CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0CVE-2023-53792 – nvme-core: fix memory leak in dhchap_ctrl_secret
https://notcve.org/view.php?id=CVE-2023-53792
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: nvme-core: fix memory leak in dhchap_ctrl_secret Free dhchap_secret in nvme_ctrl_dhchap_ctrl_secret_store() before we return when nvme_auth_generate_key() returns error. In the Linux kernel, the following vulnerability has been resolved: nvme-core: fix memory leak in dhchap_ctrl_secret Free dhchap_secret in nvme_ctrl_dhchap_ctrl_secret_store() before we return when nvme_auth_generate_key() returns error. • https://git.kernel.org/stable/c/f50fff73d620cd6e8f48bc58d4f1c944615a3fea •
CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 0CVE-2023-53786 – dm flakey: fix a crash with invalid table line
https://notcve.org/view.php?id=CVE-2023-53786
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: dm flakey: fix a crash with invalid table line This command will crash with NULL pointer dereference: dmsetup create flakey --table \ "0 `blockdev --getsize /dev/ram0` flakey /dev/ram0 0 0 1 2 corrupt_bio_byte 512" Fix the crash by checking if arg_name is non-NULL before comparing it. • https://git.kernel.org/stable/c/f95cb1526669ccdf7eb12eefd57a893953e3595f •
CVSS: 6.6EPSS: 0%CPEs: 3EXPL: 0CVE-2023-53785 – mt76: mt7921: don't assume adequate headroom for SDIO headers
https://notcve.org/view.php?id=CVE-2023-53785
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: mt76: mt7921: don't assume adequate headroom for SDIO headers mt7921_usb_sdio_tx_prepare_skb() calls mt7921_usb_sdio_write_txwi() and mt7921_skb_add_usb_sdio_hdr(), both of which blindly assume that adequate headroom will be available in the passed skb. This assumption typically is satisfied when the skb was allocated in the net core for transmission via the mt7921 netdev (although even that is only an optimization and is not strictly guara... • https://git.kernel.org/stable/c/e0f9fdda81bd32371ddac9222487e612027d8de2 •
CVSS: 7.1EPSS: 0%CPEs: 21EXPL: 0CVE-2023-53782 – dccp: Fix out of bounds access in DCCP error handler
https://notcve.org/view.php?id=CVE-2023-53782
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: dccp: Fix out of bounds access in DCCP error handler There was a previous attempt to fix an out-of-bounds access in the DCCP error handlers, but that fix assumed that the error handlers only want to access the first 8 bytes of the DCCP header. Actually, they also look at the DCCP sequence number, which is stored beyond 8 bytes, so an explicit pskb_may_pull() is required. In the Linux kernel, the following vulnerability has been resolved: dc... • https://git.kernel.org/stable/c/6706a97fec963d6cb3f7fc2978ec1427b4651214 •
CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0CVE-2023-53779 – mfd: dln2: Fix memory leak in dln2_probe()
https://notcve.org/view.php?id=CVE-2023-53779
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: mfd: dln2: Fix memory leak in dln2_probe() When dln2_setup_rx_urbs() in dln2_probe() fails, error out_free forgets to call usb_put_dev() to decrease the refcount of dln2->usb_dev. Fix this by adding usb_put_dev() in the error handling code of dln2_probe(). In the Linux kernel, the following vulnerability has been resolved: mfd: dln2: Fix memory leak in dln2_probe() When dln2_setup_rx_urbs() in dln2_probe() fails, error out_free forgets to c... • https://git.kernel.org/stable/c/aa5a8673d71124e7dcdd497ec2accebc15bd6ca3 •
CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0CVE-2023-53777 – erofs: kill hooked chains to avoid loops on deduplicated compressed images
https://notcve.org/view.php?id=CVE-2023-53777
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: erofs: kill hooked chains to avoid loops on deduplicated compressed images After heavily stressing EROFS with several images which include a hand-crafted image of repeated patterns for more than 46 days, I found two chains could be linked with each other almost simultaneously and form a loop so that the entire loop won't be submitted. As a consequence, the corresponding file pages will remain locked forever. It can be _only_ observed on dat... • https://git.kernel.org/stable/c/267f2492c8f71dac44399988b510f9bf6b074a51 •
CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0CVE-2023-53769 – virt/coco/sev-guest: Double-buffer messages
https://notcve.org/view.php?id=CVE-2023-53769
08 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: virt/coco/sev-guest: Double-buffer messages The encryption algorithms read and write directly to shared unencrypted memory, which may leak information as well as permit the host to tamper with the message integrity. Instead, copy whole messages in or out as needed before doing any computation on them. In the Linux kernel, the following vulnerability has been resolved: virt/coco/sev-guest: Double-buffer messages The encryption algorithms rea... • https://git.kernel.org/stable/c/d5af44dde5461d125d1602ac913ab5c6bdf09b8b •
CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0CVE-2023-53768 – regmap-irq: Fix out-of-bounds access when allocating config buffers
https://notcve.org/view.php?id=CVE-2023-53768
08 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: regmap-irq: Fix out-of-bounds access when allocating config buffers When allocating the 2D array for handling IRQ type registers in regmap_add_irq_chip_fwnode(), the intent is to allocate a matrix with num_config_bases rows and num_config_regs columns. This is currently handled by allocating a buffer to hold a pointer for each row (i.e. num_config_bases). After that, the logic attempts to allocate the memory required to hold the register co... • https://git.kernel.org/stable/c/faa87ce9196dbb074d75bd4aecb8bacf18f19b4e •
CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0CVE-2023-53767 – wifi: ath12k: fix memory leak in ath12k_qmi_driver_event_work()
https://notcve.org/view.php?id=CVE-2023-53767
08 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix memory leak in ath12k_qmi_driver_event_work() Currently the buffer pointed by event is not freed in case ATH12K_FLAG_UNREGISTERING bit is set, this causes memory leak. Add a goto skip instead of return, to ensure event and all the list entries are freed properly. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1 In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix memor... • https://git.kernel.org/stable/c/d889913205cf7ebda905b1e62c5867ed4e39f6c2 •
CVSS: 7.1EPSS: 0%CPEs: 8EXPL: 0CVE-2023-53766 – FS: JFS: Check for read-only mounted filesystem in txBegin
https://notcve.org/view.php?id=CVE-2023-53766
08 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: FS: JFS: Check for read-only mounted filesystem in txBegin This patch adds a check for read-only mounted filesystem in txBegin before starting a transaction potentially saving from NULL pointer deref. • https://git.kernel.org/stable/c/a88efca805bea93cea9187dfd00835aa7093bf1b •
