CVE Notify
18.5K subscribers
4 photos
163K links
Alert on the latest CVEs

Partner channel: @malwr
Download Telegram
๐Ÿšจ CVE-2025-37743
In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Avoid memory leak while enabling statistics

Driver uses monitor destination rings for extended statistics mode and
standalone monitor mode. In extended statistics mode, TLVs are parsed from
the buffer received from the monitor destination ring and assigned to the
ppdu_info structure to update per-packet statistics. In standalone monitor
mode, along with per-packet statistics, the packet data (payload) is
captured, and the driver updates per MSDU to mac80211.

When the AP interface is enabled, only extended statistics mode is
activated. As part of enabling monitor rings for collecting statistics,
the driver subscribes to HAL_RX_MPDU_START TLV in the filter
configuration. This TLV is received from the monitor destination ring, and
kzalloc for the mon_mpdu object occurs, which is not freed, leading to a
memory leak. The kzalloc for the mon_mpdu object is only required while
enabling the standalone monitor interface. This causes a memory leak while
enabling extended statistics mode in the driver.

Fix this memory leak by removing the kzalloc for the mon_mpdu object in
the HAL_RX_MPDU_START TLV handling. Additionally, remove the standalone
monitor mode handlings in the HAL_MON_BUF_ADDR and HAL_RX_MSDU_END TLVs.
These TLV tags will be handled properly when enabling standalone monitor
mode in the future.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1
Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2019-18860
Squid before 4.9, when certain web browsers are used, mishandles HTML in the host (aka hostname) parameter to cachemgr.cgi.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-54574
Squid is a caching proxy for the Web. In versions 6.3 and below, Squid is vulnerable to a heap buffer overflow and possible remote code execution attack when processing URN due to incorrect buffer management. This has been fixed in version 6.4. To work around this issue, disable URN access permissions.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-62168
Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-27064
Information disclosure while registering commands from clients with diag through diagHal.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-27070
Memory corruption while performing encryption and decryption commands.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-27074
Memory corruption while processing a GP command response.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-47352
Memory corruption while processing audio streaming operations.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-47353
Memory corruption while processing request sent from GVM.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-47357
Information Disclosure when a user-level driver performs QFPROM read or write operations on Fuse regions.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-47360
Memory corruption while processing client message during device management.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-47361
Memory corruption when triggering a subsystem crash with an out-of-range identifier.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-47362
Information disclosure while processing message from client with invalid payload.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-47365
Memory corruption while processing large input data from a remote source via a communication interface.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-47367
Memory corruption while accessing a buffer during IOCTL processing.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-47368
Memory corruption when dereferencing an invalid userspace address in a user buffer during MCDM IOCTL processing.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-47370
Transient DOS when a remote device sends an invalid connection request during BT connectable LE scan.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-23157
In the Linux kernel, the following vulnerability has been resolved:

media: venus: hfi_parser: add check to avoid out of bound access

There is a possibility that init_codecs is invoked multiple times during
manipulated payload from video firmware. In such case, if codecs_count
can get incremented to value more than MAX_CODEC_NUM, there can be OOB
access. Reset the count so that it always starts from beginning.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-23145
In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix NULL pointer in can_accept_new_subflow

When testing valkey benchmark tool with MPTCP, the kernel panics in
'mptcp_can_accept_new_subflow' because subflow_req->msk is NULL.

Call trace:

mptcp_can_accept_new_subflow (./net/mptcp/subflow.c:63 (discriminator 4)) (P)
subflow_syn_recv_sock (./net/mptcp/subflow.c:854)
tcp_check_req (./net/ipv4/tcp_minisocks.c:863)
tcp_v4_rcv (./net/ipv4/tcp_ipv4.c:2268)
ip_protocol_deliver_rcu (./net/ipv4/ip_input.c:207)
ip_local_deliver_finish (./net/ipv4/ip_input.c:234)
ip_local_deliver (./net/ipv4/ip_input.c:254)
ip_rcv_finish (./net/ipv4/ip_input.c:449)
...

According to the debug log, the same req received two SYN-ACK in a very
short time, very likely because the client retransmits the syn ack due
to multiple reasons.

Even if the packets are transmitted with a relevant time interval, they
can be processed by the server on different CPUs concurrently). The
'subflow_req->msk' ownership is transferred to the subflow the first,
and there will be a risk of a null pointer dereference here.

This patch fixes this issue by moving the 'subflow_req->msk' under the
`own_req == true` conditional.

Note that the !msk check in subflow_hmac_valid() can be dropped, because
the same check already exists under the own_req mpj branch where the
code has been moved to.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-23146
In the Linux kernel, the following vulnerability has been resolved:

mfd: ene-kb3930: Fix a potential NULL pointer dereference

The off_gpios could be NULL. Add missing check in the kb3930_probe().
This is similar to the issue fixed in commit b1ba8bcb2d1f
("backlight: hx8357: Fix potential NULL pointer dereference").

This was detected by our static analysis tool.

๐ŸŽ–@cveNotify