CVE-2023-53517
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:55
- Zuletzt bearbeitet 06.04.2026 13:07:54
In the Linux kernel, the following vulnerability has been resolved: tipc: do not update mtu if msg_max is too small in mtu negotiation When doing link mtu negotiation, a malicious peer may send Activate msg with a very small mtu, e.g. 4 in Shuang's...
CVE-2023-53505
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:54
- Zuletzt bearbeitet 23.01.2026 02:04:27
In the Linux kernel, the following vulnerability has been resolved: clk: tegra: tegra124-emc: Fix potential memory leak The tegra and tegra needs to be freed in the error handling path, otherwise it will be leaked.
CVE-2023-53506
- EPSS 0.01%
- Veröffentlicht 01.10.2025 12:15:54
- Zuletzt bearbeitet 23.01.2026 02:04:05
In the Linux kernel, the following vulnerability has been resolved: udf: Do not bother merging very long extents When merging very long extents we try to push as much length as possible to the first extent. However this is unnecessarily complicated...
CVE-2023-53510
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:54
- Zuletzt bearbeitet 06.04.2026 13:57:11
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix handling of lrbp->cmd ufshcd_queuecommand() may be called two times in a row for a SCSI command before it is completed. Hence make the following changes: - I...
CVE-2023-53500
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:53
- Zuletzt bearbeitet 23.01.2026 02:05:46
In the Linux kernel, the following vulnerability has been resolved: xfrm: fix slab-use-after-free in decode_session6 When the xfrm device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuing. Then, slab...
CVE-2023-53503
- EPSS 0.03%
- Veröffentlicht 01.10.2025 12:15:53
- Zuletzt bearbeitet 06.04.2026 14:45:08
In the Linux kernel, the following vulnerability has been resolved: ext4: allow ext4_get_group_info() to fail Previously, ext4_get_group_info() would treat an invalid group number as BUG(), since in theory it should never happen. However, if a mal...
CVE-2023-53491
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:52
- Zuletzt bearbeitet 23.01.2026 02:06:17
In the Linux kernel, the following vulnerability has been resolved: start_kernel: Add __no_stack_protector function attribute Back during the discussion of commit a9a3ed1eff36 ("x86: Fix early boot crash on gcc-10, third try") we discussed the need...
CVE-2023-53483
- EPSS 0.01%
- Veröffentlicht 01.10.2025 12:15:51
- Zuletzt bearbeitet 23.01.2026 02:07:43
In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup() devm_kzalloc() may fail, clk_data->name might be NULL and will cause a NULL pointer dereference later. ...
CVE-2023-53484
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:51
- Zuletzt bearbeitet 20.01.2026 16:35:24
In the Linux kernel, the following vulnerability has been resolved: lib: cpu_rmap: Avoid use after free on rmap->obj array entries When calling irq_set_affinity_notifier() with NULL at the notify argument, it will cause freeing of the glue pointer ...
CVE-2023-53485
- EPSS 0.01%
- Veröffentlicht 01.10.2025 12:15:51
- Zuletzt bearbeitet 23.01.2026 02:06:56
In the Linux kernel, the following vulnerability has been resolved: fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev Syzkaller reported the following issue: UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:1965:6 index -84 is o...