CVE-2023-54017Missing Release of Memory after Effective Lifetime in Linux

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: fix possible memory leak in ibmebus_bus_init() If device_register() returns error in ibmebus_bus_init(), name of kobject which is allocated in dev_set_name() called in device_add() is leaked. As comment of device_add() says, it should call put_device() to drop the reference count that was set in device_initialize() when it fails, so the name can be freed in kobject_cleanup().

Affected Packages4 packages

Linuxlinux/linux_kernel2.6.164.14.326+6
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linuxd7a301033f1990188f65abf4fe8e5b90ef0e3888e4ff88548defafb1ef84facd9856ec252da7b008+8
debiandebian/linux< linux 6.1.55-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-54017: In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: fix possible memory leak in ibmebus_bus_init() If device_register2025-12-24
OSV
powerpc/pseries: fix possible memory leak in ibmebus_bus_init()2025-12-24
GHSA
GHSA-2j5g-62c3-j9jj: In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: fix possible memory leak in ibmebus_bus_init() If device_regist2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: powerpc/pseries: fix possible memory leak in ibmebus_bus_init()2025-12-24
Debian
CVE-2023-54017: linux - In the Linux kernel, the following vulnerability has been resolved: powerpc/pse...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54017 Impact, Exploitability, and Mitigation Steps | Wiz