CVE-2023-53140
- EPSS 0.09%
- Veröffentlicht 02.05.2025 15:56:11
- Zuletzt bearbeitet 10.11.2025 17:38:38
In the Linux kernel, the following vulnerability has been resolved: scsi: core: Remove the /proc/scsi/${proc_name} directory earlier Remove the /proc/scsi/${proc_name} directory earlier to fix a race condition between unloading and reloading kernel...
CVE-2023-53138
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:56:10
- Zuletzt bearbeitet 10.11.2025 17:39:03
In the Linux kernel, the following vulnerability has been resolved: net: caif: Fix use-after-free in cfusbl_device_notify() syzbot reported use-after-free in cfusbl_device_notify() [1]. This causes a stack trace like below: BUG: KASAN: use-after-...
- EPSS 0.05%
- Veröffentlicht 02.05.2025 15:56:09
- Zuletzt bearbeitet 05.09.2025 20:15:32
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2023-53125
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:56:01
- Zuletzt bearbeitet 10.11.2025 17:46:06
In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc75xx: Limit packet length to skb->len Packet length retrieved from skb data may be larger than the actual socket buffer length (up to 9026 bytes). In such case the cl...
CVE-2023-53124
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:56:00
- Zuletzt bearbeitet 10.11.2025 17:49:51
In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add() Port is allocated by sas_port_alloc_num() and rphy is allocated by either sas_end_device_alloc() or sas_expan...
CVE-2023-53121
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:55:58
- Zuletzt bearbeitet 10.11.2025 17:50:22
In the Linux kernel, the following vulnerability has been resolved: tcp: tcp_make_synack() can be called from process context tcp_rtx_synack() now could be called in process context as explained in 0a375c822497 ("tcp: tcp_rtx_synack() can be called...
- EPSS 0.02%
- Veröffentlicht 02.05.2025 15:55:58
- Zuletzt bearbeitet 08.05.2025 11:15:52
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2023-53117
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:55:55
- Zuletzt bearbeitet 10.11.2025 17:51:59
In the Linux kernel, the following vulnerability has been resolved: fs: prevent out-of-bounds array speculation when closing a file descriptor Google-Bug-Id: 114199369
CVE-2023-53111
- EPSS 0.07%
- Veröffentlicht 02.05.2025 15:55:51
- Zuletzt bearbeitet 10.11.2025 17:53:35
In the Linux kernel, the following vulnerability has been resolved: loop: Fix use-after-free issues do_req_filebacked() calls blk_mq_complete_request() synchronously or asynchronously when using asynchronous I/O unless memory allocation fails. Henc...
CVE-2023-53108
- EPSS 0.05%
- Veröffentlicht 02.05.2025 15:55:48
- Zuletzt bearbeitet 10.11.2025 17:54:19
In the Linux kernel, the following vulnerability has been resolved: net/iucv: Fix size of interrupt data iucv_irq_data needs to be 4 bytes larger. These bytes are not used by the iucv module, but written by the z/VM hypervisor in case a CPU is deco...