CVE-2023-53125
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:56:01
- Zuletzt bearbeitet 10.11.2025 17:46:06
In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc75xx: Limit packet length to skb->len Packet length retrieved from skb data may be larger than the actual socket buffer length (up to 9026 bytes). In such case the cl...
CVE-2023-53124
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:56:00
- Zuletzt bearbeitet 10.11.2025 17:49:51
In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add() Port is allocated by sas_port_alloc_num() and rphy is allocated by either sas_end_device_alloc() or sas_expan...
CVE-2023-53121
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:55:58
- Zuletzt bearbeitet 10.11.2025 17:50:22
In the Linux kernel, the following vulnerability has been resolved: tcp: tcp_make_synack() can be called from process context tcp_rtx_synack() now could be called in process context as explained in 0a375c822497 ("tcp: tcp_rtx_synack() can be called...
- EPSS 0.02%
- Veröffentlicht 02.05.2025 15:55:58
- Zuletzt bearbeitet 08.05.2025 11:15:52
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2023-53117
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:55:55
- Zuletzt bearbeitet 10.11.2025 17:51:59
In the Linux kernel, the following vulnerability has been resolved: fs: prevent out-of-bounds array speculation when closing a file descriptor Google-Bug-Id: 114199369
CVE-2023-53108
- EPSS 0.05%
- Veröffentlicht 02.05.2025 15:55:48
- Zuletzt bearbeitet 10.11.2025 17:54:19
In the Linux kernel, the following vulnerability has been resolved: net/iucv: Fix size of interrupt data iucv_irq_data needs to be 4 bytes larger. These bytes are not used by the iucv module, but written by the z/VM hypervisor in case a CPU is deco...
CVE-2023-53103
- EPSS 0.07%
- Veröffentlicht 02.05.2025 15:55:45
- Zuletzt bearbeitet 10.11.2025 17:56:07
In the Linux kernel, the following vulnerability has been resolved: bonding: restore bond's IFF_SLAVE flag if a non-eth dev enslave fails syzbot reported a warning[1] where the bond device itself is a slave and we try to enslave a non-ethernet devi...
CVE-2023-53100
- EPSS 0.07%
- Veröffentlicht 02.05.2025 15:55:43
- Zuletzt bearbeitet 10.11.2025 17:56:45
In the Linux kernel, the following vulnerability has been resolved: ext4: fix WARNING in ext4_update_inline_data Syzbot found the following issue: EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode:...
CVE-2023-53101
- EPSS 0.07%
- Veröffentlicht 02.05.2025 15:55:43
- Zuletzt bearbeitet 10.11.2025 17:56:32
In the Linux kernel, the following vulnerability has been resolved: ext4: zero i_disksize when initializing the bootloader inode If the boot loader inode has never been used before, the EXT4_IOC_SWAP_BOOT inode will initialize it, including setting...
CVE-2023-53098
- EPSS 0.1%
- Veröffentlicht 02.05.2025 15:55:41
- Zuletzt bearbeitet 12.11.2025 21:00:04
In the Linux kernel, the following vulnerability has been resolved: media: rc: gpio-ir-recv: add remove function In case runtime PM is enabled, do runtime PM clean up to remove cpu latency qos request, otherwise driver removal may have below kernel...