Latest CVE Feed
-
0.0
NACVE-2025-39995
In the Linux kernel, the following vulnerability has been resolved: media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe The state->timer is a cyclic timer that schedules work_i2c_poll and delayed_work_enable_hotplug, while rear... Read more
Affected Products : linux_kernel- Published: Oct. 15, 2025
- Modified: Oct. 16, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53611
In the Linux kernel, the following vulnerability has been resolved: ipmi_si: fix a memleak in try_smi_init() Kmemleak reported the following leak info in try_smi_init(): unreferenced object 0xffff00018ecf9400 (size 1024): comm "modprobe", pid 2707763... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53602
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix memory leak in WMI firmware stats Memory allocated for firmware pdev, vdev and beacon statistics are not released during rmmod. Fix it by calling ath11k_fw_stats_free... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53601
In the Linux kernel, the following vulnerability has been resolved: bonding: do not assume skb mac_header is set Drivers must not assume in their ndo_start_xmit() that skbs have their mac_header set. skb->data is all what is needed. bonding seems to be... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2023-53600
In the Linux kernel, the following vulnerability has been resolved: tunnels: fix kasan splat when generating ipv4 pmtu error If we try to emit an icmp error in response to a nonliner skb, we get BUG: KASAN: slab-out-of-bounds in ip_compute_csum+0x134/0... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53596
In the Linux kernel, the following vulnerability has been resolved: drivers: base: Free devm resources when unregistering a device In the current code, devres_release_all() only gets called if the device has a bus and has been probed. This leads to iss... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53591
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix deadlock in tc route query code Cited commit causes ABBA deadlock[0] when peer flows are created while holding the devcom rw semaphore. Due to peer flows offload implemen... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2023-53590
In the Linux kernel, the following vulnerability has been resolved: sctp: add a refcnt in sctp_stream_priorities to avoid a nested loop With this refcnt added in sctp_stream_priorities, we don't need to traverse all streams to check if the prio is used ... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Denial of Service
-
0.0
NACVE-2023-53589
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't trust firmware n_channels If the firmware sends us a corrupted MCC response with n_channels much larger than the command response can be, we might copy far too... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53580
In the Linux kernel, the following vulnerability has been resolved: USB: Gadget: core: Help prevent panic during UVC unconfigure Avichal Rakesh reported a kernel panic that occurred when the UVC gadget driver was removed from a gadget's configuration. ... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2023-53574
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: delete timer and free skb queue when unloading Fix possible crash and memory leak on driver unload by deleting TX purge timer and freeing C2H queue in 'rtw_core_deinit()', ... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53568
In the Linux kernel, the following vulnerability has been resolved: s390/zcrypt: don't leak memory if dev_set_name() fails When dev_set_name() fails, zcdn_create() doesn't free the newly allocated resources. Do it.... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53567
In the Linux kernel, the following vulnerability has been resolved: spi: qup: Don't skip cleanup in remove's error path Returning early in a platform driver's remove callback is wrong. In this case the dma resources are not released in the error path. t... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2023-53557
In the Linux kernel, the following vulnerability has been resolved: fprobe: Release rethook after the ftrace_ops is unregistered While running bpf selftests it's possible to get following fault: general protection fault, probably for non-canonical ad... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2023-53554
In the Linux kernel, the following vulnerability has been resolved: staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() The "exc->key_len" is a u16 that comes from the user. If it's over IW_ENCODING_TOKEN_MAX (64) that could lead to ... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53551
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_serial: Add null pointer check in gserial_resume Consider a case where gserial_disconnect has already cleared gser->ioport. And if a wakeup interrupt triggers afterwards,... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53550
In the Linux kernel, the following vulnerability has been resolved: cpufreq: amd-pstate: fix global sysfs attribute type In commit 3666062b87ec ("cpufreq: amd-pstate: move to use bus_get_dev_root()") the "amd_pstate" attributes where moved from a dedica... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2023-53541
In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: brcmnand: Fix potential out-of-bounds access in oob write When the oob buffer length is not in multiple of words, the oob write function does out-of-bounds read on the oob... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53535
In the Linux kernel, the following vulnerability has been resolved: net: bcmgenet: Add a check for oversized packets Occasionnaly we may get oversized packets from the hardware which exceed the nomimal 2KiB buffer size we allocate SKBs with. Add an earl... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Denial of Service
-
0.0
NACVE-2023-53533
In the Linux kernel, the following vulnerability has been resolved: Input: raspberrypi-ts - fix refcount leak in rpi_ts_probe rpi_firmware_get() take reference, we need to release it in error paths as well. Use devm_rpi_firmware_get() helper to handling... Read more
Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025