CVE-2023-53594 (GCVE-0-2023-53594)
Vulnerability from cvelistv5
Published
2025-10-04 15:44
Modified
2025-10-04 15:44
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: driver core: fix resource leak in device_add() When calling kobject_add() failed in device_add(), it will call cleanup_glue_dir() to free resource. But in kobject_add(), dev->kobj.parent has been set to NULL. This will cause resource leak. The process is as follows: device_add() get_device_parent() class_dir_create_and_add() kobject_add() //kobject_get() ... dev->kobj.parent = kobj; ... kobject_add() //failed, but set dev->kobj.parent = NULL ... glue_dir = get_glue_dir(dev) //glue_dir = NULL, and goto //"Error" label ... cleanup_glue_dir() //becaues glue_dir is NULL, not call //kobject_put() The preceding problem may cause insmod mac80211_hwsim.ko to failed. sysfs: cannot create duplicate filename '/devices/virtual/mac80211_hwsim' Call Trace: <TASK> dump_stack_lvl+0x8e/0xd1 sysfs_warn_dup.cold+0x1c/0x29 sysfs_create_dir_ns+0x224/0x280 kobject_add_internal+0x2aa/0x880 kobject_add+0x135/0x1a0 get_device_parent+0x3d7/0x590 device_add+0x2aa/0x1cb0 device_create_groups_vargs+0x1eb/0x260 device_create+0xdc/0x110 mac80211_hwsim_new_radio+0x31e/0x4790 [mac80211_hwsim] init_mac80211_hwsim+0x48d/0x1000 [mac80211_hwsim] do_one_initcall+0x10f/0x630 do_init_module+0x19f/0x5e0 load_module+0x64b7/0x6eb0 __do_sys_finit_module+0x140/0x200 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 </TASK> kobject_add_internal failed for mac80211_hwsim with -EEXIST, don't try to register things with the same name in the same directory.
Impacted products
Vendor Product Version
Linux Linux Version: cebf8fd16900fdfd58c0028617944f808f97fe50
Version: cebf8fd16900fdfd58c0028617944f808f97fe50
Version: cebf8fd16900fdfd58c0028617944f808f97fe50
Version: cebf8fd16900fdfd58c0028617944f808f97fe50
Version: e7f6e3c9db4b6f259c89fd05728d024ab32acd71
Version: a93a63333dbdb182b87e8cc99df8b4474f867acb
Version: 37de955c11b59050346e530143c20b10b4846527
Version: 645897231f960590220144b06d1f994b7eb88326
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/base/core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "8d389e363075c2e1deb84a560686ea92123e4b8b",
              "status": "affected",
              "version": "cebf8fd16900fdfd58c0028617944f808f97fe50",
              "versionType": "git"
            },
            {
              "lessThan": "d1dbff10c6cd3b43457f3efd3c9c4950009635bf",
              "status": "affected",
              "version": "cebf8fd16900fdfd58c0028617944f808f97fe50",
              "versionType": "git"
            },
            {
              "lessThan": "f39d21154db87545d8f0b25d13c326f37cc32239",
              "status": "affected",
              "version": "cebf8fd16900fdfd58c0028617944f808f97fe50",
              "versionType": "git"
            },
            {
              "lessThan": "6977b1a5d67097eaa4d02b0c126c04cc6e8917c0",
              "status": "affected",
              "version": "cebf8fd16900fdfd58c0028617944f808f97fe50",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "e7f6e3c9db4b6f259c89fd05728d024ab32acd71",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "a93a63333dbdb182b87e8cc99df8b4474f867acb",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "37de955c11b59050346e530143c20b10b4846527",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "645897231f960590220144b06d1f994b7eb88326",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/base/core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.9"
            },
            {
              "lessThan": "4.9",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.99",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.16",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.2.*",
              "status": "unaffected",
              "version": "6.2.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.3",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.99",
                  "versionStartIncluding": "4.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.16",
                  "versionStartIncluding": "4.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.2.3",
                  "versionStartIncluding": "4.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.3",
                  "versionStartIncluding": "4.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "3.10.105",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "3.12.70",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.4.40",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.8.16",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: fix resource leak in device_add()\n\nWhen calling kobject_add() failed in device_add(), it will call\ncleanup_glue_dir() to free resource. But in kobject_add(),\ndev-\u003ekobj.parent has been set to NULL. This will cause resource leak.\n\nThe process is as follows:\ndevice_add()\n\tget_device_parent()\n\t\tclass_dir_create_and_add()\n\t\t\tkobject_add()\t\t//kobject_get()\n\t...\n\tdev-\u003ekobj.parent = kobj;\n\t...\n\tkobject_add()\t\t//failed, but set dev-\u003ekobj.parent = NULL\n\t...\n\tglue_dir = get_glue_dir(dev)\t//glue_dir = NULL, and goto\n\t\t\t\t\t//\"Error\" label\n\t...\n\tcleanup_glue_dir()\t//becaues glue_dir is NULL, not call\n\t\t\t\t//kobject_put()\n\nThe preceding problem may cause insmod mac80211_hwsim.ko to failed.\nsysfs: cannot create duplicate filename \u0027/devices/virtual/mac80211_hwsim\u0027\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x8e/0xd1\nsysfs_warn_dup.cold+0x1c/0x29\nsysfs_create_dir_ns+0x224/0x280\nkobject_add_internal+0x2aa/0x880\nkobject_add+0x135/0x1a0\nget_device_parent+0x3d7/0x590\ndevice_add+0x2aa/0x1cb0\ndevice_create_groups_vargs+0x1eb/0x260\ndevice_create+0xdc/0x110\nmac80211_hwsim_new_radio+0x31e/0x4790 [mac80211_hwsim]\ninit_mac80211_hwsim+0x48d/0x1000 [mac80211_hwsim]\ndo_one_initcall+0x10f/0x630\ndo_init_module+0x19f/0x5e0\nload_module+0x64b7/0x6eb0\n__do_sys_finit_module+0x140/0x200\ndo_syscall_64+0x35/0x80\nentry_SYSCALL_64_after_hwframe+0x46/0xb0\n\u003c/TASK\u003e\nkobject_add_internal failed for mac80211_hwsim with -EEXIST, don\u0027t try to\nregister things with the same name in the same directory."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-04T15:44:07.533Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/8d389e363075c2e1deb84a560686ea92123e4b8b"
        },
        {
          "url": "https://git.kernel.org/stable/c/d1dbff10c6cd3b43457f3efd3c9c4950009635bf"
        },
        {
          "url": "https://git.kernel.org/stable/c/f39d21154db87545d8f0b25d13c326f37cc32239"
        },
        {
          "url": "https://git.kernel.org/stable/c/6977b1a5d67097eaa4d02b0c126c04cc6e8917c0"
        }
      ],
      "title": "driver core: fix resource leak in device_add()",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-53594",
    "datePublished": "2025-10-04T15:44:07.533Z",
    "dateReserved": "2025-10-04T15:40:38.478Z",
    "dateUpdated": "2025-10-04T15:44:07.533Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-53594\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-10-04T16:15:55.910\",\"lastModified\":\"2025-10-06T14:56:21.733\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndriver core: fix resource leak in device_add()\\n\\nWhen calling kobject_add() failed in device_add(), it will call\\ncleanup_glue_dir() to free resource. But in kobject_add(),\\ndev-\u003ekobj.parent has been set to NULL. This will cause resource leak.\\n\\nThe process is as follows:\\ndevice_add()\\n\\tget_device_parent()\\n\\t\\tclass_dir_create_and_add()\\n\\t\\t\\tkobject_add()\\t\\t//kobject_get()\\n\\t...\\n\\tdev-\u003ekobj.parent = kobj;\\n\\t...\\n\\tkobject_add()\\t\\t//failed, but set dev-\u003ekobj.parent = NULL\\n\\t...\\n\\tglue_dir = get_glue_dir(dev)\\t//glue_dir = NULL, and goto\\n\\t\\t\\t\\t\\t//\\\"Error\\\" label\\n\\t...\\n\\tcleanup_glue_dir()\\t//becaues glue_dir is NULL, not call\\n\\t\\t\\t\\t//kobject_put()\\n\\nThe preceding problem may cause insmod mac80211_hwsim.ko to failed.\\nsysfs: cannot create duplicate filename \u0027/devices/virtual/mac80211_hwsim\u0027\\nCall Trace:\\n\u003cTASK\u003e\\ndump_stack_lvl+0x8e/0xd1\\nsysfs_warn_dup.cold+0x1c/0x29\\nsysfs_create_dir_ns+0x224/0x280\\nkobject_add_internal+0x2aa/0x880\\nkobject_add+0x135/0x1a0\\nget_device_parent+0x3d7/0x590\\ndevice_add+0x2aa/0x1cb0\\ndevice_create_groups_vargs+0x1eb/0x260\\ndevice_create+0xdc/0x110\\nmac80211_hwsim_new_radio+0x31e/0x4790 [mac80211_hwsim]\\ninit_mac80211_hwsim+0x48d/0x1000 [mac80211_hwsim]\\ndo_one_initcall+0x10f/0x630\\ndo_init_module+0x19f/0x5e0\\nload_module+0x64b7/0x6eb0\\n__do_sys_finit_module+0x140/0x200\\ndo_syscall_64+0x35/0x80\\nentry_SYSCALL_64_after_hwframe+0x46/0xb0\\n\u003c/TASK\u003e\\nkobject_add_internal failed for mac80211_hwsim with -EEXIST, don\u0027t try to\\nregister things with the same name in the same directory.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/6977b1a5d67097eaa4d02b0c126c04cc6e8917c0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8d389e363075c2e1deb84a560686ea92123e4b8b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d1dbff10c6cd3b43457f3efd3c9c4950009635bf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f39d21154db87545d8f0b25d13c326f37cc32239\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…