Searching...
Please wait while we search the database
| CVE ID | Severity | Description | Published | Actions |
|---|---|---|---|---|
|
CVE-2024-58246
|
N/A |
30 Dec 2025
|
||
|
CVE-2024-58245
|
N/A |
30 Dec 2025
|
||
|
CVE-2024-58244
|
N/A |
30 Dec 2025
|
||
|
CVE-2024-58243
|
N/A |
30 Dec 2025
|
||
|
CVE-2024-58242
|
N/A |
30 Dec 2025
|
||
|
CVE-2022-50613
|
N/A |
30 Dec 2025
|
||
|
CVE-2022-50612
|
N/A |
30 Dec 2025
|
||
|
CVE-2022-50611
|
N/A |
30 Dec 2025
|
||
|
CVE-2022-50610
|
N/A |
30 Dec 2025
|
||
|
CVE-2022-50609
|
N/A |
30 Dec 2025
|
||
|
CVE-2022-50608
|
N/A |
30 Dec 2025
|
||
|
CVE-2022-50607
|
N/A |
30 Dec 2025
|
||
|
CVE-2022-50606
|
N/A |
30 Dec 2025
|
||
|
CVE-2022-50605
|
N/A |
30 Dec 2025
|
||
|
CVE-2022-50604
|
N/A |
30 Dec 2025
|
||
|
CVE-2022-50603
|
N/A |
30 Dec 2025
|
||
|
CVE-2022-50602
|
N/A |
30 Dec 2025
|
||
|
CVE-2022-50601
|
N/A |
30 Dec 2025
|
||
|
CVE-2022-50600
|
N/A |
30 Dec 2025
|
||
|
CVE-2022-50599
|
N/A |
30 Dec 2025
|
||
|
CVE-2022-50598
|
N/A |
30 Dec 2025
|
||
|
CVE-2022-50597
|
N/A |
30 Dec 2025
|
||
|
CVE-2025-15249
|
MEDIUM |
A weakness has been identified in zhujunliang3 work_platform up to 6bc5a50bb527ce27f7906d11ea6ec139beb79c31. This vulnerability affects unknown code of the component Content Handler. Executing manipulation can lead to cross site scripting. The attack may be performed from remote. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The project was informed of the problem early through an issue report but has not responded yet.
|
30 Dec 2025
|
|
|
CVE-2023-54326
|
N/A |
In the Linux kernel, the following vulnerability has been resolved:
misc: pci_endpoint_test: Free IRQs before removing the device
In pci_endpoint_test_remove(), freeing the IRQs after removing the device
creates a small race window for IRQs to be received with the test device
memory already released, causing the IRQ handler to access invalid memory,
resulting in an oops.
Free the device IRQs before removing the device to avoid this issue.
|
30 Dec 2025
|
|
|
CVE-2023-54325
|
N/A |
In the Linux kernel, the following vulnerability has been resolved:
crypto: qat - fix out-of-bounds read
When preparing an AER-CTR request, the driver copies the key provided by
the user into a data structure that is accessible by the firmware.
If the target device is QAT GEN4, the key size is rounded up by 16 since
a rounded up size is expected by the device.
If the key size is rounded up before the copy, the size used for copying
the key might be bigger than the size of the region containing the key,
causing an out-of-bounds read.
Fix by doing the copy first and then update the keylen.
This is to fix the following warning reported by KASAN:
[ 138.150574] BUG: KASAN: global-out-of-bounds in qat_alg_skcipher_init_com.isra.0+0x197/0x250 [intel_qat]
[ 138.150641] Read of size 32 at addr ffffffff88c402c0 by task cryptomgr_test/2340
[ 138.150651] CPU: 15 PID: 2340 Comm: cryptomgr_test Not tainted 6.2.0-rc1+ #45
[ 138.150659] Hardware name: Intel Corporation ArcherCity/ArcherCity, BIOS EGSDCRB1.86B.0087.D13.2208261706 08/26/2022
[ 138.150663] Call Trace:
[ 138.150668] <TASK>
[ 138.150922] kasan_check_range+0x13a/0x1c0
[ 138.150931] memcpy+0x1f/0x60
[ 138.150940] qat_alg_skcipher_init_com.isra.0+0x197/0x250 [intel_qat]
[ 138.151006] qat_alg_skcipher_init_sessions+0xc1/0x240 [intel_qat]
[ 138.151073] crypto_skcipher_setkey+0x82/0x160
[ 138.151085] ? prepare_keybuf+0xa2/0xd0
[ 138.151095] test_skcipher_vec_cfg+0x2b8/0x800
|
30 Dec 2025
|
CVE-2024-58246
N/A
30 Dec 2025
CVE-2024-58245
N/A
30 Dec 2025
CVE-2024-58244
N/A
30 Dec 2025
CVE-2024-58243
N/A
30 Dec 2025
CVE-2024-58242
N/A
30 Dec 2025
CVE-2022-50613
N/A
30 Dec 2025
CVE-2022-50612
N/A
30 Dec 2025
CVE-2022-50611
N/A
30 Dec 2025
CVE-2022-50610
N/A
30 Dec 2025
CVE-2022-50609
N/A
30 Dec 2025
CVE-2022-50608
N/A
30 Dec 2025
CVE-2022-50607
N/A
30 Dec 2025
CVE-2022-50606
N/A
30 Dec 2025
CVE-2022-50605
N/A
30 Dec 2025
CVE-2022-50604
N/A
30 Dec 2025
CVE-2022-50603
N/A
30 Dec 2025
CVE-2022-50602
N/A
30 Dec 2025
CVE-2022-50601
N/A
30 Dec 2025
CVE-2022-50600
N/A
30 Dec 2025
CVE-2022-50599
N/A
30 Dec 2025
CVE-2022-50598
N/A
30 Dec 2025
CVE-2022-50597
N/A
30 Dec 2025
CVE-2025-15249
MEDIUM
30 Dec 2025
A weakness has been identified in zhujunliang3 work_platform up to 6bc5a50bb527ce27f7906d11ea6ec139beb79c31. This vulnerability affects unknown code of the component Content Handler. Executing manipulation can lead to cross site scripting. The attack may be performed from remote. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The project was informed of the problem early through an issue report but has not responded yet.
CVE-2023-54326
N/A
30 Dec 2025
In the Linux kernel, the following vulnerability has been resolved:
misc: pci_endpoint_test: Free IRQs before removing the device
In pci_endpoint_test_remove(), freeing the IRQs after removing the device
creates a small race window for IRQs to be received with the test device
memory already released, causing the IRQ handler to access invalid memory,
resulting in an oops.
Free the device IRQs before removing the device to avoid this issue.
CVE-2023-54325
N/A
30 Dec 2025
In the Linux kernel, the following vulnerability has been resolved:
crypto: qat - fix out-of-bounds read
When preparing an AER-CTR request, the driver copies the key provided by
the user into a data structure that is accessible by the firmware.
If the target device is QAT GEN4, the key size is rounded up by 16 since
a rounded up size is expected by the device.
If the key size is rounded up before the copy, the size used for copying
the key might be bigger than the size of the region containing the key,
causing an out-of-bounds read.
Fix by doing the copy first and then update the keylen.
This is to fix the following warning reported by KASAN:
[ 138.150574] BUG: KASAN: global-out-of-bounds in qat_alg_skcipher_init_com.isra.0+0x197/0x250 [intel_qat]
[ 138.150641] Read of size 32 at addr ffffffff88c402c0 by task cryptomgr_test/2340
[ 138.150651] CPU: 15 PID: 2340 Comm: cryptomgr_test Not tainted 6.2.0-rc1+ #45
[ 138.150659] Hardware name: Intel Corporation ArcherCity/ArcherCity, BIOS EGSDCRB1.86B.0087.D13.2208261706 08/26/2022
[ 138.150663] Call Trace:
[ 138.150668] <TASK>
[ 138.150922] kasan_check_range+0x13a/0x1c0
[ 138.150931] memcpy+0x1f/0x60
[ 138.150940] qat_alg_skcipher_init_com.isra.0+0x197/0x250 [intel_qat]
[ 138.151006] qat_alg_skcipher_init_sessions+0xc1/0x240 [intel_qat]
[ 138.151073] crypto_skcipher_setkey+0x82/0x160
[ 138.151085] ? prepare_keybuf+0xa2/0xd0
[ 138.151095] test_skcipher_vec_cfg+0x2b8/0x800
Page 114 of 670
Page 114 of 670