CVSS: -EPSS: 0%CPEs: 3EXPL: 0CVE-2023-54011 – scsi: mpi3mr: Fix an issue found by KASAN
https://notcve.org/view.php?id=CVE-2023-54011
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Fix an issue found by KASAN Write only correct size (32 instead of 64 bytes). • https://git.kernel.org/stable/c/42fc9fee116fc6a225a1f738adf86689d5c39d49 •
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2023-54010 – ACPICA: ACPICA: check null return of ACPI_ALLOCATE_ZEROED in acpi_db_display_objects
https://notcve.org/view.php?id=CVE-2023-54010
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: ACPICA: ACPICA: check null return of ACPI_ALLOCATE_ZEROED in acpi_db_display_objects ACPICA commit 0d5f467d6a0ba852ea3aad68663cbcbd43300fd4 ACPI_ALLOCATE_ZEROED may fails, object_info might be null and will cause null pointer dereference later. • https://git.kernel.org/stable/c/c9fcb2cfcbd4d7018d9f659f5b670f5b727d1968 •
CVSS: -EPSS: 0%CPEs: 6EXPL: 0CVE-2023-54009 – i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path
https://notcve.org/view.php?id=CVE-2023-54009
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path The cdns_i2c_master_xfer() function gets a runtime PM reference when the function is entered. This reference is released when the function is exited. There is currently one error path where the function exits directly, which leads to a leak of the runtime PM reference. Make sure that this error path also releases the runtime PM reference. • https://git.kernel.org/stable/c/1a351b10b9671fc2fac767c40a1c4373b9bf5092 •
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2023-54007 – vmci_host: fix a race condition in vmci_host_poll() causing GPF
https://notcve.org/view.php?id=CVE-2023-54007
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: vmci_host: fix a race condition in vmci_host_poll() causing GPF During fuzzing, a general protection fault is observed in vmci_host_poll(). general protection fault, probably for non-canonical address 0xdffffc0000000019: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x00000000000000c8-0x00000000000000cf] RIP: 0010:__lock_acquire+0xf3/0x5e00 kernel/locking/lockdep.c:4926 <- omitting registers -> Call Trace:
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2023-54006 – af_unix: Fix data-race around unix_tot_inflight.
https://notcve.org/view.php?id=CVE-2023-54006
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix data-race around unix_tot_inflight. unix_tot_inflight is changed under spin_lock(unix_gc_lock), but unix_release_sock() reads it locklessly. Let's use READ_ONCE() for unix_tot_inflight. Note that the writer side was marked by commit 9d6d7f1cb67c ("af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress") BUG: KCSAN: data-race in unix_inflight / unix_release_sock write (marked) to 0xffffffff871852b8 of 4 bytes by... • https://git.kernel.org/stable/c/9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8 •
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2023-54005 – binder: fix memory leak in binder_init()
https://notcve.org/view.php?id=CVE-2023-54005
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: binder: fix memory leak in binder_init() In binder_init(), the destruction of binder_alloc_shrinker_init() is not performed in the wrong path, which will cause memory leaks. So this commit introduces binder_alloc_shrinker_exit() and calls it in the wrong path to fix that. • https://git.kernel.org/stable/c/f2517eb76f1f2f7f89761f9db2b202e89931738c •
CVSS: -EPSS: 0%CPEs: 7EXPL: 0CVE-2023-54004 – udplite: Fix NULL pointer dereference in __sk_mem_raise_allocated().
https://notcve.org/view.php?id=CVE-2023-54004
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: udplite: Fix NULL pointer dereference in __sk_mem_raise_allocated(). syzbot reported [0] a null-ptr-deref in sk_get_rmem0() while using IPPROTO_UDPLITE (0x88): 14:25:52 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) We had a similar report [1] for probably sk_memory_allocated_add() in __sk_mem_raise_allocated(), and commit c915fe13cbaa ("udplite: fix NULL pointer dereference") fixed it by setting .memory_allocated for udplite_pr... • https://git.kernel.org/stable/c/850cbaddb52dfd4e0c7cabe2c168dd34b44ae0b9 •
CVSS: -EPSS: 0%CPEs: 6EXPL: 0CVE-2023-54003 – RDMA/core: Fix GID entry ref leak when create_ah fails
https://notcve.org/view.php?id=CVE-2023-54003
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix GID entry ref leak when create_ah fails If AH create request fails, release sgid_attr to avoid GID entry referrence leak reported while releasing GID table • https://git.kernel.org/stable/c/1a1f460ff151710289c2f8d4badd8b603b87d610 •
CVSS: -EPSS: 0%CPEs: 4EXPL: 0CVE-2023-54002 – btrfs: fix assertion of exclop condition when starting balance
https://notcve.org/view.php?id=CVE-2023-54002
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: btrfs: fix assertion of exclop condition when starting balance Balance as exclusive state is compatible with paused balance and device add, which makes some things more complicated. The assertion of valid states when starting from paused balance needs to take into account two more states, the combinations can be hit when there are several threads racing to start balance and device add. This won't typically happen when the commands are start... • https://git.kernel.org/stable/c/17eaeee4c5f24946aad0298d51f32981c3161d13 •
CVSS: -EPSS: 0%CPEs: 5EXPL: 0CVE-2023-54001 – staging: r8712: Fix memory leak in _r8712_init_xmit_priv()
https://notcve.org/view.php?id=CVE-2023-54001
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: staging: r8712: Fix memory leak in _r8712_init_xmit_priv() In the above mentioned routine, memory is allocated in several places. If the first succeeds and a later one fails, the routine will leak memory. This patch fixes commit 2865d42c78a9 ("staging: r8712u: Add the new driver to the mainline kernel"). A potential memory leak in r8712_xmit_resource_alloc() is also addressed. • https://git.kernel.org/stable/c/2865d42c78a9121caad52cb02d1fbb7f5cdbc4ef •
