Latest CVE Feed
- 
                                
                                0.0NACVE-2023-53489In the Linux kernel, the following vulnerability has been resolved: tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp. syzkaller reported [0] memory leaks of an UDP socket and ZEROCOPY skbs. We can reproduce the problem with these sequenc... Read more Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53488In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix possible panic during hotplug remove During hotplug remove it is possible that the update counters work might be pending, and may run after memory has been freed. Cancel th... Read more Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53473In the Linux kernel, the following vulnerability has been resolved: ext4: improve error handling from ext4_dirhash() The ext4_dirhash() will *almost* never fail, especially when the hash tree feature was first introduced. However, with the addition of ... Read more Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Denial of Service
 
- 
                                
                                0.0NACVE-2023-53515In the Linux kernel, the following vulnerability has been resolved: virtio-mmio: don't break lifecycle of vm_dev vm_dev has a separate lifecycle because it has a 'struct device' embedded. Thus, having a release callback for it is correct. Allocating th... Read more Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53514In the Linux kernel, the following vulnerability has been resolved: gpu: host1x: Fix memory leak of device names The device names allocated by dev_set_name() need be freed before module unloading, but they can not be freed because the kobject's refcount... Read more Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53510In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix handling of lrbp->cmd ufshcd_queuecommand() may be called two times in a row for a SCSI command before it is completed. Hence make the following changes: - In the... Read more Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Denial of Service
 
- 
                                
                                0.0NACVE-2023-53509In the Linux kernel, the following vulnerability has been resolved: qed: allow sleep in qed_mcp_trace_dump() By default, qed_mcp_cmd_and_union() delays 10us at a time in a loop that can run 500K times, so calls to qed_mcp_nvm_rd_cmd() may block the curr... Read more Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Denial of Service
 
- 
                                
                                0.0NACVE-2023-53508In the Linux kernel, the following vulnerability has been resolved: ublk: fail to start device if queue setup is interrupted In ublk_ctrl_start_dev(), if wait_for_completion_interruptible() is interrupted by signal, queues aren't setup successfully yet,... Read more Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Race Condition
 
- 
                                
                                0.0NACVE-2023-53505In the Linux kernel, the following vulnerability has been resolved: clk: tegra: tegra124-emc: Fix potential memory leak The tegra and tegra needs to be freed in the error handling path, otherwise it will be leaked.... Read more Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53501In the Linux kernel, the following vulnerability has been resolved: iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind When unbinding pasid - a race condition exists vs outstanding page faults. To prevent this, the pasid_sta... Read more Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Race Condition
 
- 
                                
                                0.0NACVE-2023-53500In the Linux kernel, the following vulnerability has been resolved: xfrm: fix slab-use-after-free in decode_session6 When the xfrm device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuing. Then, slab-use-... Read more Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53499In the Linux kernel, the following vulnerability has been resolved: virtio_net: Fix error unwinding of XDP initialization When initializing XDP in virtnet_open(), some rq xdp initialization may hit an error causing net device open failed. However, previ... Read more Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
 
- 
                                
                                0.0NACVE-2023-53513In the Linux kernel, the following vulnerability has been resolved: nbd: fix incomplete validation of ioctl arg We tested and found an alarm caused by nbd_ioctl arg without verification. The UBSAN warning calltrace like below: UBSAN: Undefined behaviou... Read more Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                8.8HIGHCVE-2025-11020An attacker can obtain server information using Path Traversal vulnerability to conduct SQL Injection, which possibly exploits Unrestricted Upload of File with Dangerous Type vulnerability in MarkAny SafePC Enterprise on Windows, Linux.This issue affects ... Read more Affected Products :- Published: Oct. 02, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Path Traversal
 
- 
                                
                                0.0NACVE-2023-53511In the Linux kernel, the following vulnerability has been resolved: io_uring: fix fget leak when fs don't support nowait buffered read Heming reported a BUG when using io_uring doing link-cp on ocfs2. [1] Do the following steps can reproduce this BUG: ... Read more Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                0.0NACVE-2023-53517In the Linux kernel, the following vulnerability has been resolved: tipc: do not update mtu if msg_max is too small in mtu negotiation When doing link mtu negotiation, a malicious peer may send Activate msg with a very small mtu, e.g. 4 in Shuang's test... Read more Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Denial of Service
 
- 
                                
                                0.0NACVE-2023-53527In the Linux kernel, the following vulnerability has been resolved: thunderbolt: Fix memory leak in tb_handle_dp_bandwidth_request() The memory allocated in tb_queue_dp_bandwidth_request() needs to be released once the request is handled to avoid leakin... Read more Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                8.0HIGHCVE-2024-58267A vulnerability has been identified within Rancher Manager whereby the SAML authentication from the Rancher CLI tool is vulnerable to phishing attacks. The custom authentication protocol for SAML-based providers can be abused to steal Rancher’s authentic... Read more Affected Products : rancher- Published: Oct. 02, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Authentication
 
- 
                                
                                9.3CRITICALCVE-2025-61588RISC Zero is a zero-knowledge verifiable general computing platform based on zk-STARKs and the RISC-V microarchitecture. In versions 2.0.2 and below of risc0-zkvm-platform, when the zkVM guest calls sys_read, the host is able to use a crafted response to ... Read more Affected Products :- Published: Oct. 02, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2023-53506In the Linux kernel, the following vulnerability has been resolved: udf: Do not bother merging very long extents When merging very long extents we try to push as much length as possible to the first extent. However this is unnecessarily complicated and ... Read more Affected Products : linux_kernel- Published: Oct. 01, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Misconfiguration
 
 
                         
                         
                         
                                             
                                            