Page 13 of 3756 results (0.005 seconds)

CVSS: 8.5EPSS: 0%CPEs: 7EXPL: 0

09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() ADP5061_CHG_STATUS_1_CHG_STATUS is masked with 0x07, which means a length of 8, but adp5061_chg_type array size is 4, may end up reading 4 elements beyond the end of the adp5061_chg_type[] array. In the Linux kernel, the following vulnerability has been resolved: power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() ADP5061_CHG_STATUS_1_CHG_STATUS is... • https://git.kernel.org/stable/c/24a0be36e9a21f63de2e6088607e689e59ec15f4 •

CVSS: 7.1EPSS: 0%CPEs: 9EXPL: 0

09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe pm_runtime_get_sync() will increment pm usage counter. Forgetting to putting operation will result in reference leak. Add missing pm_runtime_put_sync in some error paths. In the Linux kernel, the following vulnerability has been resolved: clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe pm_runtime_get_sync() will increment pm usage counter. Forgetting to putting op... • https://git.kernel.org/stable/c/9ac33b0ce81fa48dd39e7ddfc1bf4519052181dd •

CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 0

09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: HSI: omap_ssi: Fix refcount leak in ssi_probe When returning or breaking early from a for_each_available_child_of_node() loop, we need to explicitly call of_node_put() on the child node to possibly release the node. In the Linux kernel, the following vulnerability has been resolved: HSI: omap_ssi: Fix refcount leak in ssi_probe When returning or breaking early from a for_each_available_child_of_node() loop, we need to explicitly call of_nod... • https://git.kernel.org/stable/c/b209e047bc743247f74ce79e8827ae1ed556bae0 •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: mmc: core: Fix kernel panic when remove non-standard SDIO card SDIO tuple is only allocated for standard SDIO card, especially it causes memory corruption issues when the non-standard SDIO card has removed, which is because the card device's reference counter does not increase for it at sdio_init_func(), but all SDIO card device reference counter gets decreased at sdio_release_func(). In the Linux kernel, the following vulnerability has bee... • https://git.kernel.org/stable/c/6f51be3d37dff73cf8db771df4169f4c2f1cbf66 •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: ext4: fix bug_on in __es_tree_search caused by bad boot loader inode We got a issue as fllows: ================================================================== kernel BUG at fs/ext4/extents_status.c:203! invalid opcode: 0000 [#1] PREEMPT SMP CPU: 1 PID: 945 Comm: cat Not tainted 6.0.0-next-20221007-dirty #349 RIP: 0010:ext4_es_end.isra.0+0x34/0x42 RSP: 0018:ffffc9000143b768 EFLAGS: 00010203 RAX: 0000000000000000 RBX: ffff8881769cd0b8 RCX:... • https://git.kernel.org/stable/c/e76ede9d2c9e0af4573342b56d7cdbf757c18084 •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: PCI: Fix pci_device_is_present() for VFs by checking PF pci_device_is_present() previously didn't work for VFs because it reads the Vendor and Device ID, which are 0xffff for VFs, which looks like they aren't present. Check the PF instead. Wei Gong reported that if virtio I/O is in progress when the driver is unbound or "0" is written to /sys/.../sriov_numvfs, the virtio I/O operation hangs, which may result in output like this: task:bash s... • https://git.kernel.org/stable/c/f4b44c7766dae2b8681f621941cabe9f14066d59 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

08 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix memory leak in ath12k_qmi_driver_event_work() Currently the buffer pointed by event is not freed in case ATH12K_FLAG_UNREGISTERING bit is set, this causes memory leak. Add a goto skip instead of return, to ensure event and all the list entries are freed properly. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1 In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix memor... • https://git.kernel.org/stable/c/a87f59041a7f77b4bdab05cea60ac6adc69dc5d2 •

CVSS: 7.1EPSS: 0%CPEs: 8EXPL: 0

08 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: FS: JFS: Check for read-only mounted filesystem in txBegin This patch adds a check for read-only mounted filesystem in txBegin before starting a transaction potentially saving from NULL pointer deref. • https://git.kernel.org/stable/c/a88efca805bea93cea9187dfd00835aa7093bf1b •

CVSS: 6.6EPSS: 0%CPEs: 3EXPL: 0

08 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: dm cache: free background tracker's queued work in btracker_destroy Otherwise the kernel can BUG with: [ 2245.426978] ============================================================================= [ 2245.435155] BUG bt_work (Tainted: G B W ): Objects remaining in bt_work on __kmem_cache_shutdown() [ 2245.445233] ----------------------------------------------------------------------------- [ 2245.445233] [ 2245.454879] Slab 0x00000000b0ce2b30... • https://git.kernel.org/stable/c/673a3af21d5e3ed769f3eaed0c888244290a3506 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

08 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Handle lock during peer_id find ath12k_peer_find_by_id() requires that the caller hold the ab->base_lock. Currently the WBM error path does not hold the lock and calling that function, leads to the following lockdep_assert()in QCN9274: [105162.160893] ------------[ cut here ]------------ [105162.160916] WARNING: CPU: 3 PID: 0 at drivers/net/wireless/ath/ath12k/peer.c:71 ath12k_peer_find_by_id+0x52/0x60 [ath12k] [105162.160933]... • https://git.kernel.org/stable/c/9faf7c696610a348ca94a224d55c946b19b3279d •