In the Linux kernel, the following vulnerability has been resolved:
dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path
Otherwise the journal_io_cache will leak if dm_register_target() fails.
References
Configurations
Configuration 1 (hide)
|
History
06 Feb 2026, 13:54
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/3877b5c1509b16eeb1f275228fd91789cd88cf17 - Patch | |
| References | () https://git.kernel.org/stable/c/44f29e93a55b544dc961b6f8b4e93abaeaafb9ee - Patch | |
| References | () https://git.kernel.org/stable/c/6b79a428c02769f2a11f8ae76bf866226d134887 - Patch | |
| References | () https://git.kernel.org/stable/c/6d126899b0747305c9d39a0bcf87e0df9c3f555b - Patch | |
| References | () https://git.kernel.org/stable/c/a5d8c6bf58e5b2e70fbc15f3b08dfc1ba6f269ac - Patch | |
| References | () https://git.kernel.org/stable/c/c8c9c50268729bf35f6c9bb1205f490db920454e - Patch | |
| References | () https://git.kernel.org/stable/c/ca8b634fdf07dee3f6dfde57079c4511480b525e - Patch | |
| References | () https://git.kernel.org/stable/c/e09a592fdd6c716506774bdbebb5f6c537b47767 - Patch | |
| References | () https://git.kernel.org/stable/c/ff4d6b5b38429a7731e5593680d2138bf74dd546 - Patch | |
| CWE | NVD-CWE-noinfo | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
04 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-04 16:15
Updated : 2026-02-06 13:54
NVD link : CVE-2023-53604
Mitre link : CVE-2023-53604
CVE.ORG link : CVE-2023-53604
JSON object : View
Products Affected
linux
- linux_kernel
CWE
