4.7

CVSS3.1

CVE-2023-53047 - tee: amdtee: fix race condition in amdtee_open_session

In the Linux kernel, the following vulnerability has been resolved: tee: amdtee: fix race condition in amdtee_open_session There is a potential race condition in amdtee_open_session that may lead to use-after-free. For instance, in amdtee_open_session() after sess->sess_mask is set, and before se…

πŸ“… Published: May 2, 2025, midnight πŸ”„ Last Modified: Nov. 12, 2025, 4:46 p.m.

7.8

CVSS3.1

CVE-2023-53039 - HID: intel-ish-hid: ipc: Fix potential use-after-free in work function

In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: ipc: Fix potential use-after-free in work function When a reset notify IPC message is received, the ISR schedules a work function and passes the ISHTP device to it via a global pointer ishtp_dev. If ish_probe(…

πŸ“… Published: May 2, 2025, midnight πŸ”„ Last Modified: Nov. 12, 2025, 7:14 p.m.

5.5

CVSS3.1

CVE-2023-53036 - drm/amdgpu: Fix call trace warning and hang when removing amdgpu device

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix call trace warning and hang when removing amdgpu device On GPUs with RAS enabled, below call trace and hang are observed when shutting down device. v2: use DRM device unplugged flag instead of shutdown flag as th…

πŸ“… Published: May 2, 2025, midnight πŸ”„ Last Modified: Nov. 12, 2025, 7:10 p.m.

5.5

CVSS3.1

CVE-2023-53100 - ext4: fix WARNING in ext4_update_inline_data

In the Linux kernel, the following vulnerability has been resolved: ext4: fix WARNING in ext4_update_inline_data Syzbot found the following issue: EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. fscrypt: AES-256-CTS-CBC using implementat…

πŸ“… Published: May 2, 2025, midnight πŸ”„ Last Modified: Jan. 5, 2026, 10:18 a.m.

9.8

CVSS3.1

CVE-2025-44877 -

Tenda AC9 V15.03.06.42_multi was found to contain a command injection vulnerability in the formSetSambaConf function via the usbname parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“… Published: May 2, 2025, midnight πŸ”„ Last Modified: May 27, 2025, 2:21 p.m.

5.5

CVSS3.1

CVE-2023-53143 - ext4: fix another off-by-one fsmap error on 1k block filesystems

In the Linux kernel, the following vulnerability has been resolved: ext4: fix another off-by-one fsmap error on 1k block filesystems Apparently syzbot figured out that issuing this FSMAP call: struct fsmap_head cmd = { .fmh_count = ...; .fmh_keys = { { .fmr_device = /* ext4 dev */, .fmr_phys…

πŸ“… Published: May 2, 2025, midnight πŸ”„ Last Modified: Nov. 10, 2025, 5:37 p.m.

5.5

CVSS3.1

CVE-2023-53096 - interconnect: fix mem leak when freeing nodes

In the Linux kernel, the following vulnerability has been resolved: interconnect: fix mem leak when freeing nodes The node link array is allocated when adding links to a node but is not deallocated when nodes are destroyed.

πŸ“… Published: May 2, 2025, midnight πŸ”„ Last Modified: Nov. 12, 2025, 9 p.m.

5.5

CVSS3.1

CVE-2023-53140 - scsi: core: Remove the /proc/scsi/${proc_name} directory earlier

In the Linux kernel, the following vulnerability has been resolved: scsi: core: Remove the /proc/scsi/${proc_name} directory earlier Remove the /proc/scsi/${proc_name} directory earlier to fix a race condition between unloading and reloading kernel modules. This fixes a bug introduced in 2009 by …

πŸ“… Published: May 2, 2025, midnight πŸ”„ Last Modified: Nov. 10, 2025, 5:38 p.m.

7.8

CVSS3.1

CVE-2023-53138 - net: caif: Fix use-after-free in cfusbl_device_notify()

In the Linux kernel, the following vulnerability has been resolved: net: caif: Fix use-after-free in cfusbl_device_notify() syzbot reported use-after-free in cfusbl_device_notify() [1]. This causes a stack trace like below: BUG: KASAN: use-after-free in cfusbl_device_notify+0x7c9/0x870 net/caif…

πŸ“… Published: May 2, 2025, midnight πŸ”„ Last Modified: Nov. 10, 2025, 5:39 p.m.

5.5

CVSS3.1

CVE-2023-53133 - bpf, sockmap: Fix an infinite loop error when len is 0 in tcp_bpf_recvmsg_parser()

In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix an infinite loop error when len is 0 in tcp_bpf_recvmsg_parser() When the buffer length of the recvmsg system call is 0, we got the flollowing soft lockup problem: watchdog: BUG: soft lockup - CPU#3 stuck for 2…

πŸ“… Published: May 2, 2025, midnight πŸ”„ Last Modified: Nov. 10, 2025, 5:40 p.m.
Total resulsts: 343942
Page 5049 of 34,395
Β« previous page Β» next page
Filters