CVE-2023-53491
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:52
- Zuletzt bearbeitet 23.01.2026 02:06:17
In the Linux kernel, the following vulnerability has been resolved: start_kernel: Add __no_stack_protector function attribute Back during the discussion of commit a9a3ed1eff36 ("x86: Fix early boot crash on gcc-10, third try") we discussed the need...
CVE-2023-53492
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:52
- Zuletzt bearbeitet 16.01.2026 20:42:40
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not ignore genmask when looking up chain by id When adding a rule to a chain referring to its ID, if that chain had been deleted on the same batch, the rul...
CVE-2023-53493
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:52
- Zuletzt bearbeitet 16.01.2026 20:45:18
In the Linux kernel, the following vulnerability has been resolved: accel/qaic: tighten bounds checking in decode_message() Copy the bounds checking from encode_message() to decode_message(). This patch addresses the following concerns. Ensure th...
CVE-2023-53494
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:52
- Zuletzt bearbeitet 16.01.2026 20:45:58
In the Linux kernel, the following vulnerability has been resolved: crypto: xts - Handle EBUSY correctly As it is xts only handles the special return value of EINPROGRESS, which means that in all other cases it will free data related to the request...
CVE-2023-53495
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:52
- Zuletzt bearbeitet 16.01.2026 20:46:37
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mvpp2_main: fix possible OOB write in mvpp2_ethtool_get_rxnfc() rules is allocated in ethtool_get_rxnfc and the size is determined by rule_cnt from user space. So ru...
CVE-2023-53496
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:52
- Zuletzt bearbeitet 16.01.2026 20:47:00
In the Linux kernel, the following vulnerability has been resolved: x86/platform/uv: Use alternate source for socket to node data The UV code attempts to build a set of tables to allow it to do bidirectional socket<=>node lookups. But when nr_cpus...
CVE-2023-53483
- EPSS 0.01%
- Veröffentlicht 01.10.2025 12:15:51
- Zuletzt bearbeitet 23.01.2026 02:07:43
In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup() devm_kzalloc() may fail, clk_data->name might be NULL and will cause a NULL pointer dereference later. ...
CVE-2023-53484
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:51
- Zuletzt bearbeitet 20.01.2026 16:35:24
In the Linux kernel, the following vulnerability has been resolved: lib: cpu_rmap: Avoid use after free on rmap->obj array entries When calling irq_set_affinity_notifier() with NULL at the notify argument, it will cause freeing of the glue pointer ...
CVE-2023-53485
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:51
- Zuletzt bearbeitet 23.01.2026 02:06:56
In the Linux kernel, the following vulnerability has been resolved: fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev Syzkaller reported the following issue: UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:1965:6 index -84 is o...
CVE-2023-53486
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:51
- Zuletzt bearbeitet 20.01.2026 16:35:10
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Enhance the attribute size check This combines the overflow and boundary check so that all attribute size will be properly examined while enumerating them. [ 169.181521...