Aggregator
CVE-2022-50434 | Linux Kernel up to 6.1.1 kmalloc_node_trace memory leak (Nessus ID 269630 / WID-SEC-2025-2187)
22 minutes 17 seconds ago
A vulnerability has been found in Linux Kernel up to 6.1.1 and classified as critical. Affected is the function kmalloc_node_trace. The manipulation leads to memory leak.
This vulnerability is uniquely identified as CVE-2022-50434. The attack can only be initiated within the local network. No exploit exists.
The affected component should be upgraded.
vuldb.com
CVE-2022-50431 | Linux Kernel up to 6.0.6 ALSA i2sbus_add_dev memory leak (WID-SEC-2025-2187)
22 minutes 18 seconds ago
A vulnerability was found in Linux Kernel up to 6.0.6. It has been declared as critical. This issue affects the function i2sbus_add_dev of the component ALSA. Such manipulation leads to memory leak.
This vulnerability is listed as CVE-2022-50431. The attack must be carried out from within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2022-50432 | Linux Kernel up to 6.0.6 kernfs_remove_by_name_ns use after free (WID-SEC-2025-2187)
22 minutes 18 seconds ago
A vulnerability identified as critical has been detected in Linux Kernel up to 6.0.6. The impacted element is the function kernfs_remove_by_name_ns. The manipulation leads to use after free.
This vulnerability is documented as CVE-2022-50432. The attack requires being on the local network. There is not any exploit available.
You should upgrade the affected component.
vuldb.com
CVE-2022-50433 | Linux Kernel up to 6.0.3 efi kfree use after free (WID-SEC-2025-2187)
22 minutes 18 seconds ago
A vulnerability was found in Linux Kernel up to 6.0.3 and classified as critical. Impacted is the function kfree of the component efi. Such manipulation leads to use after free.
This vulnerability is referenced as CVE-2022-50433. The attack needs to be initiated within the local network. No exploit is available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2022-50430 | Linux Kernel up to 6.1.2 vub300_enable_sdio_irq state issue (WID-SEC-2025-2187)
22 minutes 19 seconds ago
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.2. This affects the function vub300_enable_sdio_irq. The manipulation leads to state issue.
This vulnerability is uniquely identified as CVE-2022-50430. The attack can only be initiated within the local network. No exploit exists.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2022-50429 | Linux Kernel up to 5.10.149/5.15.74/5.19.16/6.0.2 memory of_lpddr3_get_ddr_timings reference count (WID-SEC-2025-2187)
22 minutes 19 seconds ago
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.10.149/5.15.74/5.19.16/6.0.2. This impacts the function of_lpddr3_get_ddr_timings of the component memory. Executing manipulation can lead to improper update of reference count.
This vulnerability is handled as CVE-2022-50429. The attack can only be done within the local network. There is not any exploit available.
You should upgrade the affected component.
vuldb.com
CVE-2025-38417 | Linux Kernel up to 6.12.34/6.15.3/6.16-rc2 ice pcpu_alloc_noprof memory leak (EUVD-2025-22669 / Nessus ID 254411)
1 hour 11 minutes ago
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.12.34/6.15.3/6.16-rc2. The affected element is the function pcpu_alloc_noprof of the component ice. The manipulation leads to memory leak.
This vulnerability is referenced as CVE-2025-38417. The attack needs to be initiated within the local network. No exploit is available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2025-38421 | Linux Kernel prior 6.15.4/6.16-rc3 amd_pmf_remove double free (Nessus ID 271193 / WID-SEC-2025-1653)
1 hour 11 minutes ago
A vulnerability identified as critical has been detected in Linux Kernel up to 3ed60e51ffdbfef14169bd967e21a6ba5e5ff42b/6.15.3/6.16-rc2/e70b4b8f93d7fcf8ee063a1d1f18782c4da3d335. The affected element is the function amd_pmf_remove. Performing manipulation results in double free.
This vulnerability is reported as CVE-2025-38421. The attacker must have access to the local network to execute the attack. No exploit exists.
You should upgrade the affected component.
vuldb.com
CVE-2025-38423 | Linux Kernel up to 6.12.34/6.15.3 ASoC devm_regulator_bulk_get double free (Nessus ID 271193 / WID-SEC-2025-1653)
1 hour 11 minutes ago
A vulnerability has been found in Linux Kernel up to 6.12.34/6.15.3 and classified as critical. Affected by this vulnerability is the function devm_regulator_bulk_get of the component ASoC. Performing manipulation results in double free.
This vulnerability is identified as CVE-2025-38423. The attack can only be performed from the local network. There is not any exploit available.
The affected component should be upgraded.
vuldb.com
CVE-2025-38427 | Linux Kernel up to 6.6.94/6.12.34/6.15.3 video pcibios_bus_to_resource buffer overflow (Nessus ID 271193 / WID-SEC-2025-1653)
1 hour 11 minutes ago
A vulnerability identified as critical has been detected in Linux Kernel up to 6.6.94/6.12.34/6.15.3. This issue affects the function pcibios_bus_to_resource of the component Video. Performing manipulation results in buffer overflow.
This vulnerability is cataloged as CVE-2025-38427. The attack must originate from the local network. There is no exploit available.
You should upgrade the affected component.
vuldb.com
CVE-2025-38429 | Linux Kernel up to 6.6.94/6.12.34/6.15.3 bus mhi_ep_ring_add_element race condition (Nessus ID 253428 / WID-SEC-2025-1653)
1 hour 11 minutes ago
A vulnerability described as problematic has been identified in Linux Kernel up to 6.6.94/6.12.34/6.15.3. Affected is the function mhi_ep_ring_add_element of the component bus. Such manipulation leads to race condition.
This vulnerability is documented as CVE-2025-38429. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2025-38426 | Linux Kernel up to 6.15.3 RAS Header Field allocation of resources (Nessus ID 253428 / WID-SEC-2025-1653)
1 hour 11 minutes ago
A vulnerability was found in Linux Kernel up to 6.15.3 and classified as problematic. Affected by this issue is some unknown functionality of the component RAS Header Field Handler. Executing manipulation can lead to allocation of resources.
This vulnerability is tracked as CVE-2025-38426. The attack is only possible within the local network. No exploit exists.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2025-38431 | Linux Kernel up to 6.15.4/6.16-rc3 smb symlink (Nessus ID 271193 / WID-SEC-2025-1653)
1 hour 11 minutes ago
A vulnerability was found in Linux Kernel up to 6.15.4/6.16-rc3. It has been classified as critical. This affects an unknown part of the component smb. The manipulation leads to symlink following.
This vulnerability is listed as CVE-2025-38431. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is recommended.
vuldb.com
CVE-2025-38434 | Linux Kernel up to 6.12.35/6.15.4/6.16-rc3 __access_ok comparison (Nessus ID 271193 / WID-SEC-2025-1653)
1 hour 11 minutes ago
A vulnerability was found in Linux Kernel up to 6.12.35/6.15.4/6.16-rc3. It has been rated as problematic. Affected by this issue is the function __access_ok. The manipulation leads to incorrect comparison.
This vulnerability is documented as CVE-2025-38434. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is advised.
vuldb.com
CVE-2025-38432 | Linux Kernel up to 6.15.4/6.16-rc3 net csum_ipv6_magic initialization (WID-SEC-2025-1653)
1 hour 11 minutes ago
A vulnerability described as problematic has been identified in Linux Kernel up to 6.15.4/6.16-rc3. The affected element is the function csum_ipv6_magic of the component net. Executing manipulation can lead to improper initialization.
This vulnerability is handled as CVE-2025-38432. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2025-38433 | Linux Kernel up to 6.15.4/6.16-rc3 riscv __runtime_fixup_32 addi_insn_mask random values (WID-SEC-2025-1653)
1 hour 11 minutes ago
A vulnerability was found in Linux Kernel up to 6.15.4/6.16-rc3. It has been classified as problematic. Impacted is the function __runtime_fixup_32 of the component riscv. This manipulation of the argument addi_insn_mask causes insufficiently random values.
This vulnerability is tracked as CVE-2025-38433. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is recommended.
vuldb.com
CVE-2025-38435 | Linux Kernel up to 6.15.4/6.16-rc3 riscv privilege escalation (Nessus ID 252217 / WID-SEC-2025-1653)
1 hour 11 minutes ago
A vulnerability marked as problematic has been reported in Linux Kernel up to 6.15.4/6.16-rc3. Impacted is an unknown function of the component riscv. Performing manipulation results in privilege escalation.
This vulnerability is known as CVE-2025-38435. Access to the local network is required for this attack. No exploit is available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2025-38436 | Linux Kernel up to 6.6.95/6.12.35/6.15.4 drm_sched_entity_kill locking (Nessus ID 271193 / WID-SEC-2025-1653)
1 hour 11 minutes ago
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.6.95/6.12.35/6.15.4. Affected is the function drm_sched_entity_kill. Such manipulation leads to improper locking.
This vulnerability is referenced as CVE-2025-38436. The attack needs to be initiated within the local network. No exploit is available.
You should upgrade the affected component.
vuldb.com
CVE-2025-38438 | Linux Kernel up to 6.12.38/6.15.6/6.16-rc3 ASoC devm_kstrdup memory leak (WID-SEC-2025-1653)
1 hour 11 minutes ago
A vulnerability described as critical has been identified in Linux Kernel up to 6.12.38/6.15.6/6.16-rc3. This impacts the function devm_kstrdup of the component ASoC. The manipulation results in memory leak.
This vulnerability is known as CVE-2025-38438. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is recommended.
vuldb.com