CVSS: -EPSS: 0%CPEs: 5EXPL: 0CVE-2023-54042 – powerpc/64s: Fix VAS mm use after free
https://notcve.org/view.php?id=CVE-2023-54042
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: powerpc/64s: Fix VAS mm use after free The refcount on mm is dropped before the coprocessor is detached. • https://git.kernel.org/stable/c/7bc6f71bdff5f8921e324da0a8fad6f4e2e63a85 •
CVSS: -EPSS: 0%CPEs: 3EXPL: 0CVE-2023-54038 – Bluetooth: hci_conn: return ERR_PTR instead of NULL when there is no link
https://notcve.org/view.php?id=CVE-2023-54038
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_conn: return ERR_PTR instead of NULL when there is no link hci_connect_sco currently returns NULL when there is no link (i.e. when hci_conn_link() returns NULL). sco_connect() expects an ERR_PTR in case of any error (see line 266 in sco.c). Thus, hcon set as NULL passes through to sco_conn_add(), which tries to get hcon->hdev, resulting in dereferencing a NULL pointer as reported by syzkaller. The same issue exists for iso_co... • https://git.kernel.org/stable/c/06149746e7203d5ffe2d6faf9799ee36203aa8b8 •
CVSS: -EPSS: 0%CPEs: 2EXPL: 0CVE-2023-54037 – ice: prevent NULL pointer deref during reload
https://notcve.org/view.php?id=CVE-2023-54037
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: ice: prevent NULL pointer deref during reload Calling ethtool during reload can lead to call trace, because VSI isn't configured for some time, but netdev is alive. To fix it add rtnl lock for VSI deconfig and config. Set ::num_q_vectors to 0 after freeing and add a check for ::tx/rx_rings in ring related ethtool ops. Add proper unroll of filters in ice_start_eth(). Reproduction: $watch -n 0.1 -d 'ethtool -g enp24s0f0np0' $devlink dev reloa... • https://git.kernel.org/stable/c/5b246e533d0177775c64b40a2af1e62aff5d279b •
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2023-54035 – netfilter: nf_tables: fix underflow in chain reference counter
https://notcve.org/view.php?id=CVE-2023-54035
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix underflow in chain reference counter Set element addition error path decrements reference counter on chains twice: once on element release and again via nft_data_release(). Then, d6b478666ffa ("netfilter: nf_tables: fix underflow in object reference counter") incorrectly fixed this by removing the stateful object reference count decrement. Restore the stateful object decrement as in b91d90368837 ("netfilter: nf_tab... • https://git.kernel.org/stable/c/628bd3e49cba1c066228e23d71a852c23e26da73 •
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2023-54032 – btrfs: fix race when deleting quota root from the dirty cow roots list
https://notcve.org/view.php?id=CVE-2023-54032
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: btrfs: fix race when deleting quota root from the dirty cow roots list When disabling quotas we are deleting the quota root from the list fs_info->dirty_cowonly_roots without taking the lock that protects it, which is struct btrfs_fs_info::trans_lock. This unsynchronized list manipulation may cause chaos if there's another concurrent manipulation of this list, such as when adding a root to it with ctree.c:add_root_to_dirty_list(). This can ... • https://git.kernel.org/stable/c/bed92eae26ccf280d1a2168b7509447b56675a27 •
CVSS: -EPSS: 0%CPEs: 3EXPL: 0CVE-2023-54031 – vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check
https://notcve.org/view.php?id=CVE-2023-54031
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check The vdpa_nl_policy structure is used to validate the nlattr when parsing the incoming nlmsg. It will ensure the attribute being described produces a valid nlattr pointer in info->attrs before entering into each handler in vdpa_nl_ops. That is to say, the missing part in vdpa_nl_policy may lead to illegal nlattr after parsing, which could lead to OOB read just like CVE-2023... • https://git.kernel.org/stable/c/13b00b135665c92065a27c0c39dd97e0f380bd4f •
CVSS: -EPSS: 0%CPEs: 2EXPL: 0CVE-2023-54030 – io_uring/net: don't overflow multishot recv
https://notcve.org/view.php?id=CVE-2023-54030
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: io_uring/net: don't overflow multishot recv Don't allow overflowing multishot recv CQEs, it might get out of hand, hurt performance, and in the worst case scenario OOM the task. • https://git.kernel.org/stable/c/b3fdea6ecb55c3ceea866ff66486927e51a982b3 •
CVSS: -EPSS: 0%CPEs: 3EXPL: 0CVE-2023-54027 – iio: core: Prevent invalid memory access when there is no parent
https://notcve.org/view.php?id=CVE-2023-54027
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: iio: core: Prevent invalid memory access when there is no parent Commit 813665564b3d ("iio: core: Convert to use firmware node handle instead of OF node") switched the kind of nodes to use for label retrieval in device registration. Probably an unwanted change in that commit was that if the device has no parent then NULL pointer is accessed. This is what happens in the stock IIO dummy driver when a new entry is created in configfs: # mkdir ... • https://git.kernel.org/stable/c/813665564b3d7c74412fe2877520f1d254ce948a •
CVSS: -EPSS: 0%CPEs: 4EXPL: 0CVE-2023-54026 – opp: Fix use-after-free in lazy_opp_tables after probe deferral
https://notcve.org/view.php?id=CVE-2023-54026
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: opp: Fix use-after-free in lazy_opp_tables after probe deferral When dev_pm_opp_of_find_icc_paths() in _allocate_opp_table() returns -EPROBE_DEFER, the opp_table is freed again, to wait until all the interconnect paths are available. However, if the OPP table is using required-opps then it may already have been added to the global lazy_opp_tables list. The error path does not remove the opp_table from the list again. This can cause crashes ... • https://git.kernel.org/stable/c/7eba0c7641b0009818e469dbfcdd87a0155ab9d4 •
CVSS: -EPSS: 0%CPEs: 6EXPL: 0CVE-2023-54025 – wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled
https://notcve.org/view.php?id=CVE-2023-54025
24 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled In case WoWlan was never configured during the operation of the system, the hw->wiphy->wowlan_config will be NULL. rsi_config_wowlan() checks whether wowlan_config is non-NULL and if it is not, then WARNs about it. The warning is valid, as during normal operation the rsi_config_wowlan() should only ever be called with non-NULL wowlan_config. In shutdown this rsi_config_wowla... • https://git.kernel.org/stable/c/16bbc3eb83728c03138191a5d23d84d38175fa26 •
