5.5

CVSS3.1

CVE-2021-47283 - net:sfc: fix non-freed irq in legacy irq mode

In the Linux kernel, the following vulnerability has been resolved: net:sfc: fix non-freed irq in legacy irq mode SFC driver can be configured via modparam to work using MSI-X, MSI or legacy IRQ interrupts. In the last one, the interrupt was not properly released on module remove. It was not fre…

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: Dec. 18, 2025, 11:36 a.m.

7.1

CVSS3.1

CVE-2021-47277 - kvm: avoid speculation-based attacks from out-of-range memslot accesses

In the Linux kernel, the following vulnerability has been resolved: kvm: avoid speculation-based attacks from out-of-range memslot accesses KVM's mechanism for accessing guest memory translates a guest physical address (gpa) to a host virtual address using the right-shifted gpa (also known as gfn…

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: Dec. 18, 2025, 11:36 a.m.

7.5

CVSS3.1

CVE-2024-35059 -

An issue in the Pickle Python library of NASA AIT-Core v2.5.2 allows attackers to execute arbitrary commands.

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: June 3, 2025, 2:15 p.m.

5.5

CVSS3.1

CVE-2023-52734 - kernel: net: sched: sch: Bounds check priority

This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: May 28, 2024, 7:15 p.m.

4.4

CVSS3.1

CVE-2023-52878 - can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds

In the Linux kernel, the following vulnerability has been resolved: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds If the "struct can_priv::echoo_skb" is accessed out of bounds, this would cause a kernel crash. Instead, issue a meaningful warning …

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 7:45 a.m.

5.5

CVSS3.1

CVE-2023-52877 - usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()

In the Linux kernel, the following vulnerability has been resolved: usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() It is possible that typec_register_partner() returns ERR_PTR on failure. When port->partner is an error, a NULL pointer dereference may occur as shown below. [9122…

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 7:44 a.m.

5.5

CVSS3.1

CVE-2023-52876 - clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data

In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data Add the check for the return value of mtk_alloc_clk_data() in order to avoid NULL pointer dereference.

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 7:44 a.m.

5.5

CVSS3.1

CVE-2023-52875 - clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data

In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data Add the check for the return value of mtk_alloc_clk_data() in order to avoid NULL pointer dereference.

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 7:44 a.m.

5.5

CVSS3.1

CVE-2023-52873 - clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data

In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data Add the check for the return value of mtk_alloc_clk_data() in order to avoid NULL pointer dereference.

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: May 4, 2025, 7:44 a.m.

7.8

CVSS3.1

CVE-2023-52867 - drm/radeon: possible buffer overflow

In the Linux kernel, the following vulnerability has been resolved: drm/radeon: possible buffer overflow Buffer 'afmt_status' of size 6 could overflow, since index 'afmt_idx' is checked after access.

πŸ“… Published: May 21, 2024, midnight πŸ”„ Last Modified: Sept. 24, 2025, 12:47 a.m.
Total resulsts: 343975
Page 9232 of 34,398
Β« previous page Β» next page
Filters