CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0CVE-2023-53711 – NFS: Fix a potential data corruption
https://notcve.org/view.php?id=CVE-2023-53711
22 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: NFS: Fix a potential data corruption We must ensure that the subrequests are joined back into the head before we can retransmit a request. If the head was not on the commit lists, because the server wrote it synchronously, we still need to add it back to the retransmission list. Add a call that mirrors the effect of nfs_cancel_remove_inode() for O_DIRECT. In the Linux kernel, the following vulnerability has been resolved: NFS: Fix a potenti... • https://git.kernel.org/stable/c/ed5d588fe47feef290f271022820e255d8371561 •
CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0CVE-2023-53710 – wifi: mt76: mt7921: fix error code of return in mt7921_acpi_read
https://notcve.org/view.php?id=CVE-2023-53710
22 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921: fix error code of return in mt7921_acpi_read Kernel NULL pointer dereference when ACPI SAR table isn't implemented well. Fix the error code of return to mark the ACPI SAR table as invalid. [ 5.077128] mt7921e 0000:06:00.0: sar cnt = 0 [ 5.077381] BUG: kernel NULL pointer dereference, address: 0000000000000004 [ 5.077630] #PF: supervisor read access in kernel mode [ 5.077883] #PF: error_code(0x0000) - not-present page [ 5... • https://git.kernel.org/stable/c/f965333e491e36adb0fa91e389fba8685b704fb6 •
CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0CVE-2023-53709 – ring-buffer: Handle race between rb_move_tail and rb_check_pages
https://notcve.org/view.php?id=CVE-2023-53709
22 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Handle race between rb_move_tail and rb_check_pages It seems a data race between ring_buffer writing and integrity check. That is, RB_FLAG of head_page is been updating, while at same time RB_FLAG was cleared when doing integrity check rb_check_pages(): rb_check_pages() rb_handle_head_page(): -------- -------- rb_head_page_deactivate() rb_head_page_set_normal() rb_head_page_activate() We do intergrity test of the list to check ... • https://git.kernel.org/stable/c/1039221cc2787dee51a7ffbf9b0e79d192dadf76 •
CVSS: 6.6EPSS: 0%CPEs: 4EXPL: 0CVE-2023-53708 – ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects
https://notcve.org/view.php?id=CVE-2023-53708
22 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects If a badly constructed firmware includes multiple `ACPI_TYPE_PACKAGE` objects while evaluating the AMD LPS0 _DSM, there will be a memory leak. Explicitly guard against this. In the Linux kernel, the following vulnerability has been resolved: ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects If a badly constructed firmware includes multiple `ACPI_TYPE_PACKAGE` objects whil... • https://git.kernel.org/stable/c/7b7964cd9db30bc84808a40d13a0633b4313f149 •
CVSS: 7.1EPSS: 0%CPEs: 3EXPL: 0CVE-2023-53707 – drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1
https://notcve.org/view.php?id=CVE-2023-53707
22 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1 The type of size is unsigned int, if size is 0x40000000, there will be an integer overflow, size will be zero after size *= sizeof(uint32_t), will cause uninitialized memory to be referenced later. In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1 The type of size is unsigned int, if size is 0x40000000, there will be an ... • https://git.kernel.org/stable/c/9f55d300541cb5b435984d269087810581580b00 •
CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0CVE-2023-53706 – mm/vmemmap/devdax: fix kernel crash when probing devdax devices
https://notcve.org/view.php?id=CVE-2023-53706
22 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: mm/vmemmap/devdax: fix kernel crash when probing devdax devices commit 4917f55b4ef9 ("mm/sparse-vmemmap: improve memory savings for compound devmaps") added support for using optimized vmmemap for devdax devices. But how vmemmap mappings are created are architecture specific. For example, powerpc with hash translation doesn't have vmemmap mappings in init_mm page table instead they are bolted table entries in the hardware page table vmemmap... • https://git.kernel.org/stable/c/4917f55b4ef963e2d2288fe4eb651728be8db406 •
CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0CVE-2023-53705 – ipv6: Fix out-of-bounds access in ipv6_find_tlv()
https://notcve.org/view.php?id=CVE-2023-53705
22 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix out-of-bounds access in ipv6_find_tlv() optlen is fetched without checking whether there is more than one byte to parse. It can lead to out-of-bounds access. Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE. In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix out-of-bounds access in ipv6_find_tlv() optlen is fetched without checking whether there is more than one byte... • https://git.kernel.org/stable/c/c61a404325093250b676f40ad8f4dd00f3bcab5f •
CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0CVE-2023-53704 – clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe()
https://notcve.org/view.php?id=CVE-2023-53704
22 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe() Replace of_iomap() and kzalloc() with devm_of_iomap() and devm_kzalloc() which can automatically release the related memory when the device or driver is removed or unloaded to avoid potential memory leak. In this case, iounmap(anatop_base) in line 427,433 are removed as manual release is not required. Besides, referring to clk-imx8mq.c, check the return code of of_clk_add... • https://git.kernel.org/stable/c/9c140d9926761b0f5d329ff6c09a1540f3d5e1d3 •
CVSS: 7.1EPSS: 0%CPEs: 3EXPL: 0CVE-2023-53703 – HID: amd_sfh: Fix for shift-out-of-bounds
https://notcve.org/view.php?id=CVE-2023-53703
22 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: HID: amd_sfh: Fix for shift-out-of-bounds Shift operation of 'exp' and 'shift' variables exceeds the maximum number of shift values in the u32 range leading to UBSAN shift-out-of-bounds. ... [ 6.120512] UBSAN: shift-out-of-bounds in drivers/hid/amd-sfh-hid/sfh1_1/amd_sfh_desc.c:149:50 [ 6.120598] shift exponent 104 is too large for 64-bit type 'long unsigned int' [ 6.120659] CPU: 4 PID: 96 Comm: kworker/4:1 Not tainted 6.4.0amd_1-next-20230... • https://git.kernel.org/stable/c/93ce5e0231d79189be4d9e5f9295807b18941419 •
CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0CVE-2023-53702 – s390/crypto: use vector instructions only if available for ChaCha20
https://notcve.org/view.php?id=CVE-2023-53702
22 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: s390/crypto: use vector instructions only if available for ChaCha20 Commit 349d03ffd5f6 ("crypto: s390 - add crypto library interface for ChaCha20") added a library interface to the s390 specific ChaCha20 implementation. However no check was added to verify if the required facilities are installed before branching into the assembler code. If compiled into the kernel, this will lead to the following crash, if vector instructions are not avai... • https://git.kernel.org/stable/c/349d03ffd5f62c298fd667ffa397c3fdc5c6194b •
