Количество 41 119
Количество 41 119
CVE-2025-40014
In the Linux kernel, the following vulnerability has been resolved: objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() If speed_hz < AMD_SPI_MIN_HZ, amd_set_spi_freq() iterates over the entire amd_spi_freq array without breaking out early, causing 'i' to go beyond the array bounds. Fix that by stopping the loop when it gets to the last entry, so the low speed_hz value gets clamped up to AMD_SPI_MIN_HZ. Fixes the following warning with an UBSAN kernel: drivers/spi/spi-amd.o: error: objtool: amd_set_spi_freq() falls through to next function amd_spi_set_opcode()
CVE-2025-39989
In the Linux kernel, the following vulnerability has been resolved: x86/mce: use is_copy_from_user() to determine copy-from-user context Patch series "mm/hwpoison: Fix regressions in memory failure handling", v4. ## 1. What am I trying to do: This patchset resolves two critical regressions related to memory failure handling that have appeared in the upstream kernel since version 5.17, as compared to 5.10 LTS. - copyin case: poison found in user page while kernel copying from user space - instr case: poison found while instruction fetching in user space ## 2. What is the expected outcome and why - For copyin case: Kernel can recover from poison found where kernel is doing get_user() or copy_from_user() if those places get an error return and the kernel return -EFAULT to the process instead of crashing. More specifily, MCE handler checks the fixup handler type to decide whether an in kernel #MC can be recovered. When EX_TYPE_UACCESS is found, the PC jumps to recovery code specified ...
CVE-2025-39930
In the Linux kernel, the following vulnerability has been resolved: ASoC: simple-card-utils: Don't use __free(device_node) at graph_util_parse_dai() commit 419d1918105e ("ASoC: simple-card-utils: use __free(device_node) for device node") uses __free(device_node) for dlc->of_node, but we need to keep it while driver is in use. Don't use __free(device_node) in graph_util_parse_dai().
CVE-2025-39888
No description is available for this CVE.
CVE-2025-39887
No description is available for this CVE.
CVE-2025-39886
No description is available for this CVE.
CVE-2025-39885
No description is available for this CVE.
CVE-2025-39884
No description is available for this CVE.
CVE-2025-39883
No description is available for this CVE.
CVE-2025-39882
No description is available for this CVE.
CVE-2025-39881
No description is available for this CVE.
CVE-2025-39880
No description is available for this CVE.
CVE-2025-39879
No description is available for this CVE.
CVE-2025-39878
No description is available for this CVE.
CVE-2025-39877
No description is available for this CVE.
CVE-2025-39876
No description is available for this CVE.
CVE-2025-39875
No description is available for this CVE.
CVE-2025-39874
No description is available for this CVE.
CVE-2025-39873
No description is available for this CVE.
CVE-2025-39872
No description is available for this CVE.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-40014 In the Linux kernel, the following vulnerability has been resolved: objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() If speed_hz < AMD_SPI_MIN_HZ, amd_set_spi_freq() iterates over the entire amd_spi_freq array without breaking out early, causing 'i' to go beyond the array bounds. Fix that by stopping the loop when it gets to the last entry, so the low speed_hz value gets clamped up to AMD_SPI_MIN_HZ. Fixes the following warning with an UBSAN kernel: drivers/spi/spi-amd.o: error: objtool: amd_set_spi_freq() falls through to next function amd_spi_set_opcode() | CVSS3: 7.1 | 0% Низкий | 8 месяцев назад | |
CVE-2025-39989 In the Linux kernel, the following vulnerability has been resolved: x86/mce: use is_copy_from_user() to determine copy-from-user context Patch series "mm/hwpoison: Fix regressions in memory failure handling", v4. ## 1. What am I trying to do: This patchset resolves two critical regressions related to memory failure handling that have appeared in the upstream kernel since version 5.17, as compared to 5.10 LTS. - copyin case: poison found in user page while kernel copying from user space - instr case: poison found while instruction fetching in user space ## 2. What is the expected outcome and why - For copyin case: Kernel can recover from poison found where kernel is doing get_user() or copy_from_user() if those places get an error return and the kernel return -EFAULT to the process instead of crashing. More specifily, MCE handler checks the fixup handler type to decide whether an in kernel #MC can be recovered. When EX_TYPE_UACCESS is found, the PC jumps to recovery code specified ... | CVSS3: 5.5 | 0% Низкий | 8 месяцев назад | |
CVE-2025-39930 In the Linux kernel, the following vulnerability has been resolved: ASoC: simple-card-utils: Don't use __free(device_node) at graph_util_parse_dai() commit 419d1918105e ("ASoC: simple-card-utils: use __free(device_node) for device node") uses __free(device_node) for dlc->of_node, but we need to keep it while driver is in use. Don't use __free(device_node) in graph_util_parse_dai(). | CVSS3: 5.5 | 0% Низкий | 8 месяцев назад | |
CVE-2025-39888 No description is available for this CVE. | CVSS3: 7 | 0% Низкий | 3 месяца назад | |
CVE-2025-39887 No description is available for this CVE. | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-39886 No description is available for this CVE. | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-39885 No description is available for this CVE. | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-39884 No description is available for this CVE. | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-39883 No description is available for this CVE. | CVSS3: 7 | 0% Низкий | 3 месяца назад | |
CVE-2025-39882 No description is available for this CVE. | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-39881 No description is available for this CVE. | CVSS3: 7 | 0% Низкий | 3 месяца назад | |
CVE-2025-39880 No description is available for this CVE. | CVSS3: 7 | 0% Низкий | 3 месяца назад | |
CVE-2025-39879 No description is available for this CVE. | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-39878 No description is available for this CVE. | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-39877 No description is available for this CVE. | CVSS3: 7 | 0% Низкий | 3 месяца назад | |
CVE-2025-39876 No description is available for this CVE. | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-39875 No description is available for this CVE. | CVSS3: 7 | 0% Низкий | 3 месяца назад | |
CVE-2025-39874 No description is available for this CVE. | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-39873 No description is available for this CVE. | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-39872 No description is available for this CVE. | CVSS3: 5.5 | 0% Низкий | 3 месяца назад |
Уязвимостей на страницу