U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, product names, and impact metrics.

For information on how to cite the NVD, including the database's Digital Object Identifier (DOI), please consult NIST's Public Data Repository.

Last 20 Scored Vulnerability IDs & Summaries CVSS Severity
  • CVE-2023-53636 - In the Linux kernel, the following vulnerability has been resolved: clk: microchip: fix potential UAF in auxdev release callback Similar to commit 1c11289b34ab ("peci: cpu: Fix use-after-free in adev_release()"), the auxiliary device is not torn... read CVE-2023-53636
    Published: October 07, 2025; 12:15:46 PM -0400

    V3.1: 7.8 HIGH

  • CVE-2023-53637 - In the Linux kernel, the following vulnerability has been resolved: media: i2c: ov772x: Fix memleak in ov772x_probe() A memory leak was reported when testing ov772x with bpf mock device: AssertionError: unreferenced object 0xffff888109afa7a8 (s... read CVE-2023-53637
    Published: October 07, 2025; 12:15:46 PM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2023-53638 - In the Linux kernel, the following vulnerability has been resolved: octeon_ep: cancel queued works in probe error path If it fails to get the devices's MAC address, octep_probe exits while leaving the delayed work intr_poll_task queued. When the... read CVE-2023-53638
    Published: October 07, 2025; 12:15:47 PM -0400

    V3.1: 7.8 HIGH

  • CVE-2023-53639 - In the Linux kernel, the following vulnerability has been resolved: wifi: ath6kl: reduce WARN to dev_dbg() in callback The warn is triggered on a known race condition, documented in the code above the test, that is correctly handled. Using WARN... read CVE-2023-53639
    Published: October 07, 2025; 12:15:47 PM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2023-53640 - In the Linux kernel, the following vulnerability has been resolved: ASoC: lpass: Fix for KASAN use_after_free out of bounds When we run syzkaller we get below Out of Bounds error. "KASAN: slab-out-of-bounds Read in regcache_flat_read" Below is... read CVE-2023-53640
    Published: October 07, 2025; 12:15:47 PM -0400

    V3.1: 7.8 HIGH

  • CVE-2023-53641 - In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: hif_usb: fix memory leak of remain_skbs hif_dev->remain_skb is allocated and used exclusively in ath9k_hif_usb_rx_stream(). It is implied that an allocated remain_s... read CVE-2023-53641
    Published: October 07, 2025; 12:15:47 PM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2023-53642 - In the Linux kernel, the following vulnerability has been resolved: x86: fix clear_user_rep_good() exception handling annotation This code no longer exists in mainline, because it was removed in commit d2c95f9d6802 ("x86: don't use REP_GOOD or E... read CVE-2023-53642
    Published: October 07, 2025; 12:15:47 PM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2023-53643 - In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: don't access released socket during error recovery While the error recovery work is temporarily failing reconnect attempts, running the 'nvme list' command causes a ke... read CVE-2023-53643
    Published: October 07, 2025; 12:15:47 PM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2023-53644 - In the Linux kernel, the following vulnerability has been resolved: media: radio-shark: Add endpoint checks The syzbot fuzzer was able to provoke a WARNING from the radio-shark2 driver: ------------[ cut here ]------------ usb 1-1: BOGUS urb xf... read CVE-2023-53644
    Published: October 07, 2025; 12:15:47 PM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2023-53645 - In the Linux kernel, the following vulnerability has been resolved: bpf: Make bpf_refcount_acquire fallible for non-owning refs This patch fixes an incorrect assumption made in the original bpf_refcount series [0], specifically that the BPF prog... read CVE-2023-53645
    Published: October 07, 2025; 12:15:47 PM -0400

    V3.1: 7.8 HIGH

  • CVE-2023-53646 - In the Linux kernel, the following vulnerability has been resolved: drm/i915/perf: add sentinel to xehp_oa_b_counters Arrays passed to reg_in_range_table should end with empty record. The patch solves KASAN detected bug with signature: BUG: KAS... read CVE-2023-53646
    Published: October 07, 2025; 12:15:48 PM -0400

    V3.1: 7.1 HIGH

  • CVE-2023-53647 - In the Linux kernel, the following vulnerability has been resolved: Drivers: hv: vmbus: Don't dereference ACPI root object handle Since the commit referenced in the Fixes: tag below the VMBus client driver is walking the ACPI namespace up from t... read CVE-2023-53647
    Published: October 07, 2025; 12:15:48 PM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2023-53648 - In the Linux kernel, the following vulnerability has been resolved: ALSA: ac97: Fix possible NULL dereference in snd_ac97_mixer smatch error: sound/pci/ac97/ac97_codec.c:2354 snd_ac97_mixer() error: we previously assumed 'rac97' could be null (s... read CVE-2023-53648
    Published: October 07, 2025; 12:15:48 PM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2023-53649 - In the Linux kernel, the following vulnerability has been resolved: perf trace: Really free the evsel->priv area In 3cb4d5e00e037c70 ("perf trace: Free syscall tp fields in evsel->priv") it only was freeing if strcmp(evsel->tp_format->system, "s... read CVE-2023-53649
    Published: October 07, 2025; 12:15:48 PM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2023-53650 - In the Linux kernel, the following vulnerability has been resolved: fbdev: omapfb: lcd_mipid: Fix an error handling path in mipid_spi_probe() If 'mipid_detect()' fails, we must free 'md' to avoid a memory leak.
    Published: October 07, 2025; 12:15:48 PM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2023-53626 - In the Linux kernel, the following vulnerability has been resolved: ext4: fix possible double unlock when moving a directory
    Published: October 07, 2025; 12:15:45 PM -0400

    V3.1: 7.8 HIGH

  • CVE-2023-53627 - In the Linux kernel, the following vulnerability has been resolved: scsi: hisi_sas: Grab sas_dev lock when traversing the members of sas_dev.list When freeing slots in function slot_complete_v3_hw(), it is possible that sas_dev.list is being tra... read CVE-2023-53627
    Published: October 07, 2025; 12:15:45 PM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2023-53628 - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: drop gfx_v11_0_cp_ecc_error_irq_funcs The gfx.cp_ecc_error_irq is retired in gfx11. In gfx_v11_0_hw_fini still use amdgpu_irq_put to disable this interrupt, which ca... read CVE-2023-53628
    Published: October 07, 2025; 12:15:45 PM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2023-53629 - In the Linux kernel, the following vulnerability has been resolved: fs: dlm: fix use after free in midcomms commit While working on processing dlm message in softirq context I experienced the following KASAN use-after-free warning: [ 151.76047... read CVE-2023-53629
    Published: October 07, 2025; 12:15:45 PM -0400

    V3.1: 7.8 HIGH

  • CVE-2023-53630 - In the Linux kernel, the following vulnerability has been resolved: iommufd: Fix unpinning of pages when an access is present syzkaller found that the calculation of batch_last_index should use 'start_index' since at input to this function the b... read CVE-2023-53630
    Published: October 07, 2025; 12:15:46 PM -0400

    V3.1: 5.5 MEDIUM

Created September 20, 2022 , Updated August 27, 2024