-
CVE-2023-53174
- EPSS 0.03%
- Veröffentlicht 15.09.2025 14:04:08
- Zuletzt bearbeitet 15.09.2025 15:22:27
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix possible memory leak if device_add() fails If device_add() returns error, the name allocated by dev_set_name() needs be freed. As the comment of device_add() says, put_device() should be used to decrease the reference count in the error path. So fix this by calling put_device(), then the name can be freed in kobject_cleanp().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
63956ad27a6882f01fea7c69e17823090f4c7b3f
Version
ee959b00c335d7780136c5abda37809191fe52c3
Status
affected
Version <
06c5340858011aa1195aec43a776e3185fbf7f56
Version
ee959b00c335d7780136c5abda37809191fe52c3
Status
affected
Version <
e12fac07f61caac9c5b186d827658b3470787619
Version
ee959b00c335d7780136c5abda37809191fe52c3
Status
affected
Version <
aa9a76d5ffdecd3b52ac333eb89361b0c9fe04e8
Version
ee959b00c335d7780136c5abda37809191fe52c3
Status
affected
Version <
6bc7f4c8c27d526f968788b8a985896755b1df35
Version
ee959b00c335d7780136c5abda37809191fe52c3
Status
affected
Version <
b191ff1f075c4875f11271cbf0093e6e044a12aa
Version
ee959b00c335d7780136c5abda37809191fe52c3
Status
affected
Version <
43c0e16d0c5ec59398b405f4c4aa5a076e656c3f
Version
ee959b00c335d7780136c5abda37809191fe52c3
Status
affected
Version <
04b5b5cb0136ce970333a9c6cec7e46adba1ea3a
Version
ee959b00c335d7780136c5abda37809191fe52c3
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.26
Status
affected
Version <
2.6.26
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.323
Status
unaffected
Version <=
4.19.*
Version
4.19.292
Status
unaffected
Version <=
5.4.*
Version
5.4.254
Status
unaffected
Version <=
5.10.*
Version
5.10.191
Status
unaffected
Version <=
5.15.*
Version
5.15.127
Status
unaffected
Version <=
6.1.*
Version
6.1.46
Status
unaffected
Version <=
6.4.*
Version
6.4.11
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.078 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|