CVSS: 7.1EPSS: 0%CPEs: 6EXPL: 0CVE-2023-53612 – hwmon: (coretemp) Simplify platform device handling
https://notcve.org/view.php?id=CVE-2023-53612
04 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) Simplify platform device handling Coretemp's platform driver is unconventional. All the real work is done globally by the initcall and CPU hotplug notifiers, while the "driver" effectively just wraps an allocation and the registration of the hwmon interface in a long-winded round-trip through the driver core. The whole logic of dynamically creating and destroying platform devices to bring the interfaces up and down is erro... • https://git.kernel.org/stable/c/e1b370b64031a01bb0c4158ce250073a88921fe1 • CWE-476: NULL Pointer Dereference •
CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0CVE-2023-53611 – ipmi_si: fix a memleak in try_smi_init()
https://notcve.org/view.php?id=CVE-2023-53611
04 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: ipmi_si: fix a memleak in try_smi_init() Kmemleak reported the following leak info in try_smi_init(): unreferenced object 0xffff00018ecf9400 (size 1024): comm "modprobe", pid 2707763, jiffies 4300851415 (age 773.308s) backtrace: [<000000004ca5b312>] __kmalloc+0x4b8/0x7b0 [<00000000953b1072>] try_smi_init+0x148/0x5dc [ipmi_si] [<000000006460d325>] 0xffff800081b10148 [<0000000039206ea5>] do_one_initcall+0x64/0x2a4 [<00000000601399ce>] do_init... • https://git.kernel.org/stable/c/7960f18a56475bf2177c5ff56c72eb4c12c56440 • CWE-771: Missing Reference to Active Allocated Resource •
CVSS: 7.1EPSS: 0%CPEs: 5EXPL: 0CVE-2023-53610 – irqchip: Fix refcount leak in platform_irqchip_probe
https://notcve.org/view.php?id=CVE-2023-53610
04 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: irqchip: Fix refcount leak in platform_irqchip_probe of_irq_find_parent() returns a node pointer with refcount incremented, We should use of_node_put() on it when not needed anymore. Add missing of_node_put() to avoid refcount leak. In the Linux kernel, the following vulnerability has been resolved: irqchip: Fix refcount leak in platform_irqchip_probe of_irq_find_parent() returns a node pointer with refcount incremented, We should use of_no... • https://git.kernel.org/stable/c/f8410e626569324cfe831aaecc0504cafc12b471 •
CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0CVE-2023-53609 – scsi: Revert "scsi: core: Do not increase scsi_device's iorequest_cnt if dispatch failed"
https://notcve.org/view.php?id=CVE-2023-53609
04 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: scsi: Revert "scsi: core: Do not increase scsi_device's iorequest_cnt if dispatch failed" The "atomic_inc(&cmd->device->iorequest_cnt)" in scsi_queue_rq() would cause kernel panic because cmd->device may be freed after returning from scsi_dispatch_cmd(). This reverts commit cfee29ffb45b1c9798011b19d454637d1b0fe87d. In the Linux kernel, the following vulnerability has been resolved: scsi: Revert "scsi: core: Do not increase scsi_device's ior... • https://git.kernel.org/stable/c/cfee29ffb45b1c9798011b19d454637d1b0fe87d • CWE-825: Expired Pointer Dereference •
CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0CVE-2023-53608 – nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread()
https://notcve.org/view.php?id=CVE-2023-53608
04 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread() The finalization of nilfs_segctor_thread() can race with nilfs_segctor_kill_thread() which terminates that thread, potentially causing a use-after-free BUG as KASAN detected. At the end of nilfs_segctor_thread(), it assigns NULL to "sc_task" member of "struct nilfs_sc_info" to indicate the thread has finished, and then notifies nilfs_segctor_kill_thread() of this us... • https://git.kernel.org/stable/c/9ff05123e3bfbb1d2b68ba1d9bf1f7d1dffc1453 •
CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0CVE-2023-53607 – ALSA: ymfpci: Fix BUG_ON in probe function
https://notcve.org/view.php?id=CVE-2023-53607
04 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: ALSA: ymfpci: Fix BUG_ON in probe function The snd_dma_buffer.bytes field now contains the aligned size, which this snd_BUG_ON() did not account for, resulting in the following: [ 9.625915] ------------[ cut here ]------------ [ 9.633440] WARNING: CPU: 0 PID: 126 at sound/pci/ymfpci/ymfpci_main.c:2168 snd_ymfpci_create+0x681/0x698 [snd_ymfpci] [ 9.648926] Modules linked in: snd_ymfpci(+) snd_intel_dspcfg kvm(+) snd_intel_sdw_acpi snd_ac97_c... • https://git.kernel.org/stable/c/4faf4bbc2d600a921052ff45b1b5914d583d9046 • CWE-131: Incorrect Calculation of Buffer Size •
CVSS: 7.1EPSS: 0%CPEs: 5EXPL: 0CVE-2023-53606 – nfsd: clean up potential nfsd_file refcount leaks in COPY codepath
https://notcve.org/view.php?id=CVE-2023-53606
04 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: nfsd: clean up potential nfsd_file refcount leaks in COPY codepath There are two different flavors of the nfsd4_copy struct. One is embedded in the compound and is used directly in synchronous copies. The other is dynamically allocated, refcounted and tracked in the client struture. For the embedded one, the cleanup just involves releasing any nfsd_files held on its behalf. For the async one, the cleanup is a bit more involved, and we need ... • https://git.kernel.org/stable/c/e0639dc5805a9d4faaa2c07ad98fa853b9529dd3 • CWE-911: Improper Update of Reference Count •
CVSS: 7.1EPSS: 0%CPEs: 5EXPL: 0CVE-2023-53605 – drm: amd: display: Fix memory leakage
https://notcve.org/view.php?id=CVE-2023-53605
04 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: drm: amd: display: Fix memory leakage This commit fixes memory leakage in dc_construct_ctx() function. The SUSE Linux Enterprise 15 SP5 RT kernel was updated to fix various security issues. • https://git.kernel.org/stable/c/4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c • CWE-771: Missing Reference to Active Allocated Resource •
CVSS: 7.1EPSS: 0%CPEs: 9EXPL: 0CVE-2023-53604 – dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path
https://notcve.org/view.php?id=CVE-2023-53604
04 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path Otherwise the journal_io_cache will leak if dm_register_target() fails. The SUSE Linux Enterprise 15 SP5 RT kernel was updated to fix various security issues. • https://git.kernel.org/stable/c/7eada909bfd7ac90a4522e56aa3179d1fd68cd14 •
CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0CVE-2023-53603 – scsi: qla2xxx: Avoid fcport pointer dereference
https://notcve.org/view.php?id=CVE-2023-53603
04 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Avoid fcport pointer dereference Klocwork reported warning of NULL pointer may be dereferenced. The routine exits when sa_ctl is NULL and fcport is allocated after the exit call thus causing NULL fcport pointer to dereference at the time of exit. To avoid fcport pointer dereference, exit the routine when sa_ctl is NULL. In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Avoid fcport pointer der... • https://git.kernel.org/stable/c/7b2fbfa4b2cd3a24c1760b85d842e928070d4744 •
