-

CVE-2023-53174

In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Fix possible memory leak if device_add() fails

If device_add() returns error, the name allocated by dev_set_name() needs
be freed. As the comment of device_add() says, put_device() should be used
to decrease the reference count in the error path. So fix this by calling
put_device(), then the name can be freed in kobject_cleanp().

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 63956ad27a6882f01fea7c69e17823090f4c7b3f
Version ee959b00c335d7780136c5abda37809191fe52c3
Status affected
Version < 06c5340858011aa1195aec43a776e3185fbf7f56
Version ee959b00c335d7780136c5abda37809191fe52c3
Status affected
Version < e12fac07f61caac9c5b186d827658b3470787619
Version ee959b00c335d7780136c5abda37809191fe52c3
Status affected
Version < aa9a76d5ffdecd3b52ac333eb89361b0c9fe04e8
Version ee959b00c335d7780136c5abda37809191fe52c3
Status affected
Version < 6bc7f4c8c27d526f968788b8a985896755b1df35
Version ee959b00c335d7780136c5abda37809191fe52c3
Status affected
Version < b191ff1f075c4875f11271cbf0093e6e044a12aa
Version ee959b00c335d7780136c5abda37809191fe52c3
Status affected
Version < 43c0e16d0c5ec59398b405f4c4aa5a076e656c3f
Version ee959b00c335d7780136c5abda37809191fe52c3
Status affected
Version < 04b5b5cb0136ce970333a9c6cec7e46adba1ea3a
Version ee959b00c335d7780136c5abda37809191fe52c3
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.26
Status affected
Version < 2.6.26
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.323
Status unaffected
Version <= 4.19.*
Version 4.19.292
Status unaffected
Version <= 5.4.*
Version 5.4.254
Status unaffected
Version <= 5.10.*
Version 5.10.191
Status unaffected
Version <= 5.15.*
Version 5.15.127
Status unaffected
Version <= 6.1.*
Version 6.1.46
Status unaffected
Version <= 6.4.*
Version 6.4.11
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String