CVSS: -EPSS: 0%CPEs: 6EXPL: 0CVE-2023-54267 – powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT
https://notcve.org/view.php?id=CVE-2023-54267
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT lppaca_shared_proc() takes a pointer to the lppaca which is typically accessed through get_lppaca(). With DEBUG_PREEMPT enabled, this leads to checking if preemption is enabled, for example: BUG: using smp_processor_id() in preemptible [00000000] code: grep/10693 caller is lparcfg_data+0x408/0x19a0 CPU: 4 PID: 10693 Comm: grep Not tainted 6.5.0-rc3 #2 Call Trace: dump_stack... • https://git.kernel.org/stable/c/f13c13a005127b5dc5daaca190277a062d946e63 •
CVSS: -EPSS: 0%CPEs: 12EXPL: 0CVE-2023-54266 – media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer()
https://notcve.org/view.php?id=CVE-2023-54266
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer() 'read' is freed when it is known to be NULL, but not when a read error occurs. Revert the logic to avoid a small leak, should a m920x_read() call fail. • https://git.kernel.org/stable/c/82ce3084892c0c0e006ec61f6144f2cc4e5ece88 •
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2023-54265 – ipv6: Fix an uninit variable access bug in __ip6_make_skb()
https://notcve.org/view.php?id=CVE-2023-54265
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix an uninit variable access bug in __ip6_make_skb() Syzbot reported a bug as following: ===================================================== BUG: KMSAN: uninit-value in arch_atomic64_inc arch/x86/include/asm/atomic64_64.h:88 [inline] BUG: KMSAN: uninit-value in arch_atomic_long_inc include/linux/atomic/atomic-long.h:161 [inline] BUG: KMSAN: uninit-value in atomic_long_inc include/linux/atomic/atomic-instrumented.h:1429 [inline] BUG... • https://git.kernel.org/stable/c/14878f75abd5bf1d38becb405801cd491ee215dc •
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2023-54264 – fs/sysv: Null check to prevent null-ptr-deref bug
https://notcve.org/view.php?id=CVE-2023-54264
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: fs/sysv: Null check to prevent null-ptr-deref bug sb_getblk(inode->i_sb, parent) return a null ptr and taking lock on that leads to the null-ptr-deref bug. • https://git.kernel.org/stable/c/e976988bc245ec3768cc0f76bed7d05488a7dd0f •
CVSS: -EPSS: 0%CPEs: 2EXPL: 0CVE-2023-54263 – drm/nouveau/kms/nv50-: init hpd_irq_lock for PIOR DP
https://notcve.org/view.php?id=CVE-2023-54263
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: drm/nouveau/kms/nv50-: init hpd_irq_lock for PIOR DP Fixes OOPS on boards with ANX9805 DP encoders. • https://git.kernel.org/stable/c/92d48ce21645267c574268678131cd2b648dad0f •
CVSS: -EPSS: 0%CPEs: 4EXPL: 0CVE-2023-54262 – net/mlx5e: Don't clone flow post action attributes second time
https://notcve.org/view.php?id=CVE-2023-54262
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Don't clone flow post action attributes second time The code already clones post action attributes in mlx5e_clone_flow_attr_for_post_act(). Creating another copy in mlx5e_tc_post_act_add() is a erroneous leftover from original implementation. Instead, assign handle->attribute to post_attr provided by the caller. Note that cloning the attribute second time is not just wasteful but also causes issues like second copy not being prop... • https://git.kernel.org/stable/c/8300f225268be9ee2c0daf5a3f23929fcdcbf213 •
CVSS: -EPSS: 0%CPEs: 2EXPL: 0CVE-2023-54261 – drm/amdkfd: Add missing gfx11 MQD manager callbacks
https://notcve.org/view.php?id=CVE-2023-54261
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Add missing gfx11 MQD manager callbacks mqd_stride function was introduced in commit 2f77b9a242a2 ("drm/amdkfd: Update MQD management on multi XCC setup") but not assigned for gfx11. Fixes a NULL dereference in debugfs. • https://git.kernel.org/stable/c/399b73d6b7720a9eae68a333193b53ed4f432fe5 •
CVSS: -EPSS: 0%CPEs: 7EXPL: 0CVE-2023-54260 – cifs: Fix lost destroy smbd connection when MR allocate failed
https://notcve.org/view.php?id=CVE-2023-54260
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: cifs: Fix lost destroy smbd connection when MR allocate failed If the MR allocate failed, the smb direct connection info is NULL, then smbd_destroy() will directly return, then the connection info will be leaked. Let's set the smb direct connection info to the server before call smbd_destroy(). • https://git.kernel.org/stable/c/c7398583340a6d82b8bb7f7f21edcde27dc6a898 •
CVSS: -EPSS: 0%CPEs: 3EXPL: 0CVE-2023-54259 – soundwire: bus: Fix unbalanced pm_runtime_put() causing usage count underflow
https://notcve.org/view.php?id=CVE-2023-54259
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: soundwire: bus: Fix unbalanced pm_runtime_put() causing usage count underflow This reverts commit 443a98e649b4 ("soundwire: bus: use pm_runtime_resume_and_get()") Change calls to pm_runtime_resume_and_get() back to pm_runtime_get_sync(). This fixes a usage count underrun caused by doing a pm_runtime_put() even though pm_runtime_resume_and_get() returned an error. The three affected functions ignore -EACCES error from trying to get pm_runtim... • https://git.kernel.org/stable/c/4e5e9da139c007dfc397a159093b4c4187ee67fa •
CVSS: -EPSS: 0%CPEs: 4EXPL: 0CVE-2023-54258 – cifs: fix potential oops in cifs_oplock_break
https://notcve.org/view.php?id=CVE-2023-54258
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: cifs: fix potential oops in cifs_oplock_break With deferred close we can have closes that race with lease breaks, and so with the current checks for whether to send the lease response, oplock_response(), this can mean that an unmount (kill_sb) can occur just before we were checking if the tcon->ses is valid. See below: [Fri Aug 4 04:12:50 2023] RIP: 0010:cifs_oplock_break+0x1f7/0x5b0 [cifs] [Fri Aug 4 04:12:50 2023] Code: 7d a8 48 8b 7d c0 ... • https://git.kernel.org/stable/c/63fb45ddc491895c4b36664e0c2c3b548545ae93 •
