CVE-2023-53174
15.09.2025, 14:15
In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix possible memory leak if device_add() fails If device_add() returns error, the name allocated by dev_set_name() needs be freed. As the comment of device_add() says, put_device() should be used to decrease the reference count in the error path. So fix this by calling put_device(), then the name can be freed in kobject_cleanp().Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 2.6.26 ≤ 𝑥 < 4.14.323 |
| linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.292 |
| linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.254 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.191 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.127 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.46 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.4.11 |
| linux | linux_kernel | 6.5:rc1 |
| linux | linux_kernel | 6.5:rc2 |
| linux | linux_kernel | 6.5:rc3 |
| linux | linux_kernel | 6.5:rc4 |
| linux | linux_kernel | 6.5:rc5 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References