CVSS: -EPSS: 0%CPEs: 5EXPL: 0CVE-2023-53989 – arm64: mm: fix VA-range sanity check
https://notcve.org/view.php?id=CVE-2023-53989
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: arm64: mm: fix VA-range sanity check Both create_mapping_noalloc() and update_mapping_prot() sanity-check their 'virt' parameter, but the check itself doesn't make much sense. The condition used today appears to be a historical accident. ... The SUSE Linux Enterprise 15 SP5 RT kernel was updated to fix various security issues. • https://git.kernel.org/stable/c/14c127c957c1c6070647c171e72f06e0db275ebf •
CVSS: -EPSS: 0%CPEs: 5EXPL: 0CVE-2023-53988 – fs/ntfs3: Fix slab-out-of-bounds read in hdr_delete_de()
https://notcve.org/view.php?id=CVE-2023-53988
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix slab-out-of-bounds read in hdr_delete_de() Here is a BUG report from syzbot: BUG: KASAN: slab-out-of-bounds in hdr_delete_de+0xe0/0x150 fs/ntfs3/index.c:806 Read of size 16842960 at addr ffff888079cc0600 by task syz-executor934/3631 Call Trace: memmove+0x25/0x60 mm/kasan/shadow.c:54 hdr_delete_de+0xe0/0x150 fs/ntfs3/index.c:806 indx_delete_entry+0x74f/0x3670 fs/ntfs3/index.c:2193 ni_remove_name+0x27a/0x980 fs/ntfs3/frec... • https://git.kernel.org/stable/c/82cae269cfa953032fbb8980a7d554d60fb00b17 •
CVSS: -EPSS: 0%CPEs: 4EXPL: 0CVE-2023-53987 – ping: Fix potentail NULL deref for /proc/net/icmp.
https://notcve.org/view.php?id=CVE-2023-53987
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: ping: Fix potentail NULL deref for /proc/net/icmp. • https://git.kernel.org/stable/c/dbca1596bbb08318f5e3b3b99f8ca0a0d3830a65 •
CVSS: -EPSS: 0%CPEs: 6EXPL: 0CVE-2023-53986 – mips: bmips: BCM6358: disable RAC flush for TP1
https://notcve.org/view.php?id=CVE-2023-53986
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: mips: bmips: BCM6358: disable RAC flush for TP1 RAC flush causes kernel panics on BCM6358 with EHCI/OHCI when booting from TP1: [ 3.881739] usb 1-1: new high-speed USB device number 2 using ehci-platform [ 3.895011] Reserved instruction in kernel code[#1]: [ 3.900113] CPU: 0 PID: 1 Comm: init Not tainted 5.10.16 #0 [ 3.905829] $ 0 : 00000000 10008700 00000000 77d94060 [ 3.911238] $ 4 : 7fd1f088 00000000 81431cac 81431ca0 [ 3.916641] ... • https://git.kernel.org/stable/c/d59098a0e9cb3c7767090e935c909b37a30629ab •
CVSS: -EPSS: 0%CPEs: 4EXPL: 0CVE-2023-53867 – ceph: fix potential use-after-free bug when trimming caps
https://notcve.org/view.php?id=CVE-2023-53867
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: ceph: fix potential use-after-free bug when trimming caps When trimming the caps and just after the 'session->s_cap_lock' is released in ceph_iterate_session_caps() the cap maybe removed by another thread, and when using the stale cap memory in the callbacks it will trigger use-after-free crash. • https://git.kernel.org/stable/c/2f2dc053404febedc9c273452d9d518fb31fde72 •
CVSS: -EPSS: 0%CPEs: 2EXPL: 0CVE-2022-50711 – net: ethernet: mtk_eth_soc: fix possible memory leak in mtk_probe()
https://notcve.org/view.php?id=CVE-2022-50711
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_eth_soc: fix possible memory leak in mtk_probe() If mtk_wed_add_hw() has been called, mtk_wed_exit() needs be called in error path or removing module to free the memory allocated in mtk_wed_add_hw(). • https://git.kernel.org/stable/c/804775dfc2885e93a0a4b35db1914c2cc25172b5 •
CVSS: -EPSS: 0%CPEs: 4EXPL: 0CVE-2022-50710 – ice: set tx_tstamps when creating new Tx rings via ethtool
https://notcve.org/view.php?id=CVE-2022-50710
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: ice: set tx_tstamps when creating new Tx rings via ethtool When the user changes the number of queues via ethtool, the driver allocates new rings. ... The SUSE Linux Enterprise 15 SP5 RT kernel was updated to fix various security issues. • https://git.kernel.org/stable/c/ea9b847cda647b9849b0b9fa0447e876a1ac62e1 •
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2022-50709 – wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg()
https://notcve.org/view.php?id=CVE-2022-50709
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg() syzbot is reporting uninit value at ath9k_htc_rx_msg() [1], for ioctl(USB_RAW_IOCTL_EP_WRITE) can call ath9k_hif_usb_rx_stream() with pkt_len = 0 but ath9k_hif_usb_rx_stream() uses __dev_alloc_skb(pkt_len + 32, GFP_ATOMIC) based on an assumption that pkt_len is valid. ... The SUSE Linux Enterprise 15 SP5 RT kernel was updated to fix various security issues. • https://git.kernel.org/stable/c/fb9987d0f748c983bb795a86f47522313f701a08 •
CVSS: -EPSS: 0%CPEs: 3EXPL: 0CVE-2022-50708 – HSI: ssi_protocol: fix potential resource leak in ssip_pn_open()
https://notcve.org/view.php?id=CVE-2022-50708
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: HSI: ssi_protocol: fix potential resource leak in ssip_pn_open() ssip_pn_open() claims the HSI client's port with hsi_claim_port(). • https://git.kernel.org/stable/c/dc7bf5d7186849aa36b9f0e42e250a813a7b0bdb •
CVSS: -EPSS: 0%CPEs: 3EXPL: 0CVE-2022-50707 – virtio-crypto: fix memory leak in virtio_crypto_alg_skcipher_close_session()
https://notcve.org/view.php?id=CVE-2022-50707
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: virtio-crypto: fix memory leak in virtio_crypto_alg_skcipher_close_session() 'vc_ctrl_req' is alloced in virtio_crypto_alg_skcipher_close_session(), and should be freed in the invalid ctrl_status->status error handling case. • https://git.kernel.org/stable/c/0756ad15b1fef287d4d8fa11bc36ea77a5c42e4a •
