CVE-2023-53303
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/09/2025
Last modified:
14/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: microchip: vcap api: Fix possible memory leak for vcap_dup_rule()<br />
<br />
Inject fault When select CONFIG_VCAP_KUNIT_TEST, the below memory leak<br />
occurs. If kzalloc() for duprule succeeds, but the following<br />
kmemdup() fails, the duprule, ckf and caf memory will be leaked. So kfree<br />
them in the error path.<br />
<br />
unreferenced object 0xffff122744c50600 (size 192):<br />
comm "kunit_try_catch", pid 346, jiffies 4294896122 (age 911.812s)<br />
hex dump (first 32 bytes):<br />
10 27 00 00 04 00 00 00 1e 00 00 00 2c 01 00 00 .&#39;..........,...<br />
00 00 00 00 00 00 00 00 18 06 c5 44 27 12 ff ff ...........D&#39;...<br />
backtrace:<br />
[] __kmem_cache_alloc_node+0x274/0x2f8<br />
[] kmalloc_trace+0x38/0x88<br />
[] vcap_dup_rule+0x50/0x460<br />
[] vcap_add_rule+0x8cc/0x1038<br />
[] test_vcap_xn_rule_creator.constprop.0.isra.0+0x238/0x494<br />
[] vcap_api_rule_remove_in_front_test+0x1ac/0x698<br />
[] kunit_try_run_case+0xe0/0x20c<br />
[] kunit_generic_run_threadfn_adapter+0x50/0x94<br />
[] kthread+0x2e8/0x374<br />
[] ret_from_fork+0x10/0x20
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.3 (including) | 6.5.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



