Total
6075 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-21929 | 1 Linux | 1 Linux Kernel | 2025-04-16 | 7.8 High |
In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() During the `rmmod` operation for the `intel_ishtp_hid` driver, a use-after-free issue can occur in the hid_ishtp_cl_remove() function. The function hid_ishtp_cl_deinit() is called before ishtp_hid_remove(), which can lead to accessing freed memory or resources during the removal process. Call Trace: ? ishtp_cl_send+0x168/0x220 [intel_ishtp] ? hid_output_report+0xe3/0x150 [hid] hid_ishtp_set_feature+0xb5/0x120 [intel_ishtp_hid] ishtp_hid_request+0x7b/0xb0 [intel_ishtp_hid] hid_hw_request+0x1f/0x40 [hid] sensor_hub_set_feature+0x11f/0x190 [hid_sensor_hub] _hid_sensor_power_state+0x147/0x1e0 [hid_sensor_trigger] hid_sensor_runtime_resume+0x22/0x30 [hid_sensor_trigger] sensor_hub_remove+0xa8/0xe0 [hid_sensor_hub] hid_device_remove+0x49/0xb0 [hid] hid_destroy_device+0x6f/0x90 [hid] ishtp_hid_remove+0x42/0x70 [intel_ishtp_hid] hid_ishtp_cl_remove+0x6b/0xb0 [intel_ishtp_hid] ishtp_cl_device_remove+0x4a/0x60 [intel_ishtp] ... Additionally, ishtp_hid_remove() is a HID level power off, which should occur before the ISHTP level disconnect. This patch resolves the issue by reordering the calls in hid_ishtp_cl_remove(). The function ishtp_hid_remove() is now called before hid_ishtp_cl_deinit(). | ||||
CVE-2025-21928 | 1 Linux | 1 Linux Kernel | 2025-04-16 | 7.8 High |
In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() The system can experience a random crash a few minutes after the driver is removed. This issue occurs due to improper handling of memory freeing in the ishtp_hid_remove() function. The function currently frees the `driver_data` directly within the loop that destroys the HID devices, which can lead to accessing freed memory. Specifically, `hid_destroy_device()` uses `driver_data` when it calls `hid_ishtp_set_feature()` to power off the sensor, so freeing `driver_data` beforehand can result in accessing invalid memory. This patch resolves the issue by storing the `driver_data` in a temporary variable before calling `hid_destroy_device()`, and then freeing the `driver_data` after the device is destroyed. | ||||
CVE-2025-21923 | 1 Linux | 1 Linux Kernel | 2025-04-16 | 7.8 High |
In the Linux kernel, the following vulnerability has been resolved: HID: hid-steam: Fix use-after-free when detaching device When a hid-steam device is removed it must clean up the client_hdev used for intercepting hidraw access. This can lead to scheduling deferred work to reattach the input device. Though the cleanup cancels the deferred work, this was done before the client_hdev itself is cleaned up, so it gets rescheduled. This patch fixes the ordering to make sure the deferred work is properly canceled. | ||||
CVE-2025-29815 | 2025-04-16 | 7.6 High | ||
Use after free in Microsoft Edge (Chromium-based) allows an authorized attacker to execute code over a network. | ||||
CVE-2025-27730 | 2025-04-16 | 7.8 High | ||
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-27729 | 2025-04-16 | 7.8 High | ||
Use after free in Windows Shell allows an unauthorized attacker to execute code locally. | ||||
CVE-2025-27491 | 2025-04-16 | 7.1 High | ||
Use after free in Windows Hyper-V allows an authorized attacker to execute code over a network. | ||||
CVE-2025-27492 | 2025-04-16 | 7 High | ||
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-27480 | 2025-04-16 | 8.1 High | ||
Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network. | ||||
CVE-2025-27467 | 2025-04-16 | 7.8 High | ||
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-26679 | 2025-04-16 | 7.8 High | ||
Use after free in RPC Endpoint Mapper Service allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-26671 | 2025-04-16 | 8.1 High | ||
Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. | ||||
CVE-2025-26670 | 2025-04-16 | 8.1 High | ||
Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network. | ||||
CVE-2025-26649 | 2025-04-16 | 7 High | ||
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-26648 | 2025-04-16 | 7.8 High | ||
Sensitive data storage in improperly locked memory in Windows Kernel allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-26640 | 2025-04-16 | 7 High | ||
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-29823 | 2025-04-16 | 7.8 High | ||
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | ||||
CVE-2025-29820 | 2025-04-16 | 7.8 High | ||
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. | ||||
CVE-2025-29792 | 2025-04-16 | 7.3 High | ||
Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-27750 | 2025-04-16 | 7.8 High | ||
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |