CVE-2023-53567
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:09
- Zuletzt bearbeitet 21.03.2026 00:42:36
In the Linux kernel, the following vulnerability has been resolved: spi: qup: Don't skip cleanup in remove's error path Returning early in a platform driver's remove callback is wrong. In this case the dma resources are not released in the error pa...
CVE-2023-53566
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:08
- Zuletzt bearbeitet 21.03.2026 00:42:57
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: fix null deref on element insertion There is no guarantee that rb_prev() will not return NULL in nft_rbtree_gc_elem(): general protection fault, probabl...
CVE-2023-53564
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:07
- Zuletzt bearbeitet 21.03.2026 00:39:51
In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix defrag path triggering jbd2 ASSERT code path: ocfs2_ioctl_move_extents ocfs2_move_extents ocfs2_defrag_extent __ocfs2_move_extent + ocfs2_journal_access_di ...
CVE-2023-53561
- EPSS 0.01%
- Veröffentlicht 04.10.2025 15:17:05
- Zuletzt bearbeitet 21.03.2026 00:38:05
In the Linux kernel, the following vulnerability has been resolved: net: wwan: iosm: fix NULL pointer dereference when removing device In suspend and resume cycle, the removal and rescan of device ends up in NULL pointer dereference. During driver...
CVE-2023-53562
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:05
- Zuletzt bearbeitet 21.03.2026 00:39:20
In the Linux kernel, the following vulnerability has been resolved: drm/msm: fix vram leak on bind errors Make sure to release the VRAM buffer also in a case a subcomponent fails to bind. Patchwork: https://patchwork.freedesktop.org/patch/525094/
CVE-2023-53560
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:04
- Zuletzt bearbeitet 21.03.2026 00:38:40
In the Linux kernel, the following vulnerability has been resolved: tracing/histograms: Add histograms to hist_vars if they have referenced variables Hist triggers can have referenced variables without having direct variables fields. This can be th...
CVE-2023-53559
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:03
- Zuletzt bearbeitet 21.03.2026 01:01:22
In the Linux kernel, the following vulnerability has been resolved: ip_vti: fix potential slab-use-after-free in decode_session6 When ip_vti device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuing. ...
CVE-2023-53558
- EPSS 0.01%
- Veröffentlicht 04.10.2025 15:17:02
- Zuletzt bearbeitet 21.03.2026 01:00:18
In the Linux kernel, the following vulnerability has been resolved: rcu-tasks: Avoid pr_info() with spin lock in cblist_init_generic() pr_info() is called with rtp->cbs_gbl_lock spin lock locked. Because pr_info() calls printk() that might sleep, ...
CVE-2023-53556
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:01
- Zuletzt bearbeitet 21.03.2026 00:59:57
In the Linux kernel, the following vulnerability has been resolved: iavf: Fix use-after-free in free_netdev We do netif_napi_add() for all allocated q_vectors[], but potentially do netif_napi_del() for part of them, then kfree q_vectors and leave i...
CVE-2023-53554
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:16:59
- Zuletzt bearbeitet 23.03.2026 18:40:35
In the Linux kernel, the following vulnerability has been resolved: staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() The "exc->key_len" is a u16 that comes from the user. If it's over IW_ENCODING_TOKEN_MAX (64) that could lea...