CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2023-54265 – ipv6: Fix an uninit variable access bug in __ip6_make_skb()
https://notcve.org/view.php?id=CVE-2023-54265
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix an uninit variable access bug in __ip6_make_skb() Syzbot reported a bug as following: ===================================================== BUG: KMSAN: uninit-value in arch_atomic64_inc arch/x86/include/asm/atomic64_64.h:88 [inline] BUG: KMSAN: uninit-value in arch_atomic_long_inc include/linux/atomic/atomic-long.h:161 [inline] BUG: KMSAN: uninit-value in atomic_long_inc include/linux/atomic/atomic-instrumented.h:1429 [inline] BUG... • https://git.kernel.org/stable/c/14878f75abd5bf1d38becb405801cd491ee215dc •
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2023-54264 – fs/sysv: Null check to prevent null-ptr-deref bug
https://notcve.org/view.php?id=CVE-2023-54264
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: fs/sysv: Null check to prevent null-ptr-deref bug sb_getblk(inode->i_sb, parent) return a null ptr and taking lock on that leads to the null-ptr-deref bug. • https://git.kernel.org/stable/c/e5657933863f43cc6bb76a54d659303dafaa9e58 •
CVSS: -EPSS: 0%CPEs: 2EXPL: 0CVE-2023-54263 – drm/nouveau/kms/nv50-: init hpd_irq_lock for PIOR DP
https://notcve.org/view.php?id=CVE-2023-54263
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: drm/nouveau/kms/nv50-: init hpd_irq_lock for PIOR DP Fixes OOPS on boards with ANX9805 DP encoders. • https://git.kernel.org/stable/c/a0922278f83eae085fdf73d06f71bbdfb9d6789e •
CVSS: -EPSS: 0%CPEs: 4EXPL: 0CVE-2023-54262 – net/mlx5e: Don't clone flow post action attributes second time
https://notcve.org/view.php?id=CVE-2023-54262
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Don't clone flow post action attributes second time The code already clones post action attributes in mlx5e_clone_flow_attr_for_post_act(). Creating another copy in mlx5e_tc_post_act_add() is a erroneous leftover from original implementation. Instead, assign handle->attribute to post_attr provided by the caller. Note that cloning the attribute second time is not just wasteful but also causes issues like second copy not being prop... • https://git.kernel.org/stable/c/8300f225268be9ee2c0daf5a3f23929fcdcbf213 •
CVSS: -EPSS: 0%CPEs: 2EXPL: 0CVE-2023-54261 – drm/amdkfd: Add missing gfx11 MQD manager callbacks
https://notcve.org/view.php?id=CVE-2023-54261
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Add missing gfx11 MQD manager callbacks mqd_stride function was introduced in commit 2f77b9a242a2 ("drm/amdkfd: Update MQD management on multi XCC setup") but not assigned for gfx11. Fixes a NULL dereference in debugfs. • https://git.kernel.org/stable/c/2f77b9a242a2e01822efc80c8b63eaa31df0f8b4 •
CVSS: -EPSS: 0%CPEs: 7EXPL: 0CVE-2023-54260 – cifs: Fix lost destroy smbd connection when MR allocate failed
https://notcve.org/view.php?id=CVE-2023-54260
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: cifs: Fix lost destroy smbd connection when MR allocate failed If the MR allocate failed, the smb direct connection info is NULL, then smbd_destroy() will directly return, then the connection info will be leaked. Let's set the smb direct connection info to the server before call smbd_destroy(). • https://git.kernel.org/stable/c/c7398583340a6d82b8bb7f7f21edcde27dc6a898 •
CVSS: -EPSS: 0%CPEs: 3EXPL: 0CVE-2023-54259 – soundwire: bus: Fix unbalanced pm_runtime_put() causing usage count underflow
https://notcve.org/view.php?id=CVE-2023-54259
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: soundwire: bus: Fix unbalanced pm_runtime_put() causing usage count underflow This reverts commit 443a98e649b4 ("soundwire: bus: use pm_runtime_resume_and_get()") Change calls to pm_runtime_resume_and_get() back to pm_runtime_get_sync(). This fixes a usage count underrun caused by doing a pm_runtime_put() even though pm_runtime_resume_and_get() returned an error. The three affected functions ignore -EACCES error from trying to get pm_runtim... • https://git.kernel.org/stable/c/443a98e649b469b4e6a2832799853a5764ef9002 •
CVSS: -EPSS: 0%CPEs: 4EXPL: 0CVE-2023-54258 – cifs: fix potential oops in cifs_oplock_break
https://notcve.org/view.php?id=CVE-2023-54258
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: cifs: fix potential oops in cifs_oplock_break With deferred close we can have closes that race with lease breaks, and so with the current checks for whether to send the lease response, oplock_response(), this can mean that an unmount (kill_sb) can occur just before we were checking if the tcon->ses is valid. See below: [Fri Aug 4 04:12:50 2023] RIP: 0010:cifs_oplock_break+0x1f7/0x5b0 [cifs] [Fri Aug 4 04:12:50 2023] Code: 7d a8 48 8b 7d c0 ... • https://git.kernel.org/stable/c/63fb45ddc491895c4b36664e0c2c3b548545ae93 •
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2023-54257 – net: macb: fix a memory corruption in extended buffer descriptor mode
https://notcve.org/view.php?id=CVE-2023-54257
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: net: macb: fix a memory corruption in extended buffer descriptor mode For quite some time we were chasing a bug which looked like a sudden permanent failure of networking and mmc on some of our devices. The bug was very sensitive to any software changes and even more to any kernel debug options. Finally we got a setup where the problem was reproducible with CONFIG_DMA_API_DEBUG=y and it revealed the issue with the rx dma: [ 16.992082] -----... • https://git.kernel.org/stable/c/7b4296148066f19b5960127ba579e358df501c22 •
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2023-54255 – sh: dma: Fix DMA channel offset calculation
https://notcve.org/view.php?id=CVE-2023-54255
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: sh: dma: Fix DMA channel offset calculation Various SoCs of the SH3, SH4 and SH4A family, which use this driver, feature a differing number of DMA channels, which can be distributed between up to two DMAC modules. The existing implementation fails to correctly accommodate for all those variations, resulting in wrong channel offset calculations and leading to kernel panics. Rewrite dma_base_addr() in order to properly calculate channel offse... • https://git.kernel.org/stable/c/7f47c7189b3e8f19a589f77a3ad169d7b691b582 •
