CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0CVE-2023-53817 – crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
https://notcve.org/view.php?id=CVE-2023-53817
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() During NVMeTCP Authentication a controller can trigger a kernel oops by specifying the 8192 bit Diffie Hellman group and passing a correctly sized, but zeroed Diffie Hellamn value. mpi_cmp_ui() was detecting this if the second parameter was 0, but 1 is passed from dh_is_pubkey_valid(). This causes the null pointer u->d to be dereferenced towards the end of mpi_cmp_ui() In the Linux ... • https://git.kernel.org/stable/c/12f008b6dc5ff1c822fdb2198d20e3dbdc92f3f5 •
CVSS: 7.1EPSS: 0%CPEs: 3EXPL: 0CVE-2023-53816 – drm/amdkfd: fix potential kgd_mem UAFs
https://notcve.org/view.php?id=CVE-2023-53816
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: fix potential kgd_mem UAFs kgd_mem pointers returned by kfd_process_device_translate_handle are only guaranteed to be valid while p->mutex is held. As soon as the mutex is unlocked, another thread can free the BO. In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: fix potential kgd_mem UAFs kgd_mem pointers returned by kfd_process_device_translate_handle are only guaranteed to be valid while p->mutex... • https://git.kernel.org/stable/c/4a488a7ad71401169cecee75dc94bcce642e2c53 •
CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0CVE-2023-53815 – posix-timers: Prevent RT livelock in itimer_delete()
https://notcve.org/view.php?id=CVE-2023-53815
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: posix-timers: Prevent RT livelock in itimer_delete() itimer_delete() has a retry loop when the timer is concurrently expired. On non-RT kernels this just spin-waits until the timer callback has completed, except for posix CPU timers which have HAVE_POSIX_CPU_TIMERS_TASK_WORK enabled. In that case and on RT kernels the existing task could live lock when preempting the task which does the timer delivery. Replace spin_unlock() with an invocati... • https://git.kernel.org/stable/c/ec8f954a40da8cd3d159713b608e901f0cd909a9 •
CVSS: 6.6EPSS: 0%CPEs: 3EXPL: 0CVE-2023-53814 – PCI: Fix dropping valid root bus resources with .end = zero
https://notcve.org/view.php?id=CVE-2023-53814
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: PCI: Fix dropping valid root bus resources with .end = zero On r8a7791/koelsch: kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) # cat /sys/kernel/debug/kmemleak unreferenced object 0xc3a34e00 (size 64): comm "swapper/0", pid 1, jiffies 4294937460 (age 199.080s) hex dump (first 32 bytes): b4 5d 81 f0 b4 5d 81 f0 c0 b0 a2 c3 00 00 00 00 .]...].......... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ b... • https://git.kernel.org/stable/c/7c3855c423b17f6ca211858afb0cef20569914c7 •
CVSS: 8.0EPSS: 0%CPEs: 2EXPL: 0CVE-2023-53813 – ext4: fix rbtree traversal bug in ext4_mb_use_preallocated
https://notcve.org/view.php?id=CVE-2023-53813
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: ext4: fix rbtree traversal bug in ext4_mb_use_preallocated During allocations, while looking for preallocations(PA) in the per inode rbtree, we can't do a direct traversal of the tree because ext4_mb_discard_group_preallocation() can paralelly mark the pa deleted and that can cause direct traversal to skip some entries. This was leading to a BUG_ON() being hit [1] when we missed a PA that could satisfy our request and ultimately tried to cr... • https://git.kernel.org/stable/c/3872778664e36528caf8b27f355e75482f6d562d •
CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0CVE-2023-53812 – media: mediatek: vcodec: fix decoder disable pm crash
https://notcve.org/view.php?id=CVE-2023-53812
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: media: mediatek: vcodec: fix decoder disable pm crash Can't call pm_runtime_disable when the architecture support sub device for 'dev->pm.dev' is NUll, or will get below crash log. [ 10.771551] pc : _raw_spin_lock_irq+0x4c/0xa0 [ 10.771556] lr : __pm_runtime_disable+0x30/0x130 [ 10.771558] sp : ffffffc01e4cb800 [ 10.771559] x29: ffffffc01e4cb800 x28: ffffffdf082108a8 [ 10.771563] x27: ffffffc01e4cbd70 x26: ffffff8605df55f0 [ 10.771567] x25:... • https://git.kernel.org/stable/c/ba31a5b39400a7b500b3f022a351218b179038dc •
CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0CVE-2023-53811 – RDMA/irdma: Cap MSIX used to online CPUs + 1
https://notcve.org/view.php?id=CVE-2023-53811
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Cap MSIX used to online CPUs + 1 The irdma driver can use a maximum number of msix vectors equal to num_online_cpus() + 1 and the kernel warning stack below is shown if that number is exceeded. The kernel throws a warning as the driver tries to update the affinity hint with a CPU mask greater than the max CPU IDs. Fix this by capping the MSIX vectors to num_online_cpus() + 1. WARNING: CPU: 7 PID: 23655 at include/linux/cpumask.h... • https://git.kernel.org/stable/c/44d9e52977a1b90b0db1c7f8b197c218e9226520 •
CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0CVE-2023-53810 – blk-mq: release crypto keyslot before reporting I/O complete
https://notcve.org/view.php?id=CVE-2023-53810
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: blk-mq: release crypto keyslot before reporting I/O complete Once all I/O using a blk_crypto_key has completed, filesystems can call blk_crypto_evict_key(). However, the block layer currently doesn't call blk_crypto_put_keyslot() until the request is being freed, which happens after upper layers have been told (via bio_endio()) the I/O has completed. This causes a race condition where blk_crypto_evict_key() can see 'slot_refs != 0' without ... • https://git.kernel.org/stable/c/a892c8d52c02284076fbbacae6692aa5c5807d11 •
CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0CVE-2023-53809 – l2tp: Avoid possible recursive deadlock in l2tp_tunnel_register()
https://notcve.org/view.php?id=CVE-2023-53809
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: l2tp: Avoid possible recursive deadlock in l2tp_tunnel_register() When a file descriptor of pppol2tp socket is passed as file descriptor of UDP socket, a recursive deadlock occurs in l2tp_tunnel_register(). This situation is reproduced by the following program: int main(void) { int sock; struct sockaddr_pppol2tp addr; sock = socket(AF_PPPOX, SOCK_DGRAM, PX_PROTO_OL2TP); if (sock < 0) { perror("socket"); return 1; } addr.sa_family = AF_PPPOX... • https://git.kernel.org/stable/c/2d77e5c0ad79004b5ef901895437e9cce6dfcc7e •
CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0CVE-2023-53808 – wifi: mwifiex: fix memory leak in mwifiex_histogram_read()
https://notcve.org/view.php?id=CVE-2023-53808
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: fix memory leak in mwifiex_histogram_read() Always free the zeroed page on return from 'mwifiex_histogram_read()'. • https://git.kernel.org/stable/c/cbf6e05527a7654ac1c4f4787dfd7a182fcc0c73 •
