Логотип exploitDog
bind:CVE-2025-37976
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-37976

Количество 5

Количество 5

ubuntu логотип

CVE-2025-37976

6 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
redhat логотип

CVE-2025-37976

6 месяцев назад

This CVE has been marked as Rejected by the assigning CNA.

EPSS: Низкий
nvd логотип

CVE-2025-37976

6 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
msrc логотип

CVE-2025-37976

2 месяца назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
github логотип

GHSA-q3xx-7w2r-fqwq

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process [ Upstream commit 63fdc4509bcf483e79548de6bc08bf3c8e504bb3 ] Currently, ath12k_dp_mon_srng_process uses ath12k_hal_srng_src_get_next_entry to fetch the next entry from the destination ring. This is incorrect because ath12k_hal_srng_src_get_next_entry is intended for source rings, not destination rings. This leads to invalid entry fetches, causing potential data corruption or crashes due to accessing incorrect memory locations. This happens because the source ring and destination ring have different handling mechanisms and using the wrong function results in incorrect pointer arithmetic and ring management. To fix this issue, replace the call to ath12k_hal_srng_src_get_next_entry with ath12k_hal_srng_dst_get_next_entry in ath12k_dp_mon_srng_process. This ensures that the correct function is used for fetching entries from the destination ring, pre...

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-37976

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

6 месяцев назад
redhat логотип
CVE-2025-37976

This CVE has been marked as Rejected by the assigning CNA.

6 месяцев назад
nvd логотип
CVE-2025-37976

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

6 месяцев назад
msrc логотип
CVE-2025-37976

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

2 месяца назад
github логотип
GHSA-q3xx-7w2r-fqwq

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process [ Upstream commit 63fdc4509bcf483e79548de6bc08bf3c8e504bb3 ] Currently, ath12k_dp_mon_srng_process uses ath12k_hal_srng_src_get_next_entry to fetch the next entry from the destination ring. This is incorrect because ath12k_hal_srng_src_get_next_entry is intended for source rings, not destination rings. This leads to invalid entry fetches, causing potential data corruption or crashes due to accessing incorrect memory locations. This happens because the source ring and destination ring have different handling mechanisms and using the wrong function results in incorrect pointer arithmetic and ring management. To fix this issue, replace the call to ath12k_hal_srng_src_get_next_entry with ath12k_hal_srng_dst_get_next_entry in ath12k_dp_mon_srng_process. This ensures that the correct function is used for fetching entries from the destination ring, pre...

6 месяцев назад

Уязвимостей на страницу