NA - CVE-2025-54628 - Vulnerability of incomplete verification...
Vulnerability of incomplete verification information in the communication module. Impact: Successful exploitation of this vulnerability may affect availability.
NA - CVE-2025-54629 - Race condition issue occurring in the physical...
Race condition issue occurring in the physical page import process of the memory management module. Impact: Successful exploitation of this vulnerability may affect service integrity.
NA - CVE-2025-54630 - :Vulnerability of insufficient data length...
:Vulnerability of insufficient data length verification in the DFA module. Impact: Successful exploitation of this vulnerability may affect availability.
NA - CVE-2025-54631 - Vulnerability of insufficient data length...
Vulnerability of insufficient data length verification in the partition module. Impact: Successful exploitation of this vulnerability may affect availability.
NA - CVE-2025-54632 - Vulnerability of insufficient data length...
Vulnerability of insufficient data length verification in the HVB module. Impact: Successful exploitation of this vulnerability may affect service integrity.
NA - CVE-2025-54633 - Out-of-bounds read vulnerability in the...
Out-of-bounds read vulnerability in the register configuration of the DMA module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.
NA - CVE-2025-54634 - Vulnerability of improper processing of...
Vulnerability of improper processing of abnormal conditions in huge page separation. Impact: Successful exploitation of this vulnerability may affect availability.
NA - CVE-2025-54635 - Vulnerability of returning released pointers in...
Vulnerability of returning released pointers in the distributed notification service. Impact: Successful exploitation of this vulnerability may affect availability.
NA - CVE-2025-54636 - Issue of buffer overflow caused by insufficient...
Issue of buffer overflow caused by insufficient data verification in the kernel drop detection module. Impact: Successful exploitation of this vulnerability may affect availability.