CVSS: -EPSS: 0%CPEs: 4EXPL: 0CVE-2023-54222 – hte: tegra-194: Fix off by one in tegra_hte_map_to_line_id()
https://notcve.org/view.php?id=CVE-2023-54222
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: hte: tegra-194: Fix off by one in tegra_hte_map_to_line_id() The "map_sz" is the number of elements in the "m" array so the > comparison needs to be changed to >= to prevent an out of bounds read. • https://git.kernel.org/stable/c/09574cca6ad649f84ba804caf63a5aefe0202834 •
CVSS: -EPSS: 0%CPEs: 4EXPL: 0CVE-2023-54221 – clk: imx93: fix memory leak and missing unwind goto in imx93_clocks_probe
https://notcve.org/view.php?id=CVE-2023-54221
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: clk: imx93: fix memory leak and missing unwind goto in imx93_clocks_probe In function probe(), it returns directly without unregistered hws when error occurs. Fix this by adding 'goto unregister_hws;' on line 295 and line 310. Use devm_kzalloc() instead of kzalloc() to automatically free the memory using devm_kfree() when error occurs. Replace of_iomap() with devm_of_iomap() to automatically handle the unused ioremap region and delete 'ioun... • https://git.kernel.org/stable/c/24defbe194b650218680fcd9dec8cd103537b531 •
CVSS: -EPSS: 0%CPEs: 9EXPL: 0CVE-2023-54220 – serial: 8250: Fix oops for port->pm on uart_change_pm()
https://notcve.org/view.php?id=CVE-2023-54220
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: serial: 8250: Fix oops for port->pm on uart_change_pm() Unloading a hardware specific 8250 driver can produce error "Unable to handle kernel paging request at virtual address" about ten seconds after unloading the driver. This happens on uart_hangup() calling uart_change_pm(). Turns out commit 04e82793f068 ("serial: 8250: Reinit port->pm on port specific driver unbind") was only a partial fix. If the hardware specific driver has initialized... • https://git.kernel.org/stable/c/490bf37eaabb0a857ed1ae8e75d8854e41662f1c •
CVSS: -EPSS: 0%CPEs: 10EXPL: 0CVE-2023-54219 – Revert "IB/isert: Fix incorrect release of isert connection"
https://notcve.org/view.php?id=CVE-2023-54219
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: Revert "IB/isert: Fix incorrect release of isert connection" Commit: 699826f4e30a ("IB/isert: Fix incorrect release of isert connection") is causing problems on OPA when DEVICE_REMOVAL is happening. ------------[ cut here ]------------ WARNING: CPU: 52 PID: 2117247 at drivers/infiniband/core/cq.c:359 ib_cq_pool_cleanup+0xac/0xb0 [ib_core] Modules linked in: nfsd nfs_acl target_core_user uio tcm_fc libfc scsi_transport_fc tcm_loop target_cor... • https://git.kernel.org/stable/c/ccf5a1b28e2b73952e8d23126fa1abc6ff99de55 •
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2023-54218 – net: Fix load-tearing on sk->sk_stamp in sock_recv_cmsgs().
https://notcve.org/view.php?id=CVE-2023-54218
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: net: Fix load-tearing on sk->sk_stamp in sock_recv_cmsgs(). KCSAN found a data race in sock_recv_cmsgs() where the read access to sk->sk_stamp needs READ_ONCE(). BUG: KCSAN: data-race in packet_recvmsg / packet_recvmsg write (marked) to 0xffff88803c81f258 of 8 bytes by task 19171 on cpu 0: sock_write_timestamp include/net/sock.h:2670 [inline] sock_recv_cmsgs include/net/sock.h:2722 [inline] packet_recvmsg+0xb97/0xd00 net/packet/af_packet.c:... • https://git.kernel.org/stable/c/6c7c98bad4883a4a8710c96b2b44de482865eb6e •
CVSS: -EPSS: 0%CPEs: 2EXPL: 0CVE-2023-54217 – Revert "drm/msm: Add missing check and destroy for alloc_ordered_workqueue"
https://notcve.org/view.php?id=CVE-2023-54217
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: Revert "drm/msm: Add missing check and destroy for alloc_ordered_workqueue" This reverts commit 643b7d0869cc7f1f7a5ac7ca6bd25d88f54e31d0. A recent patch that tried to fix up the msm_drm_init() paths with respect to the workqueue but only ended up making things worse: First, the newly added calls to msm_drm_uninit() on early errors would trigger NULL-pointer dereferences, for example, as the kms pointer would not have been initialised. (Note... • https://git.kernel.org/stable/c/643b7d0869cc7f1f7a5ac7ca6bd25d88f54e31d0 •
CVSS: -EPSS: 0%CPEs: 2EXPL: 0CVE-2023-54216 – net/mlx5e: TC, Fix using eswitch mapping in nic mode
https://notcve.org/view.php?id=CVE-2023-54216
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: TC, Fix using eswitch mapping in nic mode Cited patch is using the eswitch object mapping pool while in nic mode where it isn't initialized. This results in the trace below [0]. Fix that by using either nic or eswitch object mapping pool depending if eswitch is enabled or not. [0]: [ 826.446057] ================================================================== [ 826.446729] BUG: KASAN: slab-use-after-free in mlx5_add_flow_rules+... • https://git.kernel.org/stable/c/6702782845a5bf381a19b204c369e63420041665 •
CVSS: -EPSS: 0%CPEs: 2EXPL: 0CVE-2023-54215 – virtio-vdpa: Fix cpumask memory leak in virtio_vdpa_find_vqs()
https://notcve.org/view.php?id=CVE-2023-54215
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: virtio-vdpa: Fix cpumask memory leak in virtio_vdpa_find_vqs() Free the cpumask allocated by create_affinity_masks() before returning from the function. • https://git.kernel.org/stable/c/3dad56823b5332ffdbe1867b2d7b50fbacea124a •
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2023-54214 – Bluetooth: L2CAP: Fix potential user-after-free
https://notcve.org/view.php?id=CVE-2023-54214
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix potential user-after-free This fixes all instances of which requires to allocate a buffer calling alloc_skb which may release the chan lock and reacquire later which makes it possible that the chan is disconnected in the meantime. • https://git.kernel.org/stable/c/a6a5568c03c4805d4d250f6bd9d468eeeb4ea059 •
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2023-54213 – USB: sisusbvga: Add endpoint checks
https://notcve.org/view.php?id=CVE-2023-54213
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: USB: sisusbvga: Add endpoint checks The syzbot fuzzer was able to provoke a WARNING from the sisusbvga driver: ------------[ cut here ]------------ usb 1-1: BOGUS urb xfer, pipe 3 != type 1 WARNING: CPU: 1 PID: 26 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504 Modules linked in: CPU: 1 PID: 26 Comm: kworker/1:1 Not tainted 6.2.0-rc5-syzkaller-00199-g5af6ce704936 #0 Hardware name: Google Google Compute E... • https://git.kernel.org/stable/c/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 •
