CVE-2023-52488
- EPSS 0.02%
- Veröffentlicht 11.03.2024 18:15:16
- Zuletzt bearbeitet 14.02.2025 16:40:56
In the Linux kernel, the following vulnerability has been resolved: serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO The SC16IS7XX IC supports a burst mode to access the FIFOs where the initial register address is sent ($0...
CVE-2023-52489
- EPSS 0.01%
- Veröffentlicht 11.03.2024 18:15:16
- Zuletzt bearbeitet 14.02.2025 16:41:06
In the Linux kernel, the following vulnerability has been resolved: mm/sparsemem: fix race in accessing memory_section->usage The below race is observed on a PFN which falls into the device memory region with the system memory configuration where P...
CVE-2023-52491
- EPSS 0.02%
- Veröffentlicht 11.03.2024 18:15:16
- Zuletzt bearbeitet 12.12.2024 17:32:00
In the Linux kernel, the following vulnerability has been resolved: media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run In mtk_jpeg_probe, &jpeg->job_timeout_work is bound with mtk_jpeg_job_timeout_work. I...
CVE-2023-52492
- EPSS 0.01%
- Veröffentlicht 11.03.2024 18:15:16
- Zuletzt bearbeitet 04.04.2025 14:41:10
In the Linux kernel, the following vulnerability has been resolved: dmaengine: fix NULL pointer in channel unregistration function __dma_async_device_channel_register() can fail. In case of failure, chan->local is freed (with free_percpu()), and ch...
CVE-2023-52493
- EPSS 0.01%
- Veröffentlicht 11.03.2024 18:15:16
- Zuletzt bearbeitet 12.12.2024 15:57:46
In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Drop chan lock before queuing buffers Ensure read and write locks for the channel are not taken in succession by dropping the read lock from parse_xfer_event() such...
CVE-2024-26625
- EPSS 0.01%
- Veröffentlicht 06.03.2024 07:15:12
- Zuletzt bearbeitet 07.01.2025 20:17:40
In the Linux kernel, the following vulnerability has been resolved: llc: call sock_orphan() at release time syzbot reported an interesting trace [1] caused by a stale sk->sk_wq pointer in a closed llc socket. In commit ff7b11aa481f ("net: socket: ...
CVE-2024-26627
- EPSS 0.02%
- Veröffentlicht 06.03.2024 07:15:12
- Zuletzt bearbeitet 14.03.2025 18:46:34
In the Linux kernel, the following vulnerability has been resolved: scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler Inside scsi_eh_wakeup(), scsi_host_busy() is called & checked with host lock every time for deciding if ...
CVE-2023-52603
- EPSS 0.03%
- Veröffentlicht 06.03.2024 07:15:11
- Zuletzt bearbeitet 12.12.2024 17:36:56
In the Linux kernel, the following vulnerability has been resolved: UBSAN: array-index-out-of-bounds in dtSplitRoot Syzkaller reported the following issue: oop0: detected capacity change from 0 to 32768 UBSAN: array-index-out-of-bounds in fs/jfs/...
CVE-2023-52604
- EPSS 0.02%
- Veröffentlicht 06.03.2024 07:15:11
- Zuletzt bearbeitet 12.12.2024 17:49:20
In the Linux kernel, the following vulnerability has been resolved: FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree Syzkaller reported the following issue: UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:2867:6 index 196694 is out of ran...
CVE-2023-52606
- EPSS 0.02%
- Veröffentlicht 06.03.2024 07:15:11
- Zuletzt bearbeitet 14.02.2025 16:40:45
In the Linux kernel, the following vulnerability has been resolved: powerpc/lib: Validate size for vector operations Some of the fp/vmx code in sstep.c assume a certain maximum size for the instructions being emulated. The size of those operations ...