Filter and search through 196,046 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2025-40072 | In the Linux kernel, the following vulnerability has been resolved: fanotify: Validate the return value of mnt_ns_from_dentry() before dereferencing ... | 0.0 | 0 | Neutral | No |
| Yes |
| CVE-2025-40071 | In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: Don't block input queue by waiting MSC Currently gsm_queue() process... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40070 | In the Linux kernel, the following vulnerability has been resolved: pps: fix warning in pps_register_cdev when register device fail Similar to previ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40069 | In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix obj leak in VM_BIND error path If we fail a handle-lookup part way ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40068 | In the Linux kernel, the following vulnerability has been resolved: fs: ntfs3: Fix integer overflow in run_unpack() The MFT record relative to the f... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40067 | In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist Index all... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40066 | In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7996: Check phy before init msta_link in mt7996_mac_sta_add_links()... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40065 | In the Linux kernel, the following vulnerability has been resolved: RISC-V: KVM: Write hgatp register with valid mode bits According to the RISC-V P... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40064 | In the Linux kernel, the following vulnerability has been resolved: smc: Fix use-after-free in __pnet_find_base_ndev(). syzbot reported use-after-fr... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40063 | In the Linux kernel, the following vulnerability has been resolved: crypto: comp - Use same definition of context alloc and free ops In commit 42d9f... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40062 | In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs When the initializatio... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40061 | In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix race in do_task() when draining When do_task() exhausts its iterat... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40060 | In the Linux kernel, the following vulnerability has been resolved: coresight: trbe: Return NULL pointer for allocation failures When the TRBE drive... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40059 | In the Linux kernel, the following vulnerability has been resolved: coresight: Fix incorrect handling for return value of devm_kzalloc The return va... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40058 | In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Disallow dirty tracking if incoherent page walk Dirty page tracking ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40057 | In the Linux kernel, the following vulnerability has been resolved: ptp: Add a upper bound on max_vclocks syzbot reported WARNING in max_vclocks_sto... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40056 | In the Linux kernel, the following vulnerability has been resolved: vhost: vringh: Fix copy_to_iter return value check The return value of copy_to_i... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40055 | In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix double free in user_cluster_connect() user_cluster_disconnect() frees... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40054 | In the Linux kernel, the following vulnerability has been resolved: f2fs: fix UAF issue in f2fs_merge_page_bio() As JY reported in bugzilla [1], Un... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40053 | In the Linux kernel, the following vulnerability has been resolved: net: dlink: handle copy_thresh allocation failure The driver did not handle fail... | 0.0 | 0 | Neutral | No | Yes |