CVSS: 7.1EPSS: 0%CPEs: 8EXPL: 0CVE-2023-53766 – FS: JFS: Check for read-only mounted filesystem in txBegin
https://notcve.org/view.php?id=CVE-2023-53766
08 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: FS: JFS: Check for read-only mounted filesystem in txBegin This patch adds a check for read-only mounted filesystem in txBegin before starting a transaction potentially saving from NULL pointer deref. • https://git.kernel.org/stable/c/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 •
CVSS: 6.6EPSS: 0%CPEs: 3EXPL: 0CVE-2023-53765 – dm cache: free background tracker's queued work in btracker_destroy
https://notcve.org/view.php?id=CVE-2023-53765
08 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: dm cache: free background tracker's queued work in btracker_destroy Otherwise the kernel can BUG with: [ 2245.426978] ============================================================================= [ 2245.435155] BUG bt_work (Tainted: G B W ): Objects remaining in bt_work on __kmem_cache_shutdown() [ 2245.445233] ----------------------------------------------------------------------------- [ 2245.445233] [ 2245.454879] Slab 0x00000000b... • https://git.kernel.org/stable/c/b29d4986d0da1a27cd35917cdb433672f5c95d7f •
CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0CVE-2023-53764 – wifi: ath12k: Handle lock during peer_id find
https://notcve.org/view.php?id=CVE-2023-53764
08 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Handle lock during peer_id find ath12k_peer_find_by_id() requires that the caller hold the ab->base_lock. ... Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0-03171-QCAHKSWPL_SILICONZ-1 In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Handle lock during peer_id find ath12k_peer_find_by_id() requires that the caller hold the ab->base_lock. • https://git.kernel.org/stable/c/d889913205cf7ebda905b1e62c5867ed4e39f6c2 •
CVSS: 7.3EPSS: 0%CPEs: 5EXPL: 0CVE-2023-53763 – Revert "f2fs: fix to do sanity check on extent cache correctly"
https://notcve.org/view.php?id=CVE-2023-53763
08 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: Revert "f2fs: fix to do sanity check on extent cache correctly" syzbot reports a f2fs bug as below: UBSAN: array-index-out-of-bounds in fs/f2fs/f2fs.h:3275:19 index 1409 is out of range for type '__le32[923]' (aka 'unsigned int[923]') Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:217 [inline] __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348 inl... • https://git.kernel.org/stable/c/85eb8b61dd4cfc7a839a0e86287b92ca6193444e •
CVSS: 8.1EPSS: 0%CPEs: 3EXPL: 0CVE-2023-53762 – Bluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync
https://notcve.org/view.php?id=CVE-2023-53762
08 Dec 2025 — __pfx_kthread+0x10/0x10 ret_from_fork+0x2c/0x50 Allocated by task 1782: kasan_save_stack+0x33/0x60 kasan_set_track+0x25/0x30 __kasan_kmalloc+0x8f/0xa0 hci_conn_add+0xa5/0xa80 [bluetooth] hci_bind_cis+0x881/0x9b0 [bluetooth] iso_connect_cis+0x121/0x520 [bluetooth] iso_sock_connect+0x3f6/0x790 [bluetooth] __sys_connect+0x109/0x130 __x64_sys_connect+0x40/0x50 do_syscall_64+0x60/0x90 entry_SYSCALL_64_after_hwframe+0x6e/0xd8 Freed by task 695: kasan_save_stack+0x33/0x60 kasan_set_track+0x25/0x30 kasan_sa... • https://git.kernel.org/stable/c/182ee45da083db4e3e621541ccf255bfa9652214 •
CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0CVE-2023-53761 – USB: usbtmc: Fix direction for 0-length ioctl control messages
https://notcve.org/view.php?id=CVE-2023-53761
08 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: USB: usbtmc: Fix direction for 0-length ioctl control messages The syzbot fuzzer found a problem in the usbtmc driver: When a user submits an ioctl for a 0-length control transfer, the driver does not check that the direction is set to OUT: ------------[ cut here ]------------ usb 3-1: BOGUS control dir, pipe 80000b80 doesn't match bRequestType fd WARNING: CPU: 0 PID: 5100 at drivers/usb/core/urb.c:411 usb_submit_urb+0x14a7/0x1880 dr... • https://git.kernel.org/stable/c/658f24f4523e41cda6a389c38b763f4c0cad6fbc •
CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0CVE-2023-53760 – scsi: ufs: core: mcq: Fix &hwq->cq_lock deadlock issue
https://notcve.org/view.php?id=CVE-2023-53760
08 Dec 2025 — -.}-{2:2}, at: ufshcd_mcq_poll_cqe_lock+0x30/0xe0 [name:lockdep&]{IN-HARDIRQ-W} state was registered at: lock_acquire+0x17c/0x33c _raw_spin_lock+0x5c/0x7c ufshcd_mcq_poll_cqe_lock+0x30/0xe0 ufs_mtk_mcq_intr+0x60/0x1bc [ufs_mediatek_mod] __handle_irq_event_percpu+0x140/0x3ec handle_irq_event+0x50/0xd8 handle_fasteoi_irq+0x148/0x2b0 generic_handle_domain_irq+0x4c/0x6c gic_handle_irq+0x58/0x134 call_on_irq_stack+0x40/0x74 do_interrupt_handler+0x84/0xe4 el1_interrupt+0x3c/0x78
CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0CVE-2023-53759 – HID: hidraw: fix data race on device refcount
https://notcve.org/view.php?id=CVE-2023-53759
08 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: HID: hidraw: fix data race on device refcount The hidraw_open() function increments the hidraw device reference counter. ... In the Linux kernel, the following vulnerability has been resolved: HID: hidraw: fix data race on device refcount The hidraw_open() function increments the hidraw device reference counter. • https://git.kernel.org/stable/c/8590222e4b021054a7167a4dd35b152a8ed7018e •
CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0CVE-2023-53758 – spi: atmel-quadspi: Free resources even if runtime resume failed in .remove()
https://notcve.org/view.php?id=CVE-2023-53758
08 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: spi: atmel-quadspi: Free resources even if runtime resume failed in .remove() An early error exit in atmel_qspi_remove() doesn't prevent the device unbind. ... In the Linux kernel, the following vulnerability has been resolved: spi: atmel-quadspi: Free resources even if runtime resume failed in .remove() An early error exit in atmel_qspi_remove() doesn't prevent the device unbind. • https://git.kernel.org/stable/c/4a2f83b7f78092a6d9e98fb5573d8f4b79c56336 •
CVSS: 7.1EPSS: 0%CPEs: 8EXPL: 0CVE-2023-53757 – irqchip/irq-mvebu-gicp: Fix refcount leak in mvebu_gicp_probe
https://notcve.org/view.php?id=CVE-2023-53757
08 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: irqchip/irq-mvebu-gicp: Fix refcount leak in mvebu_gicp_probe of_irq_find_parent() returns a node pointer with refcount incremented, We should use of_node_put() on it when not needed anymore. In the Linux kernel, the following vulnerability has been resolved: irqchip/irq-mvebu-gicp: Fix refcount leak in mvebu_gicp_probe of_irq_find_parent() returns a node pointer with refcount incremented, We should use of_node_put() on it whe... • https://git.kernel.org/stable/c/a68a63cb4dfc30e8a79b444aabc7747bb7621acf •
