Latest CVE Feed
- 
                                
                                0.0NACVE-2023-53596In the Linux kernel, the following vulnerability has been resolved: drivers: base: Free devm resources when unregistering a device In the current code, devres_release_all() only gets called if the device has a bus and has been probed. This leads to iss... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53591In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix deadlock in tc route query code Cited commit causes ABBA deadlock[0] when peer flows are created while holding the devcom rw semaphore. Due to peer flows offload implemen... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Race Condition
 
- 
                                
                                0.0NACVE-2023-53590In the Linux kernel, the following vulnerability has been resolved: sctp: add a refcnt in sctp_stream_priorities to avoid a nested loop With this refcnt added in sctp_stream_priorities, we don't need to traverse all streams to check if the prio is used ... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Denial of Service
 
- 
                                
                                0.0NACVE-2023-53589In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't trust firmware n_channels If the firmware sends us a corrupted MCC response with n_channels much larger than the command response can be, we might copy far too... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53588In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check for station first in client probe When probing a client, first check if we have it, and then check for the channel context, otherwise you can trigger the warning t... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
 
- 
                                
                                0.0NACVE-2023-53581In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Check for NOT_READY flag state after locking Currently the check for NOT_READY flag is performed before obtaining the necessary lock. This opens a possibility for race condit... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Race Condition
 
- 
                                
                                0.0NACVE-2023-53580In the Linux kernel, the following vulnerability has been resolved: USB: Gadget: core: Help prevent panic during UVC unconfigure Avichal Rakesh reported a kernel panic that occurred when the UVC gadget driver was removed from a gadget's configuration. ... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Race Condition
 
- 
                                
                                0.0NACVE-2023-53572In the Linux kernel, the following vulnerability has been resolved: clk: imx: scu: use _safe list iterator to avoid a use after free This loop is freeing "clk" so it needs to use list_for_each_entry_safe(). Otherwise it dereferences a freed variable to ... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53571In the Linux kernel, the following vulnerability has been resolved: drm/i915: Make intel_get_crtc_new_encoder() less oopsy The point of the WARN was to print something, not oops straight up. Currently that is precisely what happens if we can't find the ... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
 
- 
                                
                                0.0NACVE-2023-53570In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: fix integer overflow in nl80211_parse_mbssid_elems() nl80211_parse_mbssid_elems() uses a u8 variable num_elems to count the number of MBSSID elements in the nested netlin... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53567In the Linux kernel, the following vulnerability has been resolved: spi: qup: Don't skip cleanup in remove's error path Returning early in a platform driver's remove callback is wrong. In this case the dma resources are not released in the error path. t... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                0.0NACVE-2023-53566In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: fix null deref on element insertion There is no guarantee that rb_prev() will not return NULL in nft_rbtree_gc_elem(): general protection fault, probably for... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53560In the Linux kernel, the following vulnerability has been resolved: tracing/histograms: Add histograms to hist_vars if they have referenced variables Hist triggers can have referenced variables without having direct variables fields. This can be the cas... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53559In the Linux kernel, the following vulnerability has been resolved: ip_vti: fix potential slab-use-after-free in decode_session6 When ip_vti device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuing. Then,... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53556In the Linux kernel, the following vulnerability has been resolved: iavf: Fix use-after-free in free_netdev We do netif_napi_add() for all allocated q_vectors[], but potentially do netif_napi_del() for part of them, then kfree q_vectors and leave invali... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53555In the Linux kernel, the following vulnerability has been resolved: mm/damon/core: initialize damo_filter->list from damos_new_filter() damos_new_filter() is not initializing the list field of newly allocated filter object. However, DAMON sysfs interfa... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53554In the Linux kernel, the following vulnerability has been resolved: staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() The "exc->key_len" is a u16 that comes from the user. If it's over IW_ENCODING_TOKEN_MAX (64) that could lead to ... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53553In the Linux kernel, the following vulnerability has been resolved: HID: hyperv: avoid struct memcpy overrun warning A previous patch addressed the fortified memcpy warning for most builds, but I still see this one with gcc-9: In file included from inc... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
 
- 
                                
                                0.0NACVE-2023-53550In the Linux kernel, the following vulnerability has been resolved: cpufreq: amd-pstate: fix global sysfs attribute type In commit 3666062b87ec ("cpufreq: amd-pstate: move to use bus_get_dev_root()") the "amd_pstate" attributes where moved from a dedica... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                0.0NACVE-2023-53549In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Rework long task execution when adding/deleting entries When adding/deleting large number of elements in one step in ipset, it can take a reasonable amount of time and... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Denial of Service
 
 
                         
                         
                         
                                             
                                            