CVE-2023-53145
- EPSS 0.06%
- Veröffentlicht 10.05.2025 14:19:14
- Zuletzt bearbeitet 12.11.2025 20:42:21
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition In btsdio_probe, the data->work is bound with btsdio_work. It will be started in btsdio_send_frame....
CVE-2023-53143
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:56:13
- Zuletzt bearbeitet 10.11.2025 17:37:57
In the Linux kernel, the following vulnerability has been resolved: ext4: fix another off-by-one fsmap error on 1k block filesystems Apparently syzbot figured out that issuing this FSMAP call: struct fsmap_head cmd = { .fmh_count = ...; .fmh_key...
CVE-2023-53141
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:56:12
- Zuletzt bearbeitet 10.11.2025 17:38:24
In the Linux kernel, the following vulnerability has been resolved: ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() ila_xlat_nl_cmd_get_mapping() generates an empty skb, triggerring a recent sanity check [1]. Instead, return a...
CVE-2023-53139
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:56:11
- Zuletzt bearbeitet 10.11.2025 17:38:51
In the Linux kernel, the following vulnerability has been resolved: nfc: fdp: add null check of devm_kmalloc_array in fdp_nci_i2c_read_device_properties devm_kmalloc_array may fails, *fw_vsc_cfg might be null and cause out-of-bounds write in device...
CVE-2023-53140
- EPSS 0.09%
- Veröffentlicht 02.05.2025 15:56:11
- Zuletzt bearbeitet 10.11.2025 17:38:38
In the Linux kernel, the following vulnerability has been resolved: scsi: core: Remove the /proc/scsi/${proc_name} directory earlier Remove the /proc/scsi/${proc_name} directory earlier to fix a race condition between unloading and reloading kernel...
CVE-2023-53138
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:56:10
- Zuletzt bearbeitet 10.11.2025 17:39:03
In the Linux kernel, the following vulnerability has been resolved: net: caif: Fix use-after-free in cfusbl_device_notify() syzbot reported use-after-free in cfusbl_device_notify() [1]. This causes a stack trace like below: BUG: KASAN: use-after-...
- EPSS 0.05%
- Veröffentlicht 02.05.2025 15:56:09
- Zuletzt bearbeitet 05.09.2025 20:15:32
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2023-53135
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:56:08
- Zuletzt bearbeitet 10.11.2025 17:39:31
In the Linux kernel, the following vulnerability has been resolved: riscv: Use READ_ONCE_NOCHECK in imprecise unwinding stack mode When CONFIG_FRAME_POINTER is unset, the stack unwinding function walk_stackframe randomly reads the stack and then, w...
CVE-2023-53134
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:56:07
- Zuletzt bearbeitet 10.11.2025 17:39:47
In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Avoid order-5 memory allocation for TPA data The driver needs to keep track of all the possible concurrent TPA (GRO/LRO) completions on the aggregation ring. On P5 chips,...
CVE-2023-53125
- EPSS 0.06%
- Veröffentlicht 02.05.2025 15:56:01
- Zuletzt bearbeitet 10.11.2025 17:46:06
In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc75xx: Limit packet length to skb->len Packet length retrieved from skb data may be larger than the actual socket buffer length (up to 9026 bytes). In such case the cl...