CVE-2023-53355 (GCVE-0-2023-53355)
Vulnerability from cvelistv5
Published
2025-09-17 14:56
Modified
2025-09-19 15:21
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: staging: pi433: fix memory leak with using debugfs_lookup() When calling debugfs_lookup() the result must have dput() called on it, otherwise the memory will leak over time. To make things simpler, just call debugfs_lookup_and_remove() instead which handles all of the logic at once. This requires saving off the root directory dentry to make creation of individual device subdirectories easier.
Impacted products
Vendor Product Version
Linux Linux Version: 874bcba65f9a3a2a304b5f520529c046887c3cdc
Version: 874bcba65f9a3a2a304b5f520529c046887c3cdc
Version: 874bcba65f9a3a2a304b5f520529c046887c3cdc
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/staging/pi433/pi433_if.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "04f3cda40e9f6653ae15ed3fcf26ef2860f4df66",
              "status": "affected",
              "version": "874bcba65f9a3a2a304b5f520529c046887c3cdc",
              "versionType": "git"
            },
            {
              "lessThan": "bb16f3102607b69e1a0233f4b73c6e337f86ef8d",
              "status": "affected",
              "version": "874bcba65f9a3a2a304b5f520529c046887c3cdc",
              "versionType": "git"
            },
            {
              "lessThan": "2f36e789e540df6a9fbf471b3a2ba62a8b361586",
              "status": "affected",
              "version": "874bcba65f9a3a2a304b5f520529c046887c3cdc",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/staging/pi433/pi433_if.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.14"
            },
            {
              "lessThan": "4.14",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.18",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.2.*",
              "status": "unaffected",
              "version": "6.2.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.3",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.18",
                  "versionStartIncluding": "4.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.2.5",
                  "versionStartIncluding": "4.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.3",
                  "versionStartIncluding": "4.14",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: pi433: fix memory leak with using debugfs_lookup()\n\nWhen calling debugfs_lookup() the result must have dput() called on it,\notherwise the memory will leak over time.  To make things simpler, just\ncall debugfs_lookup_and_remove() instead which handles all of the logic\nat once.  This requires saving off the root directory dentry to make\ncreation of individual device subdirectories easier."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-19T15:21:35.052Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/04f3cda40e9f6653ae15ed3fcf26ef2860f4df66"
        },
        {
          "url": "https://git.kernel.org/stable/c/bb16f3102607b69e1a0233f4b73c6e337f86ef8d"
        },
        {
          "url": "https://git.kernel.org/stable/c/2f36e789e540df6a9fbf471b3a2ba62a8b361586"
        }
      ],
      "title": "staging: pi433: fix memory leak with using debugfs_lookup()",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-53355",
    "datePublished": "2025-09-17T14:56:45.400Z",
    "dateReserved": "2025-09-16T16:08:59.567Z",
    "dateUpdated": "2025-09-19T15:21:35.052Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-53355\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-17T15:15:39.523\",\"lastModified\":\"2025-09-18T13:43:34.310\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nstaging: pi433: fix memory leak with using debugfs_lookup()\\n\\nWhen calling debugfs_lookup() the result must have dput() called on it,\\notherwise the memory will leak over time.  To make things simpler, just\\ncall debugfs_lookup_and_remove() instead which handles all of the logic\\nat once.  This requires saving off the root directory dentry to make\\ncreation of individual device subdirectories easier.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/04f3cda40e9f6653ae15ed3fcf26ef2860f4df66\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/2f36e789e540df6a9fbf471b3a2ba62a8b361586\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/bb16f3102607b69e1a0233f4b73c6e337f86ef8d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…