CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 0CVE-2023-53313 – md/raid10: fix wrong setting of max_corr_read_errors
https://notcve.org/view.php?id=CVE-2023-53313
16 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: md/raid10: fix wrong setting of max_corr_read_errors There is no input check when echo md/max_read_errors and overflow might occur. Add check of input number. This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later. • https://git.kernel.org/stable/c/1e50915fe0bbf7a46db0fa7e1e604d3fc95f057d •
CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0CVE-2023-53312 – net: fix net_dev_start_xmit trace event vs skb_transport_offset()
https://notcve.org/view.php?id=CVE-2023-53312
16 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: net: fix net_dev_start_xmit trace event vs skb_transport_offset() After blamed commit, we must be more careful about using skb_transport_offset(), as reminded us by syzbot: WARNING: CPU: 0 PID: 10 at include/linux/skbuff.h:2868 skb_transport_offset include/linux/skbuff.h:2977 [inline] WARNING: CPU: 0 PID: 10 at include/linux/skbuff.h:2868 perf_trace_net_dev_start_xmit+0x89a/0xce0 include/trace/events/net.h:14 Modules linked in: CPU: 0 PID: ... • https://git.kernel.org/stable/c/66e4c8d950083df8e12981babca788e1635c92b6 • CWE-401: Missing Release of Memory after Effective Lifetime •
CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0CVE-2023-53311 – nilfs2: fix use-after-free of nilfs_root in dirtying inodes via iput
https://notcve.org/view.php?id=CVE-2023-53311
16 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix use-after-free of nilfs_root in dirtying inodes via iput During unmount process of nilfs2, nothing holds nilfs_root structure after nilfs2 detaches its writer in nilfs_detach_log_writer(). Previously, nilfs_evict_inode() could cause use-after-free read for nilfs_root if inodes are left in "garbage_list" and released by nilfs_dispose_list at the end of nilfs_detach_log_writer(), and this bug was fixed by commit 9b5a04ac3ad9 ("nil... • https://git.kernel.org/stable/c/0ae45f63d4ef8d8eeec49c7d8b44a1775fff13e8 • CWE-416: Use After Free •
CVSS: 4.7EPSS: 0%CPEs: 3EXPL: 0CVE-2023-53310 – power: supply: axp288_fuel_gauge: Fix external_power_changed race
https://notcve.org/view.php?id=CVE-2023-53310
16 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: power: supply: axp288_fuel_gauge: Fix external_power_changed race fuel_gauge_external_power_changed() dereferences info->bat, which gets sets in axp288_fuel_gauge_probe() like this: info->bat = devm_power_supply_register(dev, &fuel_gauge_desc, &psy_cfg); As soon as devm_power_supply_register() has called device_add() the external_power_changed callback can get called. So there is a window where fuel_gauge_external_power_changed() may get ca... • https://git.kernel.org/stable/c/30abb3d07929137bf72327560e1595508a692c4e • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0CVE-2023-53309 – drm/radeon: Fix integer overflow in radeon_cs_parser_init
https://notcve.org/view.php?id=CVE-2023-53309
16 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Fix integer overflow in radeon_cs_parser_init The type of size is unsigned, if size is 0x40000000, there will be an integer overflow, size will be zero after size *= sizeof(uint32_t), will cause uninitialized memory to be referenced later This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later. • https://git.kernel.org/stable/c/28a326c592e3e444c59f28b3e60c3b07692928d6 • CWE-190: Integer Overflow or Wraparound •
CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0CVE-2023-53308 – net: fec: Better handle pm_runtime_get() failing in .remove()
https://notcve.org/view.php?id=CVE-2023-53308
16 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: net: fec: Better handle pm_runtime_get() failing in .remove() In the (unlikely) event that pm_runtime_get() (disguised as pm_runtime_resume_and_get()) fails, the remove callback returned an error early. The problem with this is that the driver core ignores the error value and continues removing the device. This results in a resource leak. Worse the devm allocated resources are freed and so if a callback of the driver is called later the reg... • https://git.kernel.org/stable/c/982d424239d7fae74938557428d45c717567ea9b • CWE-415: Double Free •
CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0CVE-2023-53307 – rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails
https://notcve.org/view.php?id=CVE-2023-53307
16 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails If getting an ID or setting up a work queue in rbd_dev_create() fails, use-after-free on rbd_dev->rbd_client, rbd_dev->spec and rbd_dev->opts is triggered in do_rbd_add(). The root cause is that the ownership of these structures is transfered to rbd_dev prematurely and they all end up getting freed when rbd_dev_create() calls rbd_dev_free() prior to returning to do_rbd_ad... • https://git.kernel.org/stable/c/1643dfa4c2c827d6e2aa419df8c17b0f24090278 • CWE-416: Use After Free •
CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0CVE-2023-53305 – Bluetooth: L2CAP: Fix use-after-free
https://notcve.org/view.php?id=CVE-2023-53305
16 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix use-after-free Fix potential use-after-free in l2cap_le_command_rej. This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later. • https://git.kernel.org/stable/c/71fb419724fadab4efdf98210aa3fe053bd81d29 • CWE-416: Use After Free •
CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0CVE-2023-53304 – netfilter: nft_set_rbtree: fix overlap expiration walk
https://notcve.org/view.php?id=CVE-2023-53304
16 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: fix overlap expiration walk The lazy gc on insert that should remove timed-out entries fails to release the other half of the interval, if any. Can be reproduced with tests/shell/testcases/sets/0044interval_overlap_0 in nftables.git and kmemleak enabled kernel. Second bug is the use of rbe_prev vs. prev pointer. If rbe_prev() returns NULL after at least one iteration, rbe_prev points to element that is not an end ... • https://git.kernel.org/stable/c/4aacf3d78424293e318c616016865380b37b9cc5 • CWE-476: NULL Pointer Dereference •
CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0CVE-2022-50352 – net: hns: fix possible memory leak in hnae_ae_register()
https://notcve.org/view.php?id=CVE-2022-50352
16 Sep 2025 — In the Linux kernel, the following vulnerability has been resolved: net: hns: fix possible memory leak in hnae_ae_register() Inject fault while probing module, if device_register() fails, but the refcount of kobject is not decreased to 0, the name allocated in dev_set_name() is leaked. Fix this by calling put_device(), so that name can be freed in callback function kobject_cleanup(). unreferenced object 0xffff00c01aba2100 (size 128): comm "systemd-udevd", pid 1259, jiffies 4294903284 (age 294.152s) hex dump... • https://git.kernel.org/stable/c/6fe6611ff275522a4e4c0359e2f46cdd07780d2f • CWE-401: Missing Release of Memory after Effective Lifetime •
