CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0CVE-2023-53468 – ubifs: Fix memory leak in alloc_wbufs()
https://notcve.org/view.php?id=CVE-2023-53468
01 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: ubifs: Fix memory leak in alloc_wbufs() kmemleak reported a sequence of memory leaks, and show them as following: unreferenced object 0xffff8881575f8400 (size 1024): comm "mount", pid 19625, jiffies 4297119604 (age 20.383s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [
CVSS: 7.1EPSS: 0%CPEs: 3EXPL: 0CVE-2023-53467 – wifi: rtw89: fix potential leak in rtw89_append_probe_req_ie()
https://notcve.org/view.php?id=CVE-2023-53467
01 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix potential leak in rtw89_append_probe_req_ie() Do `kfree_skb(new)` before `goto out` to prevent potential leak. • https://git.kernel.org/stable/c/895907779752606f6a4795abfc008509f8e38314 •
CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0CVE-2023-53466 – wifi: mt76: mt7915: fix memory leak in mt7915_mcu_exit
https://notcve.org/view.php?id=CVE-2023-53466
01 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7915: fix memory leak in mt7915_mcu_exit Always purge mcu skb queues in mt7915_mcu_exit routine even if mt7915_firmware_state fails. In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7915: fix memory leak in mt7915_mcu_exit Always purge mcu skb queues in mt7915_mcu_exit routine even if mt7915_firmware_state fails. This update provides the initial livepatch for this kernel update. This update doe... • https://git.kernel.org/stable/c/e57b7901469fc0b021930b83a8094baaf3d81b09 • CWE-772: Missing Release of Resource after Effective Lifetime •
CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0CVE-2023-53465 – soundwire: qcom: fix storing port config out-of-bounds
https://notcve.org/view.php?id=CVE-2023-53465
01 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: soundwire: qcom: fix storing port config out-of-bounds The 'qcom_swrm_ctrl->pconfig' has size of QCOM_SDW_MAX_PORTS (14), however we index it starting from 1, not 0, to match real port numbers. This can lead to writing port config past 'pconfig' bounds and overwriting next member of 'qcom_swrm_ctrl' struct. Reported also by smatch: drivers/soundwire/qcom.c:1269 qcom_swrm_get_port_config() error: buffer overflow 'ctrl->pconfig' 14 <= 14 In t... • https://git.kernel.org/stable/c/9916c02ccd74e672b62dd1a9017ac2f237ebf512 • CWE-787: Out-of-bounds Write •
CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0CVE-2023-53464 – scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param()
https://notcve.org/view.php?id=CVE-2023-53464
01 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param() The validity of sock should be checked before assignment to avoid incorrect values. Commit 57569c37f0ad ("scsi: iscsi: iscsi_tcp: Fix null-ptr-deref while calling getpeername()") introduced this change which may lead to inconsistent values of tcp_sw_conn->sendpage and conn->datadgst_en. Fix the issue by moving the position of the assignment. In the Linux kernel, the followin... • https://git.kernel.org/stable/c/884a788f065578bb640382279a83d1df433b13e6 • CWE-476: NULL Pointer Dereference •
CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0CVE-2023-53463 – ibmvnic: Do not reset dql stats on NON_FATAL err
https://notcve.org/view.php?id=CVE-2023-53463
01 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Do not reset dql stats on NON_FATAL err All ibmvnic resets, make a call to netdev_tx_reset_queue() when re-opening the device. netdev_tx_reset_queue() resets the num_queued and num_completed byte counters. These stats are used in Byte Queue Limit (BQL) algorithms. The difference between these two stats tracks the number of bytes currently sitting on the physical NIC. ibmvnic increases the number of queued bytes though calls to netd... • https://git.kernel.org/stable/c/0d973388185d49add56b81ca82fa5e4348019df8 •
CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0CVE-2023-53462 – hsr: Fix uninit-value access in fill_frame_info()
https://notcve.org/view.php?id=CVE-2023-53462
01 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: hsr: Fix uninit-value access in fill_frame_info() Syzbot reports the following uninit-value access problem. ===================================================== BUG: KMSAN: uninit-value in fill_frame_info net/hsr/hsr_forward.c:601 [inline] BUG: KMSAN: uninit-value in hsr_forward_skb+0x9bd/0x30f0 net/hsr/hsr_forward.c:616 fill_frame_info net/hsr/hsr_forward.c:601 [inline] hsr_forward_skb+0x9bd/0x30f0 net/hsr/hsr_forward.c:616 hsr_dev_xmit+0... • https://git.kernel.org/stable/c/451d8123f89791bb628277c0bdb4cae34a3563e6 •
CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0CVE-2023-53461 – io_uring: wait interruptibly for request completions on exit
https://notcve.org/view.php?id=CVE-2023-53461
01 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: io_uring: wait interruptibly for request completions on exit WHen the ring exits, cleanup is done and the final cancelation and waiting on completions is done by io_ring_exit_work. That function is invoked by kworker, which doesn't take any signals. Because of that, it doesn't really matter if we wait for completions in TASK_INTERRUPTIBLE or TASK_UNINTERRUPTIBLE state. However, it does matter to the hung task detection checker! Normally we ... • https://git.kernel.org/stable/c/2b188cc1bb857a9d4701ae59aa7768b5124e262e •
CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0CVE-2023-53460 – wifi: rtw88: fix memory leak in rtw_usb_probe()
https://notcve.org/view.php?id=CVE-2023-53460
01 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: fix memory leak in rtw_usb_probe() drivers/net/wireless/realtek/rtw88/usb.c:876 rtw_usb_probe() warn: 'hw' from ieee80211_alloc_hw() not released on lines: 811 Fix this by modifying return to a goto statement. In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: fix memory leak in rtw_usb_probe() drivers/net/wireless/realtek/rtw88/usb.c:876 rtw_usb_probe() warn: 'hw' from ieee80211_alloc_hw() not rel... • https://git.kernel.org/stable/c/e3037485c68ec1a299ff41160d8fedbd4abc29b9 •
CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0CVE-2023-53458 – media: cx23885: Fix a null-ptr-deref bug in buffer_prepare() and buffer_finish()
https://notcve.org/view.php?id=CVE-2023-53458
01 Oct 2025 — In the Linux kernel, the following vulnerability has been resolved: media: cx23885: Fix a null-ptr-deref bug in buffer_prepare() and buffer_finish() When the driver calls cx23885_risc_buffer() to prepare the buffer, the function call dma_alloc_coherent may fail, resulting in a empty buffer risc->cpu. Later when we free the buffer or access the buffer, null ptr deref is triggered. This bug is similar to the following one: https://git.linuxtv.org/media_stage.git/commit/?id=2b064d91440b33fba5b452f2d1b31f13ae91... • https://git.kernel.org/stable/c/f0a06203f2fe63f04311467200c99c4ee1926578 •
