CVE-2023-53436

Source
https://cve.org/CVERecord?id=CVE-2023-53436
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53436.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53436
Downstream
Related
Published
2025-09-18T16:04:15.138Z
Modified
2026-03-11T07:50:52.715197Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
scsi: snic: Fix possible memory leak if device_add() fails
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: snic: Fix possible memory leak if device_add() fails

If deviceadd() returns error, the name allocated by devsetname() needs be freed. As the comment of deviceadd() says, putdevice() should be used to give up the reference in the error path. So fix this by calling putdevice(), then the name can be freed in kobject_cleanp().

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53436.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c8806b6c9e824f47726f2a9b7fbbe7ebf19306fa
Fixed
789275f7c0544374d40bc8d9c81f96751a41df45
Fixed
f830968d464f55e11bc9260a132fc77daa266aa3
Fixed
cea09922f5f75652d55b481ee34011fc7f19868b
Fixed
58889d5ad74cbc1c9595db74e13522b58b69b0ec
Fixed
461f8ac666fa232afee5ed6420099913ec4e4ba2
Fixed
7723a5d5d187626c4c640842e522cf4e9e39492e
Fixed
ed0acb1ee2e9322b96611635a9ca9303d15ac76c
Fixed
41320b18a0e0dfb236dba4edb9be12dba1878156

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53436.json"