7.0

CVSS3.1

CVE-2023-53821 - ip6_vti: fix slab-use-after-free in decode_session6

In the Linux kernel, the following vulnerability has been resolved: ip6_vti: fix slab-use-after-free in decode_session6 When ipv6_vti device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuing. Then, slab-use-after-free may occur when ipv6_vti device…

πŸ“… Published: Dec. 9, 2025, midnight πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.0

CVSS3.1

CVE-2023-53819 - amdgpu: validate offset_in_bo of drm_amdgpu_gem_va

In the Linux kernel, the following vulnerability has been resolved: amdgpu: validate offset_in_bo of drm_amdgpu_gem_va This is motivated by OOB access in amdgpu_vm_update_range when offset_in_bo+map_size overflows. v2: keep the validations in amdgpu_vm_bo_map v3: add the validations to amdgpu_vm…

πŸ“… Published: Dec. 9, 2025, midnight πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.5

CVSS3.1

CVE-2023-53818 - ARM: zynq: Fix refcount leak in zynq_early_slcr_init

In the Linux kernel, the following vulnerability has been resolved: ARM: zynq: Fix refcount leak in zynq_early_slcr_init of_find_compatible_node() returns a node pointer with refcount incremented, we should use of_node_put() on error path. Add missing of_node_put() to avoid refcount leak.

πŸ“… Published: Dec. 9, 2025, midnight πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.0

CVSS3.1

CVE-2023-53800 - ubi: Fix use-after-free when volume resizing failed

In the Linux kernel, the following vulnerability has been resolved: ubi: Fix use-after-free when volume resizing failed There is an use-after-free problem reported by KASAN: ================================================================== BUG: KASAN: use-after-free in ubi_eba_copy_table+0x1…

πŸ“… Published: Dec. 9, 2025, midnight πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.0

CVSS3.1

CVE-2023-53794 - cifs: fix session state check in reconnect to avoid use-after-free issue

In the Linux kernel, the following vulnerability has been resolved: cifs: fix session state check in reconnect to avoid use-after-free issue Don't collect exiting session in smb2_reconnect_server(), because it will be released soon. Note that the exiting session will stay in server->smb_ses_list…

πŸ“… Published: Dec. 9, 2025, midnight πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.0

CVSS3.1

CVE-2023-53783 - blk-iocost: fix divide by 0 error in calc_lcoefs()

In the Linux kernel, the following vulnerability has been resolved: blk-iocost: fix divide by 0 error in calc_lcoefs() echo max of u64 to cost.model can cause divide by 0 error. # echo 8:0 rbps=18446744073709551615 > /sys/fs/cgroup/io.cost.model divide error: 0000 [#1] PREEMPT SMP RIP: 00…

πŸ“… Published: Dec. 9, 2025, midnight πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.5

CVSS3.1

CVE-2023-53778 - accel/qaic: Clean up integer overflow checking in map_user_pages()

In the Linux kernel, the following vulnerability has been resolved: accel/qaic: Clean up integer overflow checking in map_user_pages() The encode_dma() function has some validation on in_trans->size but it would be more clear to move those checks to find_and_map_user_pages(). The encode_dma() ha…

πŸ“… Published: Dec. 9, 2025, midnight πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.5

CVSS3.1

CVE-2023-53855 - net: dsa: ocelot: call dsa_tag_8021q_unregister() under rtnl_lock() on driver remove

In the Linux kernel, the following vulnerability has been resolved: net: dsa: ocelot: call dsa_tag_8021q_unregister() under rtnl_lock() on driver remove When the tagging protocol in current use is "ocelot-8021q" and we unbind the driver, we see this splat: $ echo '0000:00:00.2' > /sys/bus/pci/dr…

πŸ“… Published: Dec. 9, 2025, midnight πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.5

CVSS3.1

CVE-2022-50670 - mmc: omap_hsmmc: fix return value check of mmc_add_host()

In the Linux kernel, the following vulnerability has been resolved: mmc: omap_hsmmc: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, it will lead two issues: 1. The memory that allocated in mmc_alloc_host() is leaked. 2. In the remove() pat…

πŸ“… Published: Dec. 9, 2025, midnight πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.0

CVSS3.1

CVE-2022-50666 - RDMA/siw: Fix QP destroy to wait for all references dropped.

In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: Fix QP destroy to wait for all references dropped. Delay QP destroy completion until all siw references to QP are dropped. The calling RDMA core will free QP structure after successful return from siw_qp_destroy() call,…

πŸ“… Published: Dec. 9, 2025, midnight πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 344980
Page 2338 of 34,498
Β« previous page Β» next page
Filters