In the Linux kernel, the following vulnerability has been resolved:
scsi: core: Fix possible memory leak if device_add() fails
If deviceadd() returns error, the name allocated by devsetname() needs be freed. As the comment of deviceadd() says, putdevice() should be used to decrease the reference count in the error path. So fix this by calling putdevice(), then the name can be freed in kobject_cleanp().
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53174.json",
"cna_assigner": "Linux"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53174.json"
[
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"331355488251686598618331535171075402041",
"322906359292026977472863289890313722431",
"24195545856296331240857171294563041100",
"129050091525010964757441877905514686554"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@43c0e16d0c5ec59398b405f4c4aa5a076e656c3f",
"signature_type": "Line",
"id": "CVE-2023-53174-150de922",
"target": {
"file": "drivers/scsi/raid_class.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "22005716464499101979168972329010526362",
"length": 810.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@04b5b5cb0136ce970333a9c6cec7e46adba1ea3a",
"signature_type": "Function",
"id": "CVE-2023-53174-29167c0c",
"target": {
"file": "drivers/scsi/raid_class.c",
"function": "raid_component_add"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "22005716464499101979168972329010526362",
"length": 810.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@63956ad27a6882f01fea7c69e17823090f4c7b3f",
"signature_type": "Function",
"id": "CVE-2023-53174-4be81463",
"target": {
"file": "drivers/scsi/raid_class.c",
"function": "raid_component_add"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "22005716464499101979168972329010526362",
"length": 810.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@43c0e16d0c5ec59398b405f4c4aa5a076e656c3f",
"signature_type": "Function",
"id": "CVE-2023-53174-58c8237d",
"target": {
"file": "drivers/scsi/raid_class.c",
"function": "raid_component_add"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "22005716464499101979168972329010526362",
"length": 810.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6bc7f4c8c27d526f968788b8a985896755b1df35",
"signature_type": "Function",
"id": "CVE-2023-53174-66f95265",
"target": {
"file": "drivers/scsi/raid_class.c",
"function": "raid_component_add"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "22005716464499101979168972329010526362",
"length": 810.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b191ff1f075c4875f11271cbf0093e6e044a12aa",
"signature_type": "Function",
"id": "CVE-2023-53174-8407dcc4",
"target": {
"file": "drivers/scsi/raid_class.c",
"function": "raid_component_add"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"331355488251686598618331535171075402041",
"322906359292026977472863289890313722431",
"24195545856296331240857171294563041100",
"129050091525010964757441877905514686554"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@06c5340858011aa1195aec43a776e3185fbf7f56",
"signature_type": "Line",
"id": "CVE-2023-53174-961ee0b2",
"target": {
"file": "drivers/scsi/raid_class.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"331355488251686598618331535171075402041",
"322906359292026977472863289890313722431",
"24195545856296331240857171294563041100",
"129050091525010964757441877905514686554"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b191ff1f075c4875f11271cbf0093e6e044a12aa",
"signature_type": "Line",
"id": "CVE-2023-53174-afe22117",
"target": {
"file": "drivers/scsi/raid_class.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"331355488251686598618331535171075402041",
"322906359292026977472863289890313722431",
"24195545856296331240857171294563041100",
"129050091525010964757441877905514686554"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@63956ad27a6882f01fea7c69e17823090f4c7b3f",
"signature_type": "Line",
"id": "CVE-2023-53174-b9f7d86d",
"target": {
"file": "drivers/scsi/raid_class.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"331355488251686598618331535171075402041",
"322906359292026977472863289890313722431",
"24195545856296331240857171294563041100",
"129050091525010964757441877905514686554"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6bc7f4c8c27d526f968788b8a985896755b1df35",
"signature_type": "Line",
"id": "CVE-2023-53174-c6e744d2",
"target": {
"file": "drivers/scsi/raid_class.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"331355488251686598618331535171075402041",
"322906359292026977472863289890313722431",
"24195545856296331240857171294563041100",
"129050091525010964757441877905514686554"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@04b5b5cb0136ce970333a9c6cec7e46adba1ea3a",
"signature_type": "Line",
"id": "CVE-2023-53174-f8c9b137",
"target": {
"file": "drivers/scsi/raid_class.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "22005716464499101979168972329010526362",
"length": 810.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@06c5340858011aa1195aec43a776e3185fbf7f56",
"signature_type": "Function",
"id": "CVE-2023-53174-f9d31bef",
"target": {
"file": "drivers/scsi/raid_class.c",
"function": "raid_component_add"
}
}
]