CVE-2023-53436

In the Linux kernel, the following vulnerability has been resolved: scsi: snic: Fix possible memory leak if device_add() fails If device_add() returns error, the name allocated by dev_set_name() needs be freed. As the comment of device_add() says, put_device() should be used to give up the reference in the error path. So fix this by calling put_device(), then the name can be freed in kobject_cleanp().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc5:*:*:*:*:*:*

History

11 Dec 2025, 15:50

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/41320b18a0e0dfb236dba4edb9be12dba1878156 - () https://git.kernel.org/stable/c/41320b18a0e0dfb236dba4edb9be12dba1878156 - Patch
References () https://git.kernel.org/stable/c/461f8ac666fa232afee5ed6420099913ec4e4ba2 - () https://git.kernel.org/stable/c/461f8ac666fa232afee5ed6420099913ec4e4ba2 - Patch
References () https://git.kernel.org/stable/c/58889d5ad74cbc1c9595db74e13522b58b69b0ec - () https://git.kernel.org/stable/c/58889d5ad74cbc1c9595db74e13522b58b69b0ec - Patch
References () https://git.kernel.org/stable/c/7723a5d5d187626c4c640842e522cf4e9e39492e - () https://git.kernel.org/stable/c/7723a5d5d187626c4c640842e522cf4e9e39492e - Patch
References () https://git.kernel.org/stable/c/789275f7c0544374d40bc8d9c81f96751a41df45 - () https://git.kernel.org/stable/c/789275f7c0544374d40bc8d9c81f96751a41df45 - Patch
References () https://git.kernel.org/stable/c/cea09922f5f75652d55b481ee34011fc7f19868b - () https://git.kernel.org/stable/c/cea09922f5f75652d55b481ee34011fc7f19868b - Patch
References () https://git.kernel.org/stable/c/ed0acb1ee2e9322b96611635a9ca9303d15ac76c - () https://git.kernel.org/stable/c/ed0acb1ee2e9322b96611635a9ca9303d15ac76c - Patch
References () https://git.kernel.org/stable/c/f830968d464f55e11bc9260a132fc77daa266aa3 - () https://git.kernel.org/stable/c/f830968d464f55e11bc9260a132fc77daa266aa3 - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CWE CWE-401

18 Sep 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-18 16:15

Updated : 2025-12-11 15:50


NVD link : CVE-2023-53436

Mitre link : CVE-2023-53436

CVE.ORG link : CVE-2023-53436


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime