Latest CVE Feed
-
0.0
NACVE-2023-53498
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix potential null dereference The adev->dm.dc pointer can be NULL and dereferenced in amdgpu_dm_fini() without checking. Add a NULL pointer check before calling dc_dm... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53497
In the Linux kernel, the following vulnerability has been resolved: media: vsp1: Replace vb2_is_streaming() with vb2_start_streaming_called() The vsp1 driver uses the vb2_is_streaming() function in its .buf_queue() handler to check if the .start_streami... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2023-53496
In the Linux kernel, the following vulnerability has been resolved: x86/platform/uv: Use alternate source for socket to node data The UV code attempts to build a set of tables to allow it to do bidirectional socket<=>node lookups. But when nr_cpus is s... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2023-53495
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mvpp2_main: fix possible OOB write in mvpp2_ethtool_get_rxnfc() rules is allocated in ethtool_get_rxnfc and the size is determined by rule_cnt from user space. So rule_cn... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53494
In the Linux kernel, the following vulnerability has been resolved: crypto: xts - Handle EBUSY correctly As it is xts only handles the special return value of EINPROGRESS, which means that in all other cases it will free data related to the request. Ho... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53493
In the Linux kernel, the following vulnerability has been resolved: accel/qaic: tighten bounds checking in decode_message() Copy the bounds checking from encode_message() to decode_message(). This patch addresses the following concerns. Ensure that th... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53492
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not ignore genmask when looking up chain by id When adding a rule to a chain referring to its ID, if that chain had been deleted on the same batch, the rule mig... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
-
0.0
NACVE-2023-53491
In the Linux kernel, the following vulnerability has been resolved: start_kernel: Add __no_stack_protector function attribute Back during the discussion of commit a9a3ed1eff36 ("x86: Fix early boot crash on gcc-10, third try") we discussed the need for ... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2023-53490
In the Linux kernel, the following vulnerability has been resolved: mptcp: fix disconnect vs accept race Despite commit 0ad529d9fd2b ("mptcp: fix possible divide by zero in recvmsg()"), the mptcp protocol is still prone to a race between disconnect() (o... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2023-53489
In the Linux kernel, the following vulnerability has been resolved: tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp. syzkaller reported [0] memory leaks of an UDP socket and ZEROCOPY skbs. We can reproduce the problem with these sequenc... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53488
In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix possible panic during hotplug remove During hotplug remove it is possible that the update counters work might be pending, and may run after memory has been freed. Cancel th... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53487
In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas_flash: allow user copy to flash block cache objects With hardened usercopy enabled (CONFIG_HARDENED_USERCOPY=y), using the /proc/powerpc/rtas/firmware_update interface to p... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2023-53486
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Enhance the attribute size check This combines the overflow and boundary check so that all attribute size will be properly examined while enumerating them. [ 169.181521] BUG... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53485
In the Linux kernel, the following vulnerability has been resolved: fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev Syzkaller reported the following issue: UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:1965:6 index -84 is out of... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53484
In the Linux kernel, the following vulnerability has been resolved: lib: cpu_rmap: Avoid use after free on rmap->obj array entries When calling irq_set_affinity_notifier() with NULL at the notify argument, it will cause freeing of the glue pointer in th... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53483
In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup() devm_kzalloc() may fail, clk_data->name might be NULL and will cause a NULL pointer dereference later. [ rj... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53482
In the Linux kernel, the following vulnerability has been resolved: iommu: Fix error unwind in iommu_group_alloc() If either iommu_group_grate_file() fails then the iommu_group is leaked. Destroy it on these error paths. Found by kselftest/iommu/iommu... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53481
In the Linux kernel, the following vulnerability has been resolved: ubi: ubi_wl_put_peb: Fix infinite loop when wear-leveling work failed Following process will trigger an infinite loop in ubi_wl_put_peb(): ubifs_bgt ubi_bgt ubifs_leb_unmap ubi_leb... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Denial of Service
-
0.0
NACVE-2023-53480
In the Linux kernel, the following vulnerability has been resolved: kobject: Add sanity check for kset->kobj.ktype in kset_register() When I register a kset in the following way: static struct kset my_kset; kobject_set_name(&my_kset.kobj, "my_kset"); ... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2023-53479
In the Linux kernel, the following vulnerability has been resolved: cxl/acpi: Fix a use-after-free in cxl_parse_cfmws() KASAN and KFENCE detected an user-after-free in the CXL driver. This happens in the cxl_decoder_add() fail path. KASAN prints the fol... Read more
Affected Products :- Published: Oct. 01, 2025
- Modified: Oct. 01, 2025
- Vuln Type: Memory Corruption