Latest CVE Feed
- 
                                
                                0.0NACVE-2023-53569In the Linux kernel, the following vulnerability has been resolved: ext2: Check block size validity during mount Check that log of block size stored in the superblock has sensible value. Otherwise the shift computing the block size can overflow leading ... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                0.0NACVE-2023-53568In the Linux kernel, the following vulnerability has been resolved: s390/zcrypt: don't leak memory if dev_set_name() fails When dev_set_name() fails, zcdn_create() doesn't free the newly allocated resources. Do it.... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2022-50472In the Linux kernel, the following vulnerability has been resolved: IB/mad: Don't call to function that might sleep while in atomic context Tracepoints are not allowed to sleep, as such the following splat is generated due to call to ib_query_pkey() in ... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                0.0NACVE-2023-53567In the Linux kernel, the following vulnerability has been resolved: spi: qup: Don't skip cleanup in remove's error path Returning early in a platform driver's remove callback is wrong. In this case the dma resources are not released in the error path. t... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                0.0NACVE-2023-53566In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: fix null deref on element insertion There is no guarantee that rb_prev() will not return NULL in nft_rbtree_gc_elem(): general protection fault, probably for... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53565In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Check for probe() id argument being NULL The probe() id argument may be NULL in 2 scenarios: 1. brcmf_pcie_pm_leave_D3() calling brcmf_pcie_probe() to reprobe the de... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                0.0NACVE-2023-53561In the Linux kernel, the following vulnerability has been resolved: net: wwan: iosm: fix NULL pointer dereference when removing device In suspend and resume cycle, the removal and rescan of device ends up in NULL pointer dereference. During driver init... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2022-50473In the Linux kernel, the following vulnerability has been resolved: cpufreq: Init completion before kobject_init_and_add() In cpufreq_policy_alloc(), it will call uninitialed completion in cpufreq_sysfs_release() when kobject_init_and_add() fails. And t... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2022-50476In the Linux kernel, the following vulnerability has been resolved: ntb_netdev: Use dev_kfree_skb_any() in interrupt context TX/RX callback handlers (ntb_netdev_tx_handler(), ntb_netdev_rx_handler()) can be called in interrupt context via the DMA framew... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Denial of Service
 
- 
                                
                                0.0NACVE-2022-50477In the Linux kernel, the following vulnerability has been resolved: rtc: class: Fix potential memleak in devm_rtc_allocate_device() devm_rtc_allocate_device() will alloc a rtc_device first, and then run dev_set_name(). If dev_set_name() failed, the rtc_... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                0.0NACVE-2023-53560In the Linux kernel, the following vulnerability has been resolved: tracing/histograms: Add histograms to hist_vars if they have referenced variables Hist triggers can have referenced variables without having direct variables fields. This can be the cas... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2022-50480In the Linux kernel, the following vulnerability has been resolved: memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() The break of for_each_available_child_of_node() needs a corresponding of_node_put() when the reference 'child' is not used ... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53559In the Linux kernel, the following vulnerability has been resolved: ip_vti: fix potential slab-use-after-free in decode_session6 When ip_vti device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuing. Then,... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53557In the Linux kernel, the following vulnerability has been resolved: fprobe: Release rethook after the ftrace_ops is unregistered While running bpf selftests it's possible to get following fault: general protection fault, probably for non-canonical ad... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Race Condition
 
- 
                                
                                0.0NACVE-2023-53556In the Linux kernel, the following vulnerability has been resolved: iavf: Fix use-after-free in free_netdev We do netif_napi_add() for all allocated q_vectors[], but potentially do netif_napi_del() for part of them, then kfree q_vectors and leave invali... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53555In the Linux kernel, the following vulnerability has been resolved: mm/damon/core: initialize damo_filter->list from damos_new_filter() damos_new_filter() is not initializing the list field of newly allocated filter object. However, DAMON sysfs interfa... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53554In the Linux kernel, the following vulnerability has been resolved: staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() The "exc->key_len" is a u16 that comes from the user. If it's over IW_ENCODING_TOKEN_MAX (64) that could lead to ... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53553In the Linux kernel, the following vulnerability has been resolved: HID: hyperv: avoid struct memcpy overrun warning A previous patch addressed the fortified memcpy warning for most builds, but I still see this one with gcc-9: In file included from inc... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
 
- 
                                
                                0.0NACVE-2023-53552In the Linux kernel, the following vulnerability has been resolved: drm/i915: mark requests for GuC virtual engines to avoid use-after-free References to i915_requests may be trapped by userspace inside a sync_file or dmabuf (dma-resv) and held indefini... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53551In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_serial: Add null pointer check in gserial_resume Consider a case where gserial_disconnect has already cleared gser->ioport. And if a wakeup interrupt triggers afterwards,... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
 
                         
                         
                         
                                             
                                            