025-11-12 |
| CVE-2025-40153 |
In the Linux kernel, the following vulnerability has been resolved:
mm: hugetlb: avoid soft lockup when mprotect to large memory area
|
2025-11-12 |
| CVE-2025-40163 |
In the Linux kernel, the following vulnerability has been resolved:
sched/deadline: Stop dl_server before CPU goes offline
|
2025-11-12 |
| CVE-2025-40178 |
In the Linux kernel, the following vulnerability has been resolved:
pid: Add a judgment for ns null in pid_nr_ns
|
2025-11-12 |
| CVE-2025-40140 |
In the Linux kernel, the following vulnerability has been resolved:
net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast
|
2025-11-12 |
| CVE-2025-40169 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Reject negative offsets for ALU ops
|
2025-11-12 |
| CVE-2025-40176 |
In the Linux kernel, the following vulnerability has been resolved:
tls: wait for pending async decryptions if tls_strp_msg_hold fails
|
2025-11-12 |
| CVE-2025-40121 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping
|
2025-11-12 |
| CVE-2025-40138 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to avoid NULL pointer dereference in f2fs_check_quota_consistency()
|
2025-11-12 |
| CVE-2025-40133 |
In the Linux kernel, the following vulnerability has been resolved:
mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().
|
2025-11-12 |
| CVE-2025-57812 |
CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. In CUPS-Filters versions up to and including 1.28.17 and libscupsfilters versions 2.0.0 through 2.1.1, CUPS-Filters's `imagetoraster` filter has an out of bounds read/write vulnerability in the processing of TIFF image files. While the pixel buffer is allocated with the number of pixels times a pre-calculated bytes-per-pixel value, the function which processes these pixels is called with a size of the number of pixels times 3. When suitable inputs are passed, the bytes-per-pixel value can be set to 1 and bytes outside of the buffer bounds get processed. In order to trigger the bug, an attacker must issue a print job with a crafted TIFF file, and pass appropriate print job options to control the bytes-per-pixel value of the output format. They must choose a printer configuration under which the `imagetoraster` filter or its C-function equivalent `cfFilterImageToRaster()` gets invoked. The vulnerability exists in both CUPS-Filters 1.x and the successor library libcupsfilters (CUPS-Filters 2.x). In CUPS-Filters 2.x, the vulnerable function is `_cfImageReadTIFF() in libcupsfilters`. When this function is invoked as part of `cfFilterImageToRaster()`, the caller passes a look-up-table during whose processing the out of bounds memory access happens. In CUPS-Filters 1.x, the equivalent functions are all found in the cups-filters repository, which is not split into subprojects yet, and the vulnerable code is in `_cupsImageReadTIFF()`, which is called through `cupsImageOpen()` from the `imagetoraster` tool. A patch is available in commit b69dfacec7f176281782e2f7ac44f04bf9633cfa.
|
2025-11-12 |
| CVE-2025-40194 |
In the Linux kernel, the following vulnerability has been resolved:
cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()
|
2025-11-12 |
| CVE-2025-40156 |
In the Linux kernel, the following vulnerability has been resolved:
PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()
|
2025-11-12 |
| CVE-2025-40116 |
In the Linux kernel, the following vulnerability has been resolved:
usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup
|
2025-11-12 |
| CVE-2025-40126 |
In the Linux kernel, the following vulnerability has been resolved:
sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC
|
2025-11-12 |
| CVE-2025-40151 |
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: BPF: No support of struct argument in trampoline programs
|
2025-11-12 |
| CVE-2025-40132 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback
|
2025-11-12 |
| CVE-2025-40195 |
In the Linux kernel, the following vulnerability has been resolved:
mount: handle NULL values in mnt_ns_release()
|
2025-11-12 |
| CVE-2025-40160 |
In the Linux kernel, the following vulnerability has been resolved:
xen/events: Return -EEXIST for bound VIRQs
|
2025-11-12 |
| CVE-2025-40149 |
In the Linux kernel, the following vulnerability has been resolved:
tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().
|
2025-11-12 |
| CVE-2025-64500 |
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Symfony's HttpFoundation component defines an object-oriented layer for the HTTP specification. Starting in version 2.0.0 and prior to version 5.4.50, 6.4.29, and 7.3.7, the `Request` class improperly interprets some `PATH_INFO` in a way that leads to representing some URLs with a path that doesn't start with a `/`. This can allow bypassing some access control rules that are built with this `/`-prefix assumption. Starting in versions 5.4.50, 6.4.29, and 7.3.7, the `Request` class now ensures that URL paths always start with a `/`.
|
2025-11-12 |
| CVE-2024-47866 |
A flaw was found in Ceph RGW. Using the x-amz-copy-source header to upload an empty object will cause Ceph RGW to crash, leading to availability issues.
|
2025-11-12 |
| CVE-2025-40157 |
In the Linux kernel, the following vulnerability has been resolved:
EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller
|
2025-11-12 |
| CVE-2025-40180 |
In the Linux kernel, the following vulnerability has been resolved:
mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop
|
2025-11-12 |
| CVE-2025-40136 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: hisilicon/qm - request reserved interrupt for virtual function
|
2025-11-12 |
| CVE-2025-40117 |
In the Linux kernel, the following vulnerability has been resolved:
misc: pci_endpoint_test: Fix array underflow in pci_endpoint_test_ioctl()
|
2025-11-12 |
| CVE-2025-40111 |
In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx: Fix Use-after-free in validation
|
2025-11-12 |
| CVE-2025-40179 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: verify orphan file size is not too big
|
2025-11-12 |
| CVE-2025-40167 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: detect invalid INLINE_DATA + EXTENTS flag combination
|
2025-11-12 |
| CVE-2025-40152 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm: Fix bootup splat with separate_gpu_drm modparam
|
2025-11-12 |
| CVE-2025-40185 |
In the Linux kernel, the following vulnerability has been resolved:
ice: ice_adapter: release xa entry on adapter allocation failure
|
2025-11-12 |
| CVE-2025-40172 |
In the Linux kernel, the following vulnerability has been resolved:
accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()
|
2025-11-12 |
| CVE-2025-40154 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
|
2025-11-12 |
| CVE-2025-40170 |
In the Linux kernel, the following vulnerability has been resolved:
net: use dst_dev_rcu() in sk_setup_caps()
|
2025-11-12 |
| CVE-2025-40129 |
In the Linux kernel, the following vulnerability has been resolved:
sunrpc: fix null pointer dereference on zero-length checksum
|
2025-11-12 |
| CVE-2025-40141 |
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: ISO: Fix possible UAF on iso_conn_free
|
2025-11-12 |
| CVE-2025-40183 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}
|
2025-11-12 |
| CVE-2025-40112 |
In the Linux kernel, the following vulnerability has been resolved:
sparc: fix accurate exception reporting in copy_{from_to}_user for Niagara
|
2025-11-12 |
| CVE-2025-40161 |
In the Linux kernel, the following vulnerability has been resolved:
mailbox: zynqmp-ipi: Fix SGI cleanup on unbind
|
2025-11-12 |
| CVE-2025-40187 |
In the Linux kernel, the following vulnerability has been resolved:
net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()
|
2025-11-12 |
| CVE-2025-40144 |
In the Linux kernel, the following vulnerability has been resolved:
nvdimm: ndtest: Return -ENOMEM if devm_kcalloc() fails in ndtest_probe()
|
2025-11-12 |
| CVE-2025-40159 |
In the Linux kernel, the following vulnerability has been resolved:
xsk: Harden userspace-supplied xdp_desc validation
|
2025-11-12 |
| CVE-2025-40206 |
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_objref: validate objref and objrefmap expressions
|
2025-11-12 |
| CVE-2025-40120 |
In the Linux kernel, the following vulnerability has been resolved:
net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock
|
2025-11-12 |
| CVE-2025-40146 |
In the Linux kernel, the following vulnerability has been resolved:
blk-mq: fix potential deadlock while nr_requests grown
|
2025-11-12 |
| CVE-2025-40135 |
In the Linux kernel, the following vulnerability has been resolved:
ipv6: use RCU in ip6_xmit()
|
2025-11-12 |
| CVE-2025-40174 |
In the Linux kernel, the following vulnerability has been resolved:
x86/mm: Fix SMP ordering in switch_mm_irqs_off()
|
2025-11-12 |
| CVE-2025-40203 |
In the Linux kernel, the following vulnerability has been resolved:
listmount: don't call path_put() under namespace semaphore
|
2025-11-12 |
| CVE-2025-40166 |
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/guc: Check GuC running state before deregistering exec queue
|
2025-11-12 |
| CVE-2025-64503 |
cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In cups-filters prior to 1.28.18, by crafting a PDF file with a large `MediaBox` value, an attacker can cause CUPS-Filter 1.x’s `pdftoraster` tool to write beyond the bounds of an array. First, a PDF with a large `MediaBox` width value causes `header.cupsWidth` to become large. Next, the calculation of `bytesPerLine = (header.cupsBitsPerPixel * header.cupsWidth + 7) / 8` overflows, resulting in a small value. Then, `lineBuf` is allocated with the small `bytesPerLine` size. Finally, `convertLineChunked` calls `writePixel8`, which attempts to write to `lineBuf` outside of its buffer size (out of bounds write). In libcupsfilters, the maintainers found the same `bytesPerLine` multiplication without overflow check, but the provided test case does not cause an overflow there, because the values are different. Commit 50d94ca0f2fa6177613c97c59791bde568631865 contains a patch, which is incorporated into cups-filters version 1.28.18.
|
2025-11-12 |
| CVE-2025-40143 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: dont report verifier bug for missing bpf_scc_visit on speculative path
|
2025-11-12 |
| CVE-2025-40164 |
In the Linux kernel, the following vulnerability has been resolved:
usbnet: Fix using smp_processor_id() in preemptible code warnings
|
2025-11-12 |
| CVE-2025-40165 |
In the Linux kernel, the following vulnerability has been resolved:
media: nxp: imx8-isi: m2m: Fix streaming cleanup on release
|
2025-11-12 |
| CVE-2025-40198 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()
|
2025-11-12 |
| CVE-2025-40123 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Enforce expected_attach_type for tailcall compatibility
|
2025-11-12 |
| CVE-2025-40113 |
In the Linux kernel, the following vulnerability has been resolved:
remoteproc: qcom: pas: Shutdown lite ADSP DTB on X1E
|
2025-11-12 |
| CVE-2025-40207 |
In the Linux kernel, the following vulnerability has been resolved:
media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()
|
2025-11-12 |
| CVE-2025-40200 |
In the Linux kernel, the following vulnerability has been resolved:
Squashfs: reject negative file sizes in squashfs_read_inode()
|
2025-11-12 |
| CVE-2025-40155 |
In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: debugfs: Fix legacy mode page table dump logic
|
2025-11-12 |
| CVE-2025-40184 |
In the Linux kernel, the following vulnerability has been resolved:
KVM: arm64: Fix debug checking for np-guests using huge mappings
|
2025-11-12 |
| CVE-2025-40124 |
In the Linux kernel, the following vulnerability has been resolved:
sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC III
|
2025-11-12 |
| CVE-2025-40127 |
In the Linux kernel, the following vulnerability has been resolved:
hwrng: ks-sa - fix division by zero in ks_sa_rng_init
|
2025-11-12 |
| CVE-2025-40130 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: ufs: core: Fix data race in CPU latency PM QoS request handling
|
2025-11-12 |
| CVE-2025-59089 |
If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new
buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response
header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.
|
2025-11-12 |
| CVE-2025-40193 |
In the Linux kernel, the following vulnerability has been resolved:
xtensa: simdisk: add input size check in proc_write_simdisk
|
2025-11-12 |
| CVE-2025-40119 |
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix potential null deref in ext4_mb_init()
|
2025-11-12 |
| CVE-2025-40205 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: avoid potential out-of-bounds in btrfs_encode_fh()
|
2025-11-12 |
| CVE-2025-40175 |
In the Linux kernel, the following vulnerability has been resolved:
idpf: cleanup remaining SKBs in PTP flows
|
2025-11-12 |
| CVE-2025-40186 |
In the Linux kernel, the following vulnerability has been resolved:
tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request().
|
2025-11-12 |
| CVE-2025-40196 |
In the Linux kernel, the following vulnerability has been resolved:
fs: quota: create dedicated workqueue for quota_release_work
|
2025-11-12 |
| CVE-2025-40142 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT
|
2025-11-12 |
| CVE-2025-13013 |
Mitigation bypass in the DOM: Core & HTML component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, and Firefox ESR < 115.30.
|
2025-11-11 |
| CVE-2025-13021 |
Incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145.
|
2025-11-11 |
| CVE-2025-13016 |
Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 145 and Firefox ESR < 140.5.
|
2025-11-11 |
| CVE-2025-13019 |
Same-origin policy bypass in the DOM: Workers component. This vulnerability affects Firefox < 145 and Firefox ESR < 140.5.
|
2025-11-11 |
| CVE-2025-13020 |
Use-after-free in the WebRTC: Audio/Video component. This vulnerability affects Firefox < 145 and Firefox ESR < 140.5.
|
2025-11-11 |
| CVE-2025-13018 |
Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 145 and Firefox ESR < 140.5.
|
2025-11-11 |
| CVE-2025-26402 |
Protection mechanism failure for some Intel(R) NPU Drivers within Ring 3: User Applications may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
|
2025-11-11 |
| CVE-2025-13022 |
Incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145.
|
2025-11-11 |
| CVE-2025-13024 |
JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 145.
|
2025-11-11 |
| CVE-2025-13027 |
Memory safety bugs present in Firefox 144 and Thunderbird 144. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 145.
|
2025-11-11 |
| CVE-2025-13025 |
Incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145.
|
2025-11-11 |
| CVE-2025-13023 |
Sandbox escape due to incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145.
|
2025-11-11 |
| CVE-2025-26405 |
Improper control of dynamically-managed code resources for some Intel(R) NPU Drivers within Ring 3: User Applications may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires passive user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
|
2025-11-11 |
| CVE-2025-13012 |
Race condition in the Graphics component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, and Firefox ESR < 115.30.
|
2025-11-11 |
| CVE-2025-13014 |
Use-after-free in the Audio/Video component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, and Firefox ESR < 115.30.
|
2025-11-11 |
| CVE-2025-13017 |
Same-origin policy bypass in the DOM: Notifications component. This vulnerability affects Firefox < 145 and Firefox ESR < 140.5.
|
2025-11-11 |
| CVE-2025-13026 |
Sandbox escape due to incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145.
|
2025-11-11 |
| CVE-2025-12748 |
A flaw was discovered in libvirt in the XML file processing. More specifically, the parsing of user provided XML files was performed before the ACL checks. A malicious user with limited permissions could exploit this flaw by submitting a specially crafted XML file, causing libvirt to allocate too much memory on the host. The excessive memory consumption could lead to a libvirt process crash on the host, resulting in a denial-of-service condition.
|
2025-11-11 |
| CVE-2025-13015 |
Spoofing issue in Firefox. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, and Firefox ESR < 115.30.
|
2025-11-11 |
| CVE-2025-64182 |
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.2.0 through 3.2.4, 3.3.0 through 3.3.5, and 3.4.0 through 3.4.2, a memory safety bug in the legacy OpenEXR Python adapter (the deprecated OpenEXR.InputFile wrapper) allow crashes and likely code execution when opening attacker-controlled EXR files or when passing crafted Python objects. Integer overflow and unchecked allocation in InputFile.channel() and InputFile.channels() can lead to heap overflow (32 bit) or a NULL deref (64 bit). Versions 3.2.5, 3.3.6, and 3.4.3 contain a patch for the issue.
|
2025-11-10 |
| CVE-2025-59777 |
NULL pointer dereference vulnerability exists in GNU libmicrohttpd v1.0.2 and earlier. The vulnerability was fixed in commit ff13abc on the master branch of the libmicrohttpd Git repository, after the v1.0.2 tag. A specially crafted packet sent by an attacker could cause a denial-of-service (DoS) condition.
|
2025-11-10 |
| CVE-2025-62689 |
NULL pointer dereference vulnerability exists in GNU libmicrohttpd v1.0.2 and earlier. The vulnerability was fixed in commit ff13abc on the master branch of the libmicrohttpd Git repository, after the v1.0.2 tag. A specially crafted packet sent by an attacker could cause a denial-of-service (DoS) condition.
|
2025-11-10 |
| CVE-2025-64183 |
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.2.0 through 3.2.4, 3.3.0 through 3.3.5, and 3.4.0 through 3.4.2, there is a use-after-free in PyObject_StealAttrString of pyOpenEXR_old.cpp. The legacy adapter defines PyObject_StealAttrString that calls PyObject_GetAttrString to obtain a new reference, immediately decrefs it, and returns the pointer. Callers then pass this dangling pointer to APIs like PyLong_AsLong/PyFloat_AsDouble, resulting in a use-after-free. This is invoked in multiple places (e.g., reading PixelType.v, Box2i, V2f, etc.) Versions 3.2.5, 3.3.6, and 3.4.3 fix the issue.
|
2025-11-10 |
| CVE-2025-64181 |
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.3.0 through 3.3.5 and 3.4.0 through 3.4.2, while fuzzing `openexr_exrcheck_fuzzer`, Valgrind reports a conditional branch depending on uninitialized data inside `generic_unpack`. This indicates a use of uninitialized memory. The issue can result in undefined behavior and/or a potential crash/denial of service. Versions 3.3.6 and 3.4.3 fix the issue.
|
2025-11-10 |
| CVE-2025-40108 |
In the Linux kernel, the following vulnerability has been resolved:
serial: qcom-geni: Fix blocked task
|
2025-11-09 |
| CVE-2025-40109 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: rng - Ensure set_ent is always present
|
2025-11-09 |
| CVE-2025-64329 |
containerd is an open-source container runtime. Versions 1.7.28 and below, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4, and 2.2.0-beta.0 through 2.2.0-rc.1 contain a bug in the CRI Attach implementation where a user can exhaust memory on the host due to goroutine leaks. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. To workaround this vulnerability, users can set up an admission controller to control accesses to pods/attach resources.
|
2025-11-07 |
| CVE-2025-12863 |
A flaw was found in the xmlSetTreeDoc() function of the libxml2 XML parsing library. This function is responsible for updating document pointers when XML nodes are moved between documents. Due to improper handling of namespace references, a namespace pointer may remain linked to a freed memory region when the original document is destroyed. As a result, subsequent operations that access the namespace can lead to a use-after-free condition, causing an application crash.
|
2025-11-07 |
| CVE-2024-25621 |
containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.
|
2025-11-06 |
| CVE-2025-11563 |
wcurl path traversal with percent-encoded slashes
URLs containing percent-encoded slashes (/ or \) can trick wcurl into saving the output file outside of the current directory without the user explicitly asking for it.
|
2025-11-05 |
| CVE-2025-60753 |
An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s substitution rules. This can cause unbounded memory allocation and lead to denial of service (Out-of-Memory crash).
|
2025-11-05 |
| CVE-2025-46404 |
A denial of service vulnerability exists in the lasso_provider_verify_saml_signature functionality of Entr'ouvert Lasso 2.5.1. A specially crafted SAML response can lead to a denial of service. An attacker can send a malformed SAML response to trigger this vulnerability.
|
2025-11-05 |
| CVE-2025-10966 |
curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms.
This prevents curl from detecting MITM attackers and more.
|
2025-11-05 |
| CVE-2025-46705 |
A denial of service vulnerability exists in the g_assert_not_reached functionality of Entr'ouvert Lasso 2.5.1 and 2.8.2. A specially crafted SAML assertion response can lead to a denial of service. An attacker can send a malformed SAML response to trigger this vulnerability.
|
2025-11-05 |
| CVE-2023-43000 |
A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.5, iOS 16.6 and iPadOS 16.6, Safari 16.6. Processing maliciously crafted web content may lead to memory corruption.
|
2025-11-05 |
| CVE-2025-46784 |
A denial of service vulnerability exists in the lasso_node_init_from_message_with_format functionality of Entr'ouvert Lasso 2.5.1. A specially crafted SAML response can lead to a memory depletion, resulting in denial of service. An attacker can send a malformed SAML response to trigger this vulnerability.
|
2025-11-05 |
| CVE-2025-52565 |
runc: container escape with malicious config due to /dev/console mount and related races
|
2025-11-05 |
| CVE-2025-31133 |
runc: container escape via "masked path" abuse due to mount race conditions
|
2025-11-05 |
| CVE-2025-52881 |
runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects
|
2025-11-05 |
| CVE-2025-47151 |
A type confusion vulnerability exists in the lasso_node_impl_init_from_xml functionality of Entr'ouvert Lasso 2.5.1 and 2.8.2. A specially crafted SAML response can lead to an arbitrary code execution. An attacker can send a malformed SAML response to trigger this vulnerability.
|
2025-11-05 |
| CVE-2025-43421 |
Multiple issues were addressed by disabling array allocation sinking. This issue is fixed in iOS 26.1 and iPadOS 26.1, Safari 26.1, visionOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
|
2025-11-04 |
| CVE-2025-43432 |
A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26.1, visionOS 26.1, watchOS 26.1, iOS 26.1 and iPadOS 26.1, tvOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
|
2025-11-04 |
| CVE-2025-43480 |
The issue was addressed with improved checks. This issue is fixed in Safari 26.1, visionOS 26.1, watchOS 26.1, iOS 26.1 and iPadOS 26.1, tvOS 26.1. A malicious website may exfiltrate data cross-origin.
|
2025-11-04 |
| CVE-2025-43440 |
This issue was addressed with improved checks This issue is fixed in Safari 26.1, visionOS 26.1, watchOS 26.1, iOS 26.1 and iPadOS 26.1, tvOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
|
2025-11-04 |
| CVE-2025-43425 |
The issue was addressed with improved memory handling. This issue is fixed in Safari 26.1, visionOS 26.1, watchOS 26.1, iOS 26.1 and iPadOS 26.1, tvOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
|
2025-11-04 |
| CVE-2025-62507 |
Bug in XACKDEL may lead to stack overflow and potential RCE
NOTE: https://github.com/redis/redis/security/advisories/GHSA-jhjx-x4cf-4vm8
NOTE: Introduced with: https://github.com/redis/redis/commit/fa040a72c0720d9b0a833117b086e5bbafa6ddc8 (8.2-rc1)
NOTE: Fixed by: https://github.com/redis/redis/commit/5f83972188f6e5b1d6f1940218c650a9cbdf7741 (8.2.3)
|
2025-11-04 |
| CVE-2025-43419 |
The issue was addressed with improved memory handling. This issue is fixed in Safari 26, tvOS 26, watchOS 26, iOS 26 and iPadOS 26, visionOS 26. Processing maliciously crafted web content may lead to memory corruption.
|
2025-11-04 |
| CVE-2025-43427 |
This issue was addressed through improved state management. This issue is fixed in iOS 26.1 and iPadOS 26.1, tvOS 26.1, Safari 26.1, visionOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
|
2025-11-04 |
| CVE-2025-43429 |
A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2. Processing maliciously crafted web content may lead to an unexpected process crash.
|
2025-11-04 |
| CVE-2025-43392 |
The issue was addressed with improved handling of caches. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2. A website may exfiltrate image data cross-origin.
|
2025-11-04 |
| CVE-2025-43458 |
This issue was addressed through improved state management. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2. Processing maliciously crafted web content may lead to an unexpected process crash.
|
2025-11-04 |
| CVE-2025-43431 |
The issue was addressed with improved memory handling. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2. Processing maliciously crafted web content may lead to memory corruption.
|
2025-11-04 |
| CVE-2025-43443 |
This issue was addressed with improved checks. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2. Processing maliciously crafted web content may lead to an unexpected process crash.
|
2025-11-04 |
| CVE-2025-43430 |
This issue was addressed through improved state management. This issue is fixed in Safari 26.1, visionOS 26.1, watchOS 26.1, iOS 26.1 and iPadOS 26.1, tvOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
|
2025-11-04 |
| CVE-2025-43434 |
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2. Processing maliciously crafted web content may lead to an unexpected Safari crash.
|
2025-11-04 |
| CVE-2025-62626 |
Improper handling of insufficient entropy in the AMD CPUs could allow a local attacker to influence the values returned by the RDSEED instruction, potentially resulting in the consumption of insufficiently random values.
|
2025-11-03 |
| CVE-2025-40107 |
In the Linux kernel, the following vulnerability has been resolved:
can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled
|
2025-11-03 |
| CVE-2025-62875 |
Denial-of-Service via UNIX Domain Socket
NOTE: https://www.openwall.com/lists/oss-security/2025/10/31/3
NOTE: https://github.com/OpenSMTPD/OpenSMTPD/commit/653abf00f5283a2d3247eb9aabf8987d1b2f0510 (7.8.0p0)
NOTE: 270e23a6eb upstream (7.7.0p0) made major changes to the message parsing code
NOTE: including the call to fatal(), but it is not excluded that earlier versions
NOTE: are affected by (a variant of this issue) as well.
DEBIANBUG: [1119840]
|
2025-11-03 |
| CVE-2025-6075 |
If the value passed to os.path.expandvars() is user-controlled a
performance degradation is possible when expanding environment
variables.
|
2025-10-31 |
| CVE-2025-12464 |
A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devices and moved to the net core code. The issue stems from the device's receive code still being able to process a short frame in loopback mode. This could lead to a buffer overrun in the e1000_receive_iov() function via the loopback code path. A malicious guest user could use this vulnerability to crash the QEMU process on the host, resulting in a denial of service.
|
2025-10-31 |
| CVE-2025-40106 |
In the Linux kernel, the following vulnerability has been resolved:
comedi: fix divide-by-zero in comedi_buf_munge()
|
2025-10-31 |
| CVE-2025-40097 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: hda: Fix missing pointer check in hda_component_manager_init function
|
2025-10-30 |
| CVE-2025-40093 |
In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: f_ecm: Refactor bind path to use __free()
|
2025-10-30 |
| CVE-2025-40096 |
In the Linux kernel, the following vulnerability has been resolved:
drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies
|
2025-10-30 |
| CVE-2025-40090 |
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix recursive locking in RPC handle list access
|
2025-10-30 |
| CVE-2025-62229 |
A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.
|
2025-10-30 |
| CVE-2025-40088 |
In the Linux kernel, the following vulnerability has been resolved:
hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()
|
2025-10-30 |
| CVE-2025-40092 |
In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: f_ncm: Refactor bind path to use __free()
|
2025-10-30 |
| CVE-2025-40098 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()
|
2025-10-30 |
| CVE-2025-62231 |
The XkbCompatMap structure stores some of its values using an unsigned short, but fails to check whether the sum of the input data might overflow the maximum unsigned short value
Introduced in: X11R6
Fixed in: xorg-server-21.1.19 and xwayland-24.1.9
Fix: https://gitlab.freedesktop.org/xorg/xserver/-/commit/475d9f49
NOTE: https://lists.x.org/archives/xorg-announce/2025-October/003635.html
NOTE: Fixed by: https://gitlab.freedesktop.org/xorg/xserver/-/commit/475d9f49acd0e55bc0b089ed77f732ad18585470
NOTE: Fixed by: https://gitlab.freedesktop.org/xorg/xserver/-/commit/3baad99f9c15028ed8c3e3d8408e5ec35db155aa (xorg-server-21.1.19)
|
2025-10-30 |
| CVE-2025-40104 |
In the Linux kernel, the following vulnerability has been resolved:
ixgbevf: fix mailbox API compatibility by negotiating supported features
|
2025-10-30 |
| CVE-2025-40091 |
In the Linux kernel, the following vulnerability has been resolved:
ixgbe: fix too early devlink_free() in ixgbe_remove()
|
2025-10-30 |
| CVE-2025-62230 |
When removing the Xkb resources for a client, the function XkbRemoveResourceClient() will free the XkbInterest data associated with the device, but not the resource associated with it. As a result, when the client terminates, the resource delete function triggers a use-after-free.
NOTE: https://lists.x.org/archives/xorg-announce/2025-October/003635.html
NOTE: Fixed by: https://gitlab.freedesktop.org/xorg/xserver/-/commit/99790a2c9205a52fbbec01f21a92c9b7f4ed1d8f
NOTE: Fixed by: https://gitlab.freedesktop.org/xorg/xserver/-/commit/10c94238bdad17c11707e0bdaaa3a9cd54c504be
NOTE: Fixed by: https://gitlab.freedesktop.org/xorg/xserver/-/commit/865089ca70840c0f13a61df135f7b44a9782a175 (xorg-server-21.1.19)
NOTE: Fixed by: https://gitlab.freedesktop.org/xorg/xserver/-/commit/87fe2553937a99fd914ad0cde999376a3adc3839 (xorg-server-21.1.19)
|
2025-10-30 |
| CVE-2025-40094 |
In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: f_acm: Refactor bind path to use __free()
|
2025-10-30 |
| CVE-2025-40102 |
In the Linux kernel, the following vulnerability has been resolved:
KVM: arm64: Prevent access to vCPU events before init
|
2025-10-30 |
| CVE-2025-40095 |
In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: f_rndis: Refactor bind path to use __free()
|
2025-10-30 |
| CVE-2025-40101 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST
|
2025-10-30 |
| CVE-2025-40105 |
In the Linux kernel, the following vulnerability has been resolved:
vfs: Don't leak disconnected dentries on umount
|
2025-10-30 |
| CVE-2025-40089 |
In the Linux kernel, the following vulnerability has been resolved:
cxl/features: Add check for no entries in cxl_feature_info
|
2025-10-30 |
| CVE-2025-64118 |
node-tar is a Tar for Node.js. In 7.5.1, using .t (aka .list) with { sync: true } to read tar entry contents returns uninitialized memory contents if tar file was changed on disk to a smaller size while being read. This vulnerability is fixed in 7.5.2.
|
2025-10-30 |
| CVE-2025-40087 |
In the Linux kernel, the following vulnerability has been resolved:
NFSD: Define a proc_layoutcommit for the FlexFiles layout type
|
2025-10-30 |
| CVE-2025-40099 |
In the Linux kernel, the following vulnerability has been resolved:
cifs: parse_dfs_referrals: prevent oob on malformed input
|
2025-10-30 |
| CVE-2025-40100 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: do not assert we found block group item when creating free space tree
|
2025-10-30 |
| CVE-2025-40086 |
In the Linux kernel, the following vulnerability has been resolved:
drm/xe: Don't allow evicting of BOs in same VM in array of VM binds
|
2025-10-30 |
| CVE-2025-40103 |
In the Linux kernel, the following vulnerability has been resolved:
smb: client: Fix refcount leak for cifs_sb_tlink
|
2025-10-30 |
| CVE-2023-7324 |
In the Linux kernel, the following vulnerability has been resolved:
scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses
|
2025-10-29 |
| CVE-2025-40084 |
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: transport_ipc: validate payload size before reading handle
|
2025-10-29 |
| CVE-2025-40083 |
In the Linux kernel, the following vulnerability has been resolved:
net/sched: sch_qfq: Fix null-deref in agg_dequeue
|
2025-10-29 |
| CVE-2025-40085 |
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card
|
2025-10-29 |
| CVE-2025-10934 |
GIMP XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of XWD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27823.
|
2025-10-29 |
| CVE-2025-40062 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs
|
2025-10-28 |
| CVE-2025-40077 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to avoid overflow while left shift operation
|
2025-10-28 |
| CVE-2025-40058 |
In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: Disallow dirty tracking if incoherent page walk
|
2025-10-28 |
| CVE-2025-40041 |
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: BPF: Sign-extend struct ops return values properly
|
2025-10-28 |
| CVE-2025-40078 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Explicitly check accesses to bpf_sock_addr
|
2025-10-28 |
| CVE-2025-40028 |
In the Linux kernel, the following vulnerability has been resolved:
binder: fix double-free in dbitmap
|
2025-10-28 |
| CVE-2025-40047 |
In the Linux kernel, the following vulnerability has been resolved:
io_uring/waitid: always prune wait queue entry in io_waitid_wait()
|
2025-10-28 |
| CVE-2025-40075 |
In the Linux kernel, the following vulnerability has been resolved:
tcp_metrics: use dst_dev_net_rcu()
|
2025-10-28 |
| CVE-2025-40031 |
In the Linux kernel, the following vulnerability has been resolved:
tee: fix register_shm_helper()
|
2025-10-28 |
| CVE-2025-40038 |
In the Linux kernel, the following vulnerability has been resolved:
KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid
|
2025-10-28 |
| CVE-2025-40070 |
In the Linux kernel, the following vulnerability has been resolved:
pps: fix warning in pps_register_cdev when register device fail
|
2025-10-28 |
| CVE-2025-40042 |
In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix race condition in kprobe initialization causing NULL pointer dereference
|
2025-10-28 |
| CVE-2025-40069 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm: Fix obj leak in VM_BIND error path
|
2025-10-28 |
| CVE-2025-40045 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: codecs: wcd937x: set the comp soundwire port correctly
|
2025-10-28 |
| CVE-2025-40057 |
In the Linux kernel, the following vulnerability has been resolved:
ptp: Add a upper bound on max_vclocks
|
2025-10-28 |
| CVE-2025-40053 |
In the Linux kernel, the following vulnerability has been resolved:
net: dlink: handle copy_thresh allocation failure
|
2025-10-28 |
| CVE-2025-40037 |
In the Linux kernel, the following vulnerability has been resolved:
fbdev: simplefb: Fix use after free in simplefb_detach_genpds()
|
2025-10-28 |
| CVE-2025-40052 |
In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix crypto buffers in non-linear memory
|
2025-10-28 |
| CVE-2025-40033 |
In the Linux kernel, the following vulnerability has been resolved:
remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()
|
2025-10-28 |
| CVE-2025-40073 |
In the Linux kernel, the following vulnerability has been resolved:
drm/msm: Do not validate SSPP when it is not ready
|
2025-10-28 |
| CVE-2025-40040 |
In the Linux kernel, the following vulnerability has been resolved:
mm/ksm: fix flag-dropping behavior in ksm_madvise
|
2025-10-28 |
| CVE-2025-40030 |
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: check the return value of pinmux_ops::get_function_name()
|
2025-10-28 |
| CVE-2025-40079 |
In the Linux kernel, the following vulnerability has been resolved:
riscv, bpf: Sign extend struct ops return values properly
|
2025-10-28 |
| CVE-2025-40072 |
In the Linux kernel, the following vulnerability has been resolved:
fanotify: Validate the return value of mnt_ns_from_dentry() before dereferencing
|
2025-10-28 |
| CVE-2025-40076 |
In the Linux kernel, the following vulnerability has been resolved:
PCI: rcar-host: Pass proper IRQ domain to generic_handle_domain_irq()
|
2025-10-28 |
| CVE-2025-40082 |
In the Linux kernel, the following vulnerability has been resolved:
hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()
|
2025-10-28 |
| CVE-2025-40043 |
In the Linux kernel, the following vulnerability has been resolved:
net: nfc: nci: Add parameter validation for packet data
|
2025-10-28 |
| CVE-2025-40066 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7996: Check phy before init msta_link in mt7996_mac_sta_add_links()
|
2025-10-28 |
| CVE-2025-40049 |
In the Linux kernel, the following vulnerability has been resolved:
Squashfs: fix uninit-value in squashfs_get_parent
|
2025-10-28 |
| CVE-2025-40034 |
In the Linux kernel, the following vulnerability has been resolved:
PCI/AER: Avoid NULL pointer dereference in aer_ratelimit()
|
2025-10-28 |
| CVE-2025-40025 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to do sanity check on node footer for non inode dnode
|
2025-10-28 |
| CVE-2025-40063 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: comp - Use same definition of context alloc and free ops
|
2025-10-28 |
| CVE-2025-40065 |
In the Linux kernel, the following vulnerability has been resolved:
RISC-V: KVM: Write hgatp register with valid mode bits
|
2025-10-28 |
| CVE-2025-40061 |
In the Linux kernel, the following vulnerability has been resolved:
RDMA/rxe: Fix race in do_task() when draining
|
2025-10-28 |
| CVE-2025-40056 |
In the Linux kernel, the following vulnerability has been resolved:
vhost: vringh: Fix copy_to_iter return value check
|
2025-10-28 |
| CVE-2025-12380 |
Starting with Firefox 142, it was possible for a compromised child process to trigger a use-after-free in the GPU or browser process using WebGPU-related IPC calls. This may have been usable to escape the child process sandbox. This vulnerability affects Firefox < 144.0.2.
|
2025-10-28 |
| CVE-2025-40081 |
In the Linux kernel, the following vulnerability has been resolved:
perf: arm_spe: Prevent overflow in PERF_IDX2OFF()
|
2025-10-28 |
| CVE-2025-40046 |
In the Linux kernel, the following vulnerability has been resolved:
io_uring/zcrx: fix overshooting recv limit
|
2025-10-28 |
| CVE-2025-40036 |
In the Linux kernel, the following vulnerability has been resolved:
misc: fastrpc: fix possible map leak in fastrpc_put_args
|
2025-10-28 |
| CVE-2025-40048 |
In the Linux kernel, the following vulnerability has been resolved:
uio_hv_generic: Let userspace take care of interrupt mask
|
2025-10-28 |
| CVE-2025-40067 |
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist
|
2025-10-28 |
| CVE-2025-40064 |
In the Linux kernel, the following vulnerability has been resolved:
smc: Fix use-after-free in __pnet_find_base_ndev().
|
2025-10-28 |
| CVE-2025-40051 |
In the Linux kernel, the following vulnerability has been resolved:
vhost: vringh: Modify the return value check
|
2025-10-28 |
| CVE-2025-40050 |
In the Linux kernel, the following vulnerability has been resolved:
bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer
|
2025-10-28 |
| CVE-2025-40054 |
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix UAF issue in f2fs_merge_page_bio()
|
2025-10-28 |
| CVE-2025-40060 |
In the Linux kernel, the following vulnerability has been resolved:
coresight: trbe: Return NULL pointer for allocation failures
|
2025-10-28 |
| CVE-2025-40026 |
In the Linux kernel, the following vulnerability has been resolved:
KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O
|
2025-10-28 |
| CVE-2025-40032 |
In the Linux kernel, the following vulnerability has been resolved:
PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release
|
2025-10-28 |
| CVE-2025-40059 |
In the Linux kernel, the following vulnerability has been resolved:
coresight: Fix incorrect handling for return value of devm_kzalloc
|
2025-10-28 |
| CVE-2025-40035 |
In the Linux kernel, the following vulnerability has been resolved:
Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak
|
2025-10-28 |
| CVE-2025-40080 |
In the Linux kernel, the following vulnerability has been resolved:
nbd: restrict sockets to TCP and UDP
|
2025-10-28 |
| CVE-2025-40027 |
In the Linux kernel, the following vulnerability has been resolved:
net/9p: fix double req put in p9_fd_cancelled
|
2025-10-28 |
| CVE-2025-40071 |
In the Linux kernel, the following vulnerability has been resolved:
tty: n_gsm: Don't block input queue by waiting MSC
|
2025-10-28 |
| CVE-2025-40039 |
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: Fix race condition in RPC handle list access
|
2025-10-28 |
| CVE-2025-40044 |
In the Linux kernel, the following vulnerability has been resolved:
fs: udf: fix OOB read in lengthAllocDescs handling
|
2025-10-28 |
| CVE-2025-40055 |
In the Linux kernel, the following vulnerability has been resolved:
ocfs2: fix double free in user_cluster_connect()
|
2025-10-28 |
| CVE-2025-40074 |
In the Linux kernel, the following vulnerability has been resolved:
ipv4: start using dst_dev_rcu()
|
2025-10-28 |
| CVE-2025-40029 |
In the Linux kernel, the following vulnerability has been resolved:
bus: fsl-mc: Check return value of platform_get_resource()
|
2025-10-28 |
| CVE-2025-40068 |
In the Linux kernel, the following vulnerability has been resolved:
fs: ntfs3: Fix integer overflow in run_unpack()
|
2025-10-28 |
| CVE-2025-12200 |
A vulnerability was determined in dnsmasq up to 2.73rc6. Affected by this issue is the function parse_dhcp_opt of the file src/option.c of the component Config File Handler. This manipulation of the argument m causes null pointer dereference. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
|
2025-10-27 |
| CVE-2025-61795 |
Improper Resource Shutdown or Release vulnerability in Apache Tomcat.
If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue.
|
2025-10-27 |
| CVE-2025-55754 |
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat.
Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
|
2025-10-27 |
| CVE-2025-62594 |
ImageMagick is a software suite to create, edit, compose, or convert bitmap images. ImageMagick versions prior to 7.1.2-8 are vulnerable to denial-of-service due to unsigned integer underflow and division-by-zero in the CLAHEImage function. When tile width or height is zero, unsigned underflow occurs in pointer arithmetic, leading to out-of-bounds memory access, and division-by-zero causes immediate crashes. This issue has been patched in version 7.1.2-8.
|
2025-10-27 |
| CVE-2025-55752 |
Relative Path Traversal vulnerability in Apache Tomcat.
The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
|
2025-10-27 |
| CVE-2025-12199 |
A vulnerability was found in dnsmasq up to 2.73rc6. Affected by this vulnerability is the function check_servers of the file src/network.c of the component Config File Handler. The manipulation results in null pointer dereference. The attack needs to be approached locally. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
2025-10-27 |
| CVE-2025-12198 |
A vulnerability has been found in dnsmasq up to 2.73rc6. Affected is the function parse_hex of the file src/util.c of the component Config File Handler. The manipulation of the argument i leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
2025-10-27 |
| CVE-2025-40018 |
In the Linux kernel, the following vulnerability has been resolved:
ipvs: Defer ip_vs_ftp unregister during netns cleanup
|
2025-10-24 |
| CVE-2025-40023 |
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/vf: Don't expose sysfs attributes not applicable for VFs
|
2025-10-24 |
| CVE-2025-52099 |
Integer Overflow vulnerability in SQLite SQLite3 v.3.50.0 allows a remote attacker to cause a denial of service via the setupLookaside function
|
2025-10-24 |
| CVE-2025-40024 |
In the Linux kernel, the following vulnerability has been resolved:
vhost: Take a reference on the task in struct vhost_task.
|
2025-10-24 |
| CVE-2025-40021 |
In the Linux kernel, the following vulnerability has been resolved:
tracing: dynevent: Add a missing lockdown check on dynevent
|
2025-10-24 |
| CVE-2025-40020 |
In the Linux kernel, the following vulnerability has been resolved:
can: peak_usb: fix shift-out-of-bounds issue
|
2025-10-24 |
| CVE-2025-40022 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
|
2025-10-24 |
| CVE-2023-53733 |
In the Linux kernel, the following vulnerability has been resolved:
net: sched: cls_u32: Undo tcf_bind_filter if u32_replace_hw_knode
|
2025-10-24 |
| CVE-2025-12194 |
Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS bc-fips on All (API modules), Legion of the Bouncy Castle Inc. Bouncy Castle for Java LTS bcprov-lts8on on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCFB.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeGCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/SHA256NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeEngine.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCBC.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCTR.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCFB.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeGCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeEngine.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCBC.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeGCMSIV.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCTR.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA256NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA224NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA3NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHAKENativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA512NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA384NativeDigest.Java.
This issue affects Bouncy Castle for Java FIPS: from 2.1.0 through 2.1.1; Bouncy Castle for Java LTS: from 2.73.0 through 2.73.7.
|
2025-10-24 |
| CVE-2025-10680 |
OpenVPN 2.7_alpha1 through 2.7_beta1 on POSIX based platforms allows a remote authenticated server to inject shell commands via DNS variables when --dns-updown is in use
|
2025-10-24 |
| CVE-2025-40019 |
In the Linux kernel, the following vulnerability has been resolved:
crypto: essiv - Check ssize for decryption and in-place encryption
|
2025-10-24 |
| CVE-2025-50951 |
FontForge v20230101 was discovered to contain a memory leak via the utf7toutf8_copy function at /fontforge/sfd.c.
|
2025-10-23 |
| CVE-2025-50949 |
FontForge v20230101 was discovered to contain a memory leak via the component DlgCreate8.
|
2025-10-23 |
| CVE-2025-12105 |
A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by GNOME and WebKit-based applications to manage HTTP/2 communications. When network operations are aborted at specific timing intervals, an internal message queue item may be freed twice due to missing state synchronization. This leads to a use-after-free memory access, potentially crashing the affected application. Attackers could exploit this behavior remotely by triggering specific HTTP/2 read and cancel sequences, resulting in a denial-of-service condition.
|
2025-10-23 |
| CVE-2025-50950 |
Audiofile v0.3.7 was discovered to contain a NULL pointer dereference via the ModuleState::setup function.
|
2025-10-23 |
| CVE-2022-50579 |
In the Linux kernel, the following vulnerability has been resolved:
arm64: ftrace: fix module PLTs with mcount
|
2025-10-22 |
| CVE-2025-40778 |
Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache.
This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
|
2025-10-22 |
| CVE-2023-53706 |
In the Linux kernel, the following vulnerability has been resolved:
mm/vmemmap/devdax: fix kernel crash when probing devdax devices
|
2025-10-22 |
| CVE-2022-50570 |
In the Linux kernel, the following vulnerability has been resolved:
platform/chrome: fix memory corruption in ioctl
|
2025-10-22 |
| CVE-2023-53694 |
In the Linux kernel, the following vulnerability has been resolved:
riscv: ftrace: Fixup panic by disabling preemption
|
2025-10-22 |
| CVE-2023-53714 |
In the Linux kernel, the following vulnerability has been resolved:
drm/stm: ltdc: fix late dereference check
|
2025-10-22 |
| CVE-2022-50558 |
In the Linux kernel, the following vulnerability has been resolved:
regmap-irq: Use the new num_config_regs property in regmap_add_irq_chip_fwnode
|
2025-10-22 |
| CVE-2023-53717 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback()
|
2025-10-22 |
| CVE-2022-50577 |
In the Linux kernel, the following vulnerability has been resolved:
ima: Fix memory leak in __ima_inode_hash()
|
2025-10-22 |
| CVE-2022-50574 |
In the Linux kernel, the following vulnerability has been resolved:
drm/omap: dss: Fix refcount leak bugs
|
2025-10-22 |
| CVE-2023-53722 |
In the Linux kernel, the following vulnerability has been resolved:
md: raid1: fix potential OOB in raid1_remove_disk()
|
2025-10-22 |
| CVE-2023-53702 |
In the Linux kernel, the following vulnerability has been resolved:
s390/crypto: use vector instructions only if available for ChaCha20
|
2025-10-22 |
| CVE-2023-53718 |
In the Linux kernel, the following vulnerability has been resolved:
ring-buffer: Do not swap cpu_buffer during resize process
|
2025-10-22 |
| CVE-2023-53712 |
In the Linux kernel, the following vulnerability has been resolved:
ARM: 9317/1: kexec: Make smp stop calls asynchronous
|
2025-10-22 |
| CVE-2022-50567 |
In the Linux kernel, the following vulnerability has been resolved:
fs: jfs: fix shift-out-of-bounds in dbAllocAG
|
2025-10-22 |
| CVE-2023-53730 |
In the Linux kernel, the following vulnerability has been resolved:
blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost
|
2025-10-22 |
| CVE-2023-53707 |
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1
|
2025-10-22 |
| CVE-2022-50557 |
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: thunderbay: fix possible memory leak in thunderbay_build_functions()
|
2025-10-22 |
| CVE-2022-50566 |
In the Linux kernel, the following vulnerability has been resolved:
mtd: Fix device name leak when register device failed in add_mtd_device()
|
2025-10-22 |
| CVE-2023-53705 |
In the Linux kernel, the following vulnerability has been resolved:
ipv6: Fix out-of-bounds access in ipv6_find_tlv()
|
2025-10-22 |
| CVE-2023-53697 |
In the Linux kernel, the following vulnerability has been resolved:
nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu()
|
2025-10-22 |
| CVE-2022-50572 |
In the Linux kernel, the following vulnerability has been resolved:
ASoC: audio-graph-card: fix refcount leak of cpu_ep in __graph_for_each_link()
|
2025-10-22 |
| CVE-2023-53720 |
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Release the label when replacing existing ct entry
|
2025-10-22 |
| CVE-2023-53693 |
In the Linux kernel, the following vulnerability has been resolved:
USB: gadget: Fix the memory leak in raw_gadget driver
|
2025-10-22 |
| CVE-2023-53719 |
In the Linux kernel, the following vulnerability has been resolved:
serial: arc_uart: fix of_iomap leak in `arc_serial_probe`
|
2025-10-22 |
| CVE-2022-50581 |
In the Linux kernel, the following vulnerability has been resolved:
hfs: fix OOB Read in __hfs_brec_find
|
2025-10-22 |
| CVE-2025-8677 |
Querying for records within a specially crafted zone containing certain malformed DNSKEY records can lead to CPU exhaustion. This issue affects BIND 9 versions 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
|
2025-10-22 |
| CVE-2022-50578 |
In the Linux kernel, the following vulnerability has been resolved:
class: fix possible memory leak in __class_register()
|
2025-10-22 |
| CVE-2023-53710 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7921: fix error code of return in mt7921_acpi_read
|
2025-10-22 |
| CVE-2023-53709 |
In the Linux kernel, the following vulnerability has been resolved:
ring-buffer: Handle race between rb_move_tail and rb_check_pages
|
2025-10-22 |
| CVE-2022-50571 |
In the Linux kernel, the following vulnerability has been resolved:
btrfs: call __btrfs_remove_free_space_cache_locked on cache load failure
|
2025-10-22 |
| CVE-2022-50576 |
In the Linux kernel, the following vulnerability has been resolved:
serial: pch: Fix PCI device refcount leak in pch_request_dma()
|
2025-10-22 |
| CVE-2022-50564 |
In the Linux kernel, the following vulnerability has been resolved:
s390/netiucv: Fix return type of netiucv_tx()
|
2025-10-22 |
| CVE-2022-50565 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: plfxlc: fix potential memory leak in __lf_x_usb_enable_rx()
|
2025-10-22 |
| CVE-2023-53713 |
In the Linux kernel, the following vulnerability has been resolved:
arm64: sme: Use STR P to clear FFR context field in streaming SVE mode
|
2025-10-22 |
| CVE-2025-11411 |
NLnet Labs Unbound up to and including version 1.24.0 is vulnerable to possible domain hijack attacks. Promiscuous NS RRSets that complement positive DNS replies in the authority section can be used to trick resolvers to update their delegation information for the zone. Usually these RRSets are used to update the resolver's knowledge of the zone's name servers. A malicious actor can exploit the possible poisonous effect by injecting NS RRSets (and possibly their respective address records) in a reply. This could be done for example by trying to spoof a packet or fragmentation attacks. Unbound would then proceed to update the NS RRSet data it already has since the new data has enough trust for it, i.e., in-zone data for the delegation point. Unbound 1.24.1 includes a fix that scrubs unsolicited NS RRSets (and their respective address records) from replies mitigating the possible poison effect.
unbound-1.7.3-15.amzn2.0.11 for AL2, unbound-1.17.0-2.amzn2.0.8 for AL2 extras and unbound-1.17.1-1.amzn2023.0.9 for AL2023 introduce a new configuration iter-scrub-promiscuous in order to fix CVE-2025-11411.
We recommend not disabling the config iter-scrub-promiscuous which is enabled by default in order to protect against the vulnerability
|
2025-10-22 |
| CVE-2023-53700 |
In the Linux kernel, the following vulnerability has been resolved:
media: max9286: Fix memleak in max9286_v4l2_register()
|
2025-10-22 |
| CVE-2023-53731 |
In the Linux kernel, the following vulnerability has been resolved:
netlink: fix potential deadlock in netlink_set_err()
|
2025-10-22 |
| CVE-2023-53728 |
In the Linux kernel, the following vulnerability has been resolved:
posix-timers: Ensure timer ID search-loop limit is valid
|
2025-10-22 |
| CVE-2023-53726 |
In the Linux kernel, the following vulnerability has been resolved:
arm64: csum: Fix OoB access in IP checksum code for negative lengths
|
2025-10-22 |
| CVE-2022-50573 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7915: fix mt7915_rate_txpower_get() resource leaks
|
2025-10-22 |
| CVE-2023-53699 |
In the Linux kernel, the following vulnerability has been resolved:
riscv: move memblock_allow_resize() after linear mapping is ready
|
2025-10-22 |
| CVE-2023-53732 |
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Fix NULL dereference in ni_write_inode
|
2025-10-22 |
| CVE-2022-50562 |
In the Linux kernel, the following vulnerability has been resolved:
tpm: acpi: Call acpi_put_table() to fix memory leak
|
2025-10-22 |
| CVE-2023-53695 |
In the Linux kernel, the following vulnerability has been resolved:
udf: Detect system inodes linked into directory hierarchy
|
2025-10-22 |
| CVE-2022-50559 |
In the Linux kernel, the following vulnerability has been resolved:
clk: imx: scu: fix memleak on platform_device_add() fails
|
2025-10-22 |
| CVE-2023-53725 |
In the Linux kernel, the following vulnerability has been resolved:
clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe
|
2025-10-22 |
| CVE-2023-53704 |
In the Linux kernel, the following vulnerability has been resolved:
clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe()
|
2025-10-22 |
| CVE-2022-50568 |
In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: f_hid: fix f_hidg lifetime vs cdev
|
2025-10-22 |
| CVE-2022-50569 |
In the Linux kernel, the following vulnerability has been resolved:
xfrm: Update ipcomp_scratches with NULL when freed
|
2025-10-22 |
| CVE-2023-53698 |
In the Linux kernel, the following vulnerability has been resolved:
xsk: fix refcount underflow in error path
|
2025-10-22 |
| CVE-2023-53727 |
In the Linux kernel, the following vulnerability has been resolved:
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
2025-10-22 |
| CVE-2022-50560 |
In the Linux kernel, the following vulnerability has been resolved:
drm/meson: explicitly remove aggregate driver at module unload time
|
2025-10-22 |
| CVE-2023-53721 |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan()
|
2025-10-22 |
| CVE-2022-50556 |
In the Linux kernel, the following vulnerability has been resolved:
drm: Fix potential null-ptr-deref due to drmm_mode_config_init()
|
2025-10-22 |
| CVE-2023-53729 |
In the Linux kernel, the following vulnerability has been resolved:
soc: qcom: qmi_encdec: Restrict string length in decode
|
2025-10-22 |
| CVE-2022-50561 |
In the Linux kernel, the following vulnerability has been resolved:
iio: fix memory leak in iio_device_register_eventset()
|
2025-10-22 |
| CVE-2022-50575 |
In the Linux kernel, the following vulnerability has been resolved:
xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource()
|
2025-10-22 |
| CVE-2023-53708 |
In the Linux kernel, the following vulnerability h |