
CVE-2025-21983 – mm/slab/kvfree_rcu: Switch to WQ_MEM_RECLAIM wq
https://notcve.org/view.php?id=CVE-2025-21983
01 Apr 2025 — In the Linux kernel, the following vulnerability has been resolved: mm/slab/kvfree_rcu: Switch to WQ_MEM_RECLAIM wq Currently kvfree_rcu() APIs use a system workqueue which is "system_unbound_wq" to driver RCU machinery to reclaim a memory. ... In the Linux kernel, the following vulnerability has been resolved: mm/slab/kvfree_rcu: Switch to WQ_MEM_RECLAIM wq Currently kvfree_rcu() APIs use a system workqueue which is "system_unbound_wq" to driver RCU machinery to reclaim a memory. • https://git.kernel.org/stable/c/6c6c47b063b593785202be158e61fe5c827d6677 •

CVE-2025-21982 – pinctrl: nuvoton: npcm8xx: Add NULL check in npcm8xx_gpio_fw
https://notcve.org/view.php?id=CVE-2025-21982
01 Apr 2025 — In the Linux kernel, the following vulnerability has been resolved: pinctrl: nuvoton: npcm8xx: Add NULL check in npcm8xx_gpio_fw devm_kasprintf() calls can return null pointers on failure. In the Linux kernel, the following vulnerability has been resolved: pinctrl: nuvoton: npcm8xx: Add NULL check in npcm8xx_gpio_fw devm_kasprintf() calls can return null pointers on failure. But the return values were not checked in npcm8xx_gpio_fw(). • https://git.kernel.org/stable/c/acf4884a571709cad99f98aabe08b7cacd62dc80 •

CVE-2025-21981 – ice: fix memory leak in aRFS after reset
https://notcve.org/view.php?id=CVE-2025-21981
01 Apr 2025 — In the Linux kernel, the following vulnerability has been resolved: ice: fix memory leak in aRFS after reset Fix aRFS (accelerated Receive Flow Steering) structures memory leak by adding a checker to verify if aRFS memory is already allocated while configuring VSI. In the Linux kernel, the following vulnerability has been resolved: ice: fix memory leak in aRFS after reset Fix aRFS (accelerated Receive Flow Steering) structures memory leak by adding a checker to verify if aRFS memory is already... • https://git.kernel.org/stable/c/28bf26724fdb0e02267d19e280d6717ee810a10d •

CVE-2025-21980 – sched: address a potential NULL pointer dereference in the GRED scheduler.
https://notcve.org/view.php?id=CVE-2025-21980
01 Apr 2025 — In the Linux kernel, the following vulnerability has been resolved: sched: address a potential NULL pointer dereference in the GRED scheduler. ... In the Linux kernel, the following vulnerability has been resolved: sched: address a potential NULL pointer dereference in the GRED scheduler. ... Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. • https://git.kernel.org/stable/c/f25c0515c521375154c62c72447869f40218c861 •

CVE-2025-21979 – wifi: cfg80211: cancel wiphy_work before freeing wiphy
https://notcve.org/view.php?id=CVE-2025-21979
01 Apr 2025 — In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: cancel wiphy_work before freeing wiphy A wiphy_work can be queued from the moment the wiphy is allocated and initialized (i.e. In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: cancel wiphy_work before freeing wiphy A wiphy_work can be queued from the moment the wiphy is allocated and initialized (i.e. wiphy_new_nm). ... • https://git.kernel.org/stable/c/3fcc6d7d5f40dad56dee7bde787b7e23edd4b93c •

CVE-2025-21978 – drm/hyperv: Fix address space leak when Hyper-V DRM device is removed
https://notcve.org/view.php?id=CVE-2025-21978
01 Apr 2025 — In the Linux kernel, the following vulnerability has been resolved: drm/hyperv: Fix address space leak when Hyper-V DRM device is removed When a Hyper-V DRM device is probed, the driver allocates MMIO space for the vram, and maps it cacheable. In the Linux kernel, the following vulnerability has been resolved: drm/hyperv: Fix address space leak when Hyper-V DRM device is removed When a Hyper-V DRM device is probed, the driver allocates MMIO space for the vram, and maps it cacheable. ... • https://git.kernel.org/stable/c/a0ab5abced550ddeefddb06055ed60779a54eb79 •

CVE-2025-21977 – fbdev: hyperv_fb: Fix hang in kdump kernel when on Hyper-V Gen 2 VMs
https://notcve.org/view.php?id=CVE-2025-21977
01 Apr 2025 — In the Linux kernel, the following vulnerability has been resolved: fbdev: hyperv_fb: Fix hang in kdump kernel when on Hyper-V Gen 2 VMs Gen 2 Hyper-V VMs boot via EFI and have a standard EFI framebuffer device. ... This problem and fix are described in terms of the kdump kernel, but it can also occur ---truncated--- In the Linux kernel, the following vulnerability has been resolved: fbdev: hyperv_fb: Fix hang in kdump kernel when on Hyper-V Gen 2 VMs Gen 2 Hyper-V VMs boot via EFI and have a ... • https://git.kernel.org/stable/c/c25a19afb81cfd73dab494ba64f9a434cf1a4499 •

CVE-2025-21976 – fbdev: hyperv_fb: Allow graceful removal of framebuffer
https://notcve.org/view.php?id=CVE-2025-21976
01 Apr 2025 — In the Linux kernel, the following vulnerability has been resolved: fbdev: hyperv_fb: Allow graceful removal of framebuffer When a Hyper-V framebuffer device is unbind, hyperv_fb driver tries to release the framebuffer forcefully. ... In the Linux kernel, the following vulnerability has been resolved: fbdev: hyperv_fb: Allow graceful removal of framebuffer When a Hyper-V framebuffer device is unbind, hyperv_fb driver tries to release the framebuffer forcefully. • https://git.kernel.org/stable/c/68a2d20b79b105f02dcbc52c211d7e62f98996b7 •

CVE-2025-21975 – net/mlx5: handle errors in mlx5_chains_create_table()
https://notcve.org/view.php?id=CVE-2025-21975
01 Apr 2025 — In the Linux kernel, the following vulnerability has been resolved: net/mlx5: handle errors in mlx5_chains_create_table() In mlx5_chains_create_table(), the return value of mlx5_get_fdb_sub_ns() and mlx5_get_flow_namespace() must be checked to prevent NULL pointer dereferences. In the Linux kernel, the following vulnerability has been resolved: net/mlx5: handle errors in mlx5_chains_create_table() In mlx5_chains_create_table(), the return value of mlx5_get_fdb_sub_ns() and mlx5_get_flow_namesp... • https://git.kernel.org/stable/c/39ac237ce00968545e7298faa9e07ecb7e440fb5 •

CVE-2025-21974 – eth: bnxt: return fail if interface is down in bnxt_queue_mem_alloc()
https://notcve.org/view.php?id=CVE-2025-21974
01 Apr 2025 — In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: return fail if interface is down in bnxt_queue_mem_alloc() The bnxt_queue_mem_alloc() is called to allocate new queue memory when a queue is restarted. In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: return fail if interface is down in bnxt_queue_mem_alloc() The bnxt_queue_mem_alloc() is called to allocate new queue memory when a queue is restarted. • https://git.kernel.org/stable/c/2d694c27d32efc9467a8a20e4ad641ab5adfd07d •