CVE-2025-21990 – AMDGPU NULL Pointer Dereference Vulnerability

The following table lists the changes that have been made to the CVE-2025-21990 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Apr. 02, 2025 Action […]

CVE-2025-21989 – AMDGPU NULL Pointer Dereference

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fix missing .is_two_pixels_per_container Starting from 6.11, AMDGPU driver, while being loaded with amdgpu.dc=1, due to lack of .is_two_pixels_per_container function in dce60_tg_funcs, causes a NULL pointer dereference on PCs with old GPUs, such as R9 280X. So this fix adds missing .is_two_pixels_per_container to dce60_tg_funcs. (cherry […]

CVE-2025-21988 – Linux Kernel Netfs Read Collect Data Corruption Vulnerability

The following table lists the changes that have been made to the CVE-2025-21988 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Apr. 02, 2025 Action […]

CVE-2025-21987 – AMDGPU Uninitialized Value Return Vulnerability

The following table lists the changes that have been made to the CVE-2025-21987 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Apr. 02, 2025 Action […]

CVE-2025-1805 – Crypt::Salt for Perl Insecure Salt Generation

The following table lists the changes that have been made to the CVE-2025-1805 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 9b29abf9-4ab0-4765-b253-1875cd9b441e Apr. 02, 2025 Action […]

CVE-2025-2842 – Tempo Operator ClusterRoleBinding Escalation

The following table lists the changes that have been made to the CVE-2025-2842 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 02, 2025 Action […]

CVE-2025-1268: Critical Vulnerability in Canon Printer Drivers

CVE-2025-1268: Critical Vulnerability in Canon Printer Drivers CVE-2025-1268 is a serious security vulnerability affecting multiple Canon printer drivers, primarily used in production printers, multifunction devices, and laser printers. This vulnerability has rai … Read more Published Date: Apr 02, 2025 (2 hours, 44 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-1268 CVE-2024-20439

Apple Backports Zero-Day Patches to Older Devices in Latest Security Update

Apple Backports Zero-Day Patches to Older Devices in Latest Security Update Apple has released a series of critical security updates to address vulnerabilities that were actively exploited as zero-day threats. These updates include backported patches for older versions of iOS … Read more Published Date: Apr 02, 2025 (3 hours, 18 minutes ago) Vulnerabilities has been mentioned […]

CVE-2025-2786 – Tempo Operator Information Disclosure

A flaw was found in Tempo Operator, where it creates a ServiceAccount, ClusterRole, and ClusterRoleBinding when a user deploys a TempoStack or TempoMonolithic instance. This flaw allows a user with full access to their namespace to extract the ServiceAccount token and use it to submit TokenReview and SubjectAccessReview requests, potentially revealing information about other users’ […]

Multiple Chrome Vulnerabilities Let Attackers Execute Arbitrary Code

Multiple Chrome Vulnerabilities Let Attackers Execute Arbitrary Code Google has rolled out a critical security update for Chrome 135 across all desktop platforms. The update addresses fourteen vulnerabilities, including high-severity flaws that could enable remote code … Read more Published Date: Apr 02, 2025 (3 hours, 39 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-3074 […]