
CVE-2023-53262 – f2fs: fix scheduling while atomic in decompression path
https://notcve.org/view.php?id=CVE-2023-53262
15 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: f2fs: fix scheduling while atomic in decompression path [ 16.945668][ C0] Call trace: [ 16.945678][ C0] dump_backtrace+0x110/0x204 [ 16.945706][ C0] dump_stack_lvl+0x84/0xbc [ 16.945735][ C0] __schedule_bug+0xb8/0x1ac [ 16.945756][ C0] __schedule+0x724/0xbdc [ 16.945778][ C0] schedule+0x154/0x258 [ 16.945793][ C0] bit_wait_io+0x48/0xa4 [ 16.945808][ C0] out_of_line_wait_on_bit+0x114/0x198 [ 16.945824][ C0] __sync_dirty_buffer+0x1f8/0x2e8 [ ... • https://git.kernel.org/stable/c/bff139b49d9f70c1ac5384aac94554846aa834de •

CVE-2023-53261 – coresight: Fix memory leak in acpi_buffer->pointer
https://notcve.org/view.php?id=CVE-2023-53261
15 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: coresight: Fix memory leak in acpi_buffer->pointer There are memory leaks reported by kmemleak: ... unreferenced object 0xffff00213c141000 (size 1024): comm "systemd-udevd", pid 2123, jiffies 4294909467 (age 6062.160s) hex dump (first 32 bytes): 04 00 00 00 02 00 00 00 18 10 14 3c 21 00 ff ff ...........] __kmem_cache_alloc_node+0x2f8/0x348 ... • https://git.kernel.org/stable/c/76ffa5ab5b79c250b9744b7f8bdd835db426a1ae • CWE-772: Missing Release of Resource after Effective Lifetime •

CVE-2023-53260 – ovl: fix null pointer dereference in ovl_permission()
https://notcve.org/view.php?id=CVE-2023-53260
15 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: ovl: fix null pointer dereference in ovl_permission() Following process: P1 P2 path_lookupat link_path_walk inode_permission ovl_permission ovl_i_path_real(inode, &realpath) path->dentry = ovl_i_dentry_upper(inode) drop_cache __dentry_kill(ovl_dentry) iput(ovl_inode) ovl_destroy_inode(ovl_inode) dput(oi->__upperdentry) dentry_kill(upperdentry) dentry_unlink_inode upperdentry->d_inode = NULL realinode = d_inode(realpath.dentry) // return NUL... • https://git.kernel.org/stable/c/4b7791b2e95805eaa9568761741d33cf929c930c • CWE-476: NULL Pointer Dereference •

CVE-2023-53259 – VMCI: check context->notify_page after call to get_user_pages_fast() to avoid GPF
https://notcve.org/view.php?id=CVE-2023-53259
15 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: VMCI: check context->notify_page after call to get_user_pages_fast() to avoid GPF The call to get_user_pages_fast() in vmci_host_setup_notify() can return NULL context->notify_page causing a GPF. To avoid GPF check if context->notify_page == NULL and return error if so. general protection fault, probably for non-canonical address 0xe0009d1000000060: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: maybe wild-memory-access in range [0x00050880000003... • https://git.kernel.org/stable/c/a1d88436d53a75e950db15834b3d2f8c0c358fdc •

CVE-2023-53258 – drm/amd/display: Fix possible underflow for displays with large vblank
https://notcve.org/view.php?id=CVE-2023-53258
15 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix possible underflow for displays with large vblank [Why] Underflow observed when using a display with a large vblank region and low refresh rate [How] Simplify calculation of vblank_nom Increase value for VBlankNomDefaultUS to 800us In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix possible underflow for displays with large vblank [Why] Underflow observed when using a display with a... • https://git.kernel.org/stable/c/4c3861f587400db00801810eb8034c7b480e21dd • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2023-53257 – wifi: mac80211: check S1G action frame size
https://notcve.org/view.php?id=CVE-2023-53257
15 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check S1G action frame size Before checking the action code, check that it even exists in the frame. In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check S1G action frame size Before checking the action code, check that it even exists in the frame. • https://git.kernel.org/stable/c/fedd9377dd9c71a950d432fbe1628eebfbed70a1 •

CVE-2023-53256 – firmware: arm_ffa: Fix FFA device names for logical partitions
https://notcve.org/view.php?id=CVE-2023-53256
15 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: firmware: arm_ffa: Fix FFA device names for logical partitions Each physical partition can provide multiple services each with UUID. Each such service can be presented as logical partition with a unique combination of VM ID and UUID. The number of distinct UUID in a system will be less than or equal to the number of logical partitions. However, currently it fails to register more than one logical partition or service within a physical parti... • https://git.kernel.org/stable/c/e781858488b918e30a6ff28e9eab6058b787e3b3 •

CVE-2023-53255 – firmware: stratix10-svc: Fix a potential resource leak in svc_create_memory_pool()
https://notcve.org/view.php?id=CVE-2023-53255
15 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: firmware: stratix10-svc: Fix a potential resource leak in svc_create_memory_pool() svc_create_memory_pool() is only called from stratix10_svc_drv_probe(). Most of resources in the probe are managed, but not this memremap() call. There is also no memunmap() call in the file. So switch to devm_memremap() to avoid a resource leak. In the Linux kernel, the following vulnerability has been resolved: firmware: stratix10-svc: Fix a potential resou... • https://git.kernel.org/stable/c/7ca5ce896524f5292e610b27d168269e5ab74951 •

CVE-2023-53254 – cacheinfo: Fix shared_cpu_map to handle shared caches at different levels
https://notcve.org/view.php?id=CVE-2023-53254
15 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: cacheinfo: Fix shared_cpu_map to handle shared caches at different levels The cacheinfo sets up the shared_cpu_map by checking whether the caches with the same index are shared between CPUs. However, this will trigger slab-out-of-bounds access if the CPUs do not have the same cache hierarchy. Another problem is the mismatched shared_cpu_map when the shared cache does not have the same index between CPUs. CPU0 I D L3 index 0 1 2 x ^ ^ ^ ^ in... • https://git.kernel.org/stable/c/2f588d0345d69a35e451077afed428fd057a5e34 •

CVE-2023-53253 – HID: nvidia-shield: Reference hid_device devm allocation of input_dev name
https://notcve.org/view.php?id=CVE-2023-53253
15 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: HID: nvidia-shield: Reference hid_device devm allocation of input_dev name Use hid_device for devm allocation of the input_dev name to avoid a use-after-free. input_unregister_device would trigger devres cleanup of all resources associated with the input_dev, free-ing the name. The name would subsequently be used in a uevent fired at the end of unregistering the input_dev. In the Linux kernel, the following vulnerability has been resolved: ... • https://git.kernel.org/stable/c/09308562d4afb1abc66366608fa1cb9de783272f •