CVE-2023-53501
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:53
- Zuletzt bearbeitet 23.01.2026 02:05:21
In the Linux kernel, the following vulnerability has been resolved: iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind When unbinding pasid - a race condition exists vs outstanding page faults. To prevent this, the pasi...
CVE-2023-53503
- EPSS 0.03%
- Veröffentlicht 01.10.2025 12:15:53
- Zuletzt bearbeitet 06.04.2026 14:45:08
In the Linux kernel, the following vulnerability has been resolved: ext4: allow ext4_get_group_info() to fail Previously, ext4_get_group_info() would treat an invalid group number as BUG(), since in theory it should never happen. However, if a mal...
CVE-2023-53490
- EPSS 0.01%
- Veröffentlicht 01.10.2025 12:15:52
- Zuletzt bearbeitet 16.01.2026 20:40:48
In the Linux kernel, the following vulnerability has been resolved: mptcp: fix disconnect vs accept race Despite commit 0ad529d9fd2b ("mptcp: fix possible divide by zero in recvmsg()"), the mptcp protocol is still prone to a race between disconnect...
CVE-2023-53491
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:52
- Zuletzt bearbeitet 23.01.2026 02:06:17
In the Linux kernel, the following vulnerability has been resolved: start_kernel: Add __no_stack_protector function attribute Back during the discussion of commit a9a3ed1eff36 ("x86: Fix early boot crash on gcc-10, third try") we discussed the need...
CVE-2023-53492
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:52
- Zuletzt bearbeitet 16.01.2026 20:42:40
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not ignore genmask when looking up chain by id When adding a rule to a chain referring to its ID, if that chain had been deleted on the same batch, the rul...
CVE-2023-53493
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:52
- Zuletzt bearbeitet 16.01.2026 20:45:18
In the Linux kernel, the following vulnerability has been resolved: accel/qaic: tighten bounds checking in decode_message() Copy the bounds checking from encode_message() to decode_message(). This patch addresses the following concerns. Ensure th...
CVE-2023-53494
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:52
- Zuletzt bearbeitet 16.01.2026 20:45:58
In the Linux kernel, the following vulnerability has been resolved: crypto: xts - Handle EBUSY correctly As it is xts only handles the special return value of EINPROGRESS, which means that in all other cases it will free data related to the request...
CVE-2023-53495
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:52
- Zuletzt bearbeitet 16.01.2026 20:46:37
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mvpp2_main: fix possible OOB write in mvpp2_ethtool_get_rxnfc() rules is allocated in ethtool_get_rxnfc and the size is determined by rule_cnt from user space. So ru...
CVE-2023-53496
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:52
- Zuletzt bearbeitet 16.01.2026 20:47:00
In the Linux kernel, the following vulnerability has been resolved: x86/platform/uv: Use alternate source for socket to node data The UV code attempts to build a set of tables to allow it to do bidirectional socket<=>node lookups. But when nr_cpus...
CVE-2023-53483
- EPSS 0.01%
- Veröffentlicht 01.10.2025 12:15:51
- Zuletzt bearbeitet 23.01.2026 02:07:43
In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup() devm_kzalloc() may fail, clk_data->name might be NULL and will cause a NULL pointer dereference later. ...