CVE-2023-53022
- EPSS 0.04%
- Veröffentlicht 27.03.2025 16:43:48
- Zuletzt bearbeitet 01.10.2025 18:15:36
In the Linux kernel, the following vulnerability has been resolved: net: enetc: avoid deadlock in enetc_tx_onestep_tstamp() This lockdep splat says it better than I could: ================================ WARNING: inconsistent lock state 6.2.0-rc2...
CVE-2023-53020
- EPSS 0.02%
- Veröffentlicht 27.03.2025 16:43:47
- Zuletzt bearbeitet 01.10.2025 18:15:36
In the Linux kernel, the following vulnerability has been resolved: l2tp: close all race conditions in l2tp_tunnel_register() The code in l2tp_tunnel_register() is racy in several ways: 1. It modifies the tunnel socket _after_ publishing it. 2. I...
CVE-2023-53015
- EPSS 0.01%
- Veröffentlicht 27.03.2025 16:43:43
- Zuletzt bearbeitet 01.10.2025 18:15:35
In the Linux kernel, the following vulnerability has been resolved: HID: betop: check shape of output reports betopff_init() only checks the total sum of the report counts for each report field to be at least 4, but hid_betopff_play() expects 4 rep...
CVE-2023-53009
- EPSS 0.01%
- Veröffentlicht 27.03.2025 16:43:39
- Zuletzt bearbeitet 30.10.2025 16:23:48
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Add sync after creating vram bo There will be data corruption on vram allocated by svm if the initialization is not complete and application is writting on the memory. ...
CVE-2023-53008
- EPSS 0.01%
- Veröffentlicht 27.03.2025 16:43:38
- Zuletzt bearbeitet 01.10.2025 21:15:43
In the Linux kernel, the following vulnerability has been resolved: cifs: fix potential memory leaks in session setup Make sure to free cifs_ses::auth_key.response before allocating it as we might end up leaking memory in reconnect or mounting.
CVE-2023-53000
- EPSS 0.03%
- Veröffentlicht 27.03.2025 16:43:33
- Zuletzt bearbeitet 30.10.2025 16:40:17
In the Linux kernel, the following vulnerability has been resolved: netlink: prevent potential spectre v1 gadgets Most netlink attributes are parsed and validated from __nla_validate_parse() or validate_nla() u16 type = nla_type(nla); if ...
CVE-2023-53001
- EPSS 0.02%
- Veröffentlicht 27.03.2025 16:43:33
- Zuletzt bearbeitet 15.07.2025 16:15:24
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2023-52997
- EPSS 0.02%
- Veröffentlicht 27.03.2025 16:43:31
- Zuletzt bearbeitet 30.10.2025 16:40:23
In the Linux kernel, the following vulnerability has been resolved: ipv4: prevent potential spectre v1 gadget in ip_metrics_convert() if (!type) continue; if (type > RTAX_MAX) return -EINVAL; ... metrics[type - 1] = val; @type being used as...
CVE-2023-52993
- EPSS 0.01%
- Veröffentlicht 27.03.2025 16:43:28
- Zuletzt bearbeitet 01.10.2025 21:15:42
In the Linux kernel, the following vulnerability has been resolved: x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL Baoquan reported that after triggering a crash the subsequent crash-kernel fails to boot about half of the time. It triggers a ...
CVE-2023-52992
- EPSS 0.01%
- Veröffentlicht 27.03.2025 16:43:27
- Zuletzt bearbeitet 29.10.2025 17:00:21
In the Linux kernel, the following vulnerability has been resolved: bpf: Skip task with pid=1 in send_signal_common() The following kernel panic can be triggered when a task with pid=1 attaches a prog that attempts to send killing signal to itself,...