CVE-2023-53079
- EPSS 0.05%
- Veröffentlicht 02.05.2025 15:55:28
- Zuletzt bearbeitet 12.11.2025 20:49:15
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix steering rules cleanup vport's mc, uc and multicast rules are not deleted in teardown path when EEH happens. Since the vport's promisc settings(uc, mc and all) in fir...
CVE-2023-53077
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:55:27
- Zuletzt bearbeitet 12.11.2025 20:49:36
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes [WHY] When PTEBufferSizeInRequests is zero, UBSAN reports the following warning because dml_log2 returns an unexp...
CVE-2023-53075
- EPSS 0.09%
- Veröffentlicht 02.05.2025 15:55:26
- Zuletzt bearbeitet 12.11.2025 20:49:42
In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix invalid address access in lookup_rec() when index is 0 KASAN reported follow problem: BUG: KASAN: use-after-free in lookup_rec Read of size 8 at addr ffff000199270ff...
CVE-2023-53074
- EPSS 0.05%
- Veröffentlicht 02.05.2025 15:55:25
- Zuletzt bearbeitet 12.11.2025 20:50:15
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix ttm_bo calltrace warning in psp_hw_fini The call trace occurs when the amdgpu is removed after the mode1 reset. During mode1 reset, from suspend to resume, there is...
CVE-2023-53072
- EPSS 0.05%
- Veröffentlicht 02.05.2025 15:55:23
- Zuletzt bearbeitet 12.11.2025 20:50:40
In the Linux kernel, the following vulnerability has been resolved: mptcp: use the workqueue to destroy unaccepted sockets Christoph reported a UaF at token lookup time after having refactored the passive socket initialization part: BUG: KASAN: ...
CVE-2023-53068
- EPSS 0.05%
- Veröffentlicht 02.05.2025 15:55:21
- Zuletzt bearbeitet 12.11.2025 20:51:51
In the Linux kernel, the following vulnerability has been resolved: net: usb: lan78xx: Limit packet length to skb->len Packet length retrieved from descriptor may be larger than the actual socket buffer length. In such case the cloned skb passed up...
CVE-2023-53066
- EPSS 0.05%
- Veröffentlicht 02.05.2025 15:55:19
- Zuletzt bearbeitet 12.11.2025 19:47:44
In the Linux kernel, the following vulnerability has been resolved: qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info We have to make sure that the info returned by the helper is valid before using it. Found by Linux Verification C...
CVE-2023-53065
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:55:18
- Zuletzt bearbeitet 12.11.2025 19:56:49
In the Linux kernel, the following vulnerability has been resolved: perf/core: Fix perf_output_begin parameter is incorrectly invoked in perf_event_bpf_output syzkaller reportes a KASAN issue with stack-out-of-bounds. The call trace is as follows: ...
CVE-2023-53062
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:55:16
- Zuletzt bearbeitet 07.11.2025 02:23:30
In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc95xx: Limit packet length to skb->len Packet length retrieved from descriptor may be larger than the actual socket buffer length. In such case the cloned skb passed u...
CVE-2023-53060
- EPSS 0.05%
- Veröffentlicht 02.05.2025 15:55:14
- Zuletzt bearbeitet 07.11.2025 16:32:03
In the Linux kernel, the following vulnerability has been resolved: igb: revert rtnl_lock() that causes deadlock The commit 6faee3d4ee8b ("igb: Add lock to avoid data race") adds rtnl_lock to eliminate a false data race shown below (FREE from dev...