The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, product names, and impact metrics.
For information on how to cite the NVD, including the database's Digital Object Identifier (DOI), please consult NIST's Public Data Repository.
Legal Disclaimer:
Here is where you can read the NVD legal disclaimer.
-
CVE-2023-53573 - In the Linux kernel, the following vulnerability has been resolved: clk: rs9: Fix suspend/resume Disabling the cache in commit 2ff4ba9e3702 ("clk: rs9: Fix I2C accessors") without removing cache synchronization in resume path results in a kernel... read CVE-2023-53573
Published: October 04, 2025; 12:15:52 PM -0400V3.1: 5.5 MEDIUM
-
CVE-2023-53574 - In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: delete timer and free skb queue when unloading Fix possible crash and memory leak on driver unload by deleting TX purge timer and freeing C2H queue in 'rtw_core_dei... read CVE-2023-53574
Published: October 04, 2025; 12:15:53 PM -0400V3.1: 5.5 MEDIUM
-
CVE-2023-53575 - In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix potential array out of bounds access Account for IWL_SEC_WEP_KEY_OFFSET when needed while verifying key_len size in iwl_mvm_sec_key_add().
Published: October 04, 2025; 12:15:53 PM -0400V3.1: 7.1 HIGH
-
CVE-2023-53571 - In the Linux kernel, the following vulnerability has been resolved: drm/i915: Make intel_get_crtc_new_encoder() less oopsy The point of the WARN was to print something, not oops straight up. Currently that is precisely what happens if we can't f... read CVE-2023-53571
Published: October 04, 2025; 12:15:52 PM -0400V3.1: 5.5 MEDIUM
-
CVE-2023-53572 - In the Linux kernel, the following vulnerability has been resolved: clk: imx: scu: use _safe list iterator to avoid a use after free This loop is freeing "clk" so it needs to use list_for_each_entry_safe(). Otherwise it dereferences a freed vari... read CVE-2023-53572
Published: October 04, 2025; 12:15:52 PM -0400V3.1: 7.8 HIGH
-
CVE-2023-53569 - In the Linux kernel, the following vulnerability has been resolved: ext2: Check block size validity during mount Check that log of block size stored in the superblock has sensible value. Otherwise the shift computing the block size can overflow ... read CVE-2023-53569
Published: October 04, 2025; 12:15:52 PM -0400V3.1: 7.8 HIGH
-
CVE-2023-53559 - In the Linux kernel, the following vulnerability has been resolved: ip_vti: fix potential slab-use-after-free in decode_session6 When ip_vti device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuin... read CVE-2023-53559
Published: October 04, 2025; 12:15:51 PM -0400V3.1: 7.8 HIGH
-
CVE-2023-53558 - In the Linux kernel, the following vulnerability has been resolved: rcu-tasks: Avoid pr_info() with spin lock in cblist_init_generic() pr_info() is called with rtp->cbs_gbl_lock spin lock locked. Because pr_info() calls printk() that might slee... read CVE-2023-53558
Published: October 04, 2025; 12:15:51 PM -0400V3.1: 5.5 MEDIUM
-
CVE-2023-53556 - In the Linux kernel, the following vulnerability has been resolved: iavf: Fix use-after-free in free_netdev We do netif_napi_add() for all allocated q_vectors[], but potentially do netif_napi_del() for part of them, then kfree q_vectors and leav... read CVE-2023-53556
Published: October 04, 2025; 12:15:50 PM -0400V3.1: 7.8 HIGH
-
CVE-2023-53557 - In the Linux kernel, the following vulnerability has been resolved: fprobe: Release rethook after the ftrace_ops is unregistered While running bpf selftests it's possible to get following fault: general protection fault, probably for non-cano... read CVE-2023-53557
Published: October 04, 2025; 12:15:51 PM -0400V3.1: 5.5 MEDIUM
-
CVE-2023-53598 - In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Range check CHDBOFF and ERDBOFF If the value read from the CHDBOFF and ERDBOFF registers is outside the range of the MHI register space then an invalid address m... read CVE-2023-53598
Published: October 04, 2025; 12:15:56 PM -0400V3.1: 5.5 MEDIUM
-
CVE-2023-53595 - In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: mcs: Fix NULL pointer dereferences When system is rebooted after creating macsec interface below NULL pointer dereference crashes occurred. This patch fixes those ... read CVE-2023-53595
Published: October 04, 2025; 12:15:56 PM -0400V3.1: 5.5 MEDIUM
-
CVE-2023-53596 - In the Linux kernel, the following vulnerability has been resolved: drivers: base: Free devm resources when unregistering a device In the current code, devres_release_all() only gets called if the device has a bus and has been probed. This lead... read CVE-2023-53596
Published: October 04, 2025; 12:15:56 PM -0400V3.1: 7.8 HIGH
-
CVE-2023-53594 - In the Linux kernel, the following vulnerability has been resolved: driver core: fix resource leak in device_add() When calling kobject_add() failed in device_add(), it will call cleanup_glue_dir() to free resource. But in kobject_add(), dev->ko... read CVE-2023-53594
Published: October 04, 2025; 12:15:55 PM -0400V3.1: 5.5 MEDIUM
-
CVE-2023-53593 - In the Linux kernel, the following vulnerability has been resolved: cifs: Release folio lock on fscache read hit. Under the current code, when cifs_readpage_worker is called, the call contract is that the callee should unlock the page. This is d... read CVE-2023-53593
Published: October 04, 2025; 12:15:55 PM -0400V3.1: 5.5 MEDIUM
-
CVE-2023-53591 - In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix deadlock in tc route query code Cited commit causes ABBA deadlock[0] when peer flows are created while holding the devcom rw semaphore. Due to peer flows offload ... read CVE-2023-53591
Published: October 04, 2025; 12:15:55 PM -0400V3.1: 5.5 MEDIUM
-
CVE-2023-53592 - In the Linux kernel, the following vulnerability has been resolved: gpio: sifive: Fix refcount leak in sifive_gpio_probe of_irq_find_parent() returns a node pointer with refcount incremented, We should use of_node_put() on it when not needed any... read CVE-2023-53592
Published: October 04, 2025; 12:15:55 PM -0400V3.1: 5.5 MEDIUM
-
CVE-2023-53590 - In the Linux kernel, the following vulnerability has been resolved: sctp: add a refcnt in sctp_stream_priorities to avoid a nested loop With this refcnt added in sctp_stream_priorities, we don't need to traverse all streams to check if the prio ... read CVE-2023-53590
Published: October 04, 2025; 12:15:55 PM -0400V3.1: 5.5 MEDIUM
-
CVE-2023-53589 - In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't trust firmware n_channels If the firmware sends us a corrupted MCC response with n_channels much larger than the command response can be, we might copy... read CVE-2023-53589
Published: October 04, 2025; 12:15:55 PM -0400V3.1: 5.5 MEDIUM
-
CVE-2023-53570 - In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: fix integer overflow in nl80211_parse_mbssid_elems() nl80211_parse_mbssid_elems() uses a u8 variable num_elems to count the number of MBSSID elements in the neste... read CVE-2023-53570
Published: October 04, 2025; 12:15:52 PM -0400V3.1: 7.8 HIGH