Page 14 of 6262 results (0.010 seconds)

CVSS: -EPSS: 0%CPEs: 6EXPL: 0

30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: debugobjects: Don't wake up kswapd from fill_pool() syzbot is reporting a lockdep warning in fill_pool() because the allocation from debugobjects is using GFP_ATOMIC, which is (__GFP_HIGH | __GFP_KSWAPD_RECLAIM) and therefore tries to wake up kswapd, which acquires kswapd_wait::lock. Since fill_pool() might be called with arbitrary locks held, fill_pool() should not assume that acquiring kswapd_wait::lock is safe. Use __GFP_HIGH instead and... • https://git.kernel.org/stable/c/3ac7fe5a4aab409bd5674d0b070bce97f9d20872 •

CVSS: -EPSS: 0%CPEs: 6EXPL: 0

30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT lppaca_shared_proc() takes a pointer to the lppaca which is typically accessed through get_lppaca(). With DEBUG_PREEMPT enabled, this leads to checking if preemption is enabled, for example: BUG: using smp_processor_id() in preemptible [00000000] code: grep/10693 caller is lparcfg_data+0x408/0x19a0 CPU: 4 PID: 10693 Comm: grep Not tainted 6.5.0-rc3 #2 Call Trace: dump_stack... • https://git.kernel.org/stable/c/f13c13a005127b5dc5daaca190277a062d946e63 •

CVSS: -EPSS: 0%CPEs: 12EXPL: 0

30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer() 'read' is freed when it is known to be NULL, but not when a read error occurs. Revert the logic to avoid a small leak, should a m920x_read() call fail. • https://git.kernel.org/stable/c/82ce3084892c0c0e006ec61f6144f2cc4e5ece88 •

CVSS: -EPSS: 0%CPEs: 8EXPL: 0

30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix an uninit variable access bug in __ip6_make_skb() Syzbot reported a bug as following: ===================================================== BUG: KMSAN: uninit-value in arch_atomic64_inc arch/x86/include/asm/atomic64_64.h:88 [inline] BUG: KMSAN: uninit-value in arch_atomic_long_inc include/linux/atomic/atomic-long.h:161 [inline] BUG: KMSAN: uninit-value in atomic_long_inc include/linux/atomic/atomic-instrumented.h:1429 [inline] BUG... • https://git.kernel.org/stable/c/14878f75abd5bf1d38becb405801cd491ee215dc •

CVSS: -EPSS: 0%CPEs: 8EXPL: 0

30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: fs/sysv: Null check to prevent null-ptr-deref bug sb_getblk(inode->i_sb, parent) return a null ptr and taking lock on that leads to the null-ptr-deref bug. • https://git.kernel.org/stable/c/e5657933863f43cc6bb76a54d659303dafaa9e58 •

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: drm/nouveau/kms/nv50-: init hpd_irq_lock for PIOR DP Fixes OOPS on boards with ANX9805 DP encoders. • https://git.kernel.org/stable/c/a0922278f83eae085fdf73d06f71bbdfb9d6789e •

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: cifs: Fix lost destroy smbd connection when MR allocate failed If the MR allocate failed, the smb direct connection info is NULL, then smbd_destroy() will directly return, then the connection info will be leaked. Let's set the smb direct connection info to the server before call smbd_destroy(). • https://git.kernel.org/stable/c/c7398583340a6d82b8bb7f7f21edcde27dc6a898 •

CVSS: -EPSS: 0%CPEs: 8EXPL: 0

30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: net: macb: fix a memory corruption in extended buffer descriptor mode For quite some time we were chasing a bug which looked like a sudden permanent failure of networking and mmc on some of our devices. The bug was very sensitive to any software changes and even more to any kernel debug options. Finally we got a setup where the problem was reproducible with CONFIG_DMA_API_DEBUG=y and it revealed the issue with the rx dma: [ 16.992082] -----... • https://git.kernel.org/stable/c/7b4296148066f19b5960127ba579e358df501c22 •

CVSS: -EPSS: 0%CPEs: 8EXPL: 0

30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: sh: dma: Fix DMA channel offset calculation Various SoCs of the SH3, SH4 and SH4A family, which use this driver, feature a differing number of DMA channels, which can be distributed between up to two DMAC modules. The existing implementation fails to correctly accommodate for all those variations, resulting in wrong channel offset calculations and leading to kernel panics. Rewrite dma_base_addr() in order to properly calculate channel offse... • https://git.kernel.org/stable/c/7f47c7189b3e8f19a589f77a3ad169d7b691b582 •

CVSS: -EPSS: 0%CPEs: 4EXPL: 0

30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX. syzkaller found zero division error [0] in div_s64_rem() called from get_cycle_time_elapsed(), where sched->cycle_time is the divisor. We have tests in parse_taprio_schedule() so that cycle_time will never be 0, and actually cycle_time is not 0 in get_cycle_time_elapsed(). The problem is that the types of divisor are different; cycle_time is s64, but the argument of div_s... • https://git.kernel.org/stable/c/4cfd5779bd6efe8c76b4494aec63a063be0d2ff2 •