CVE-2023-53514
BaseFortify
Publication date: 2025-10-01
Last updated on: 2026-01-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.0 (inc) to 6.1.28 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.15 (exc) |
| linux | linux_kernel | From 6.3 (inc) to 6.3.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel related to the gpu host1x driver. Specifically, device names allocated by dev_set_name() are not properly freed before module unloading because the kobject's reference count set in device_initialize() does not decrease to zero. This prevents freeing the allocated device names, causing a memory leak.
How can this vulnerability impact me? :
The memory leak caused by this vulnerability can lead to increased memory usage over time, potentially degrading system performance or causing resource exhaustion if the affected devices are frequently loaded and unloaded.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the memory leak in the gpu host1x driver related to device names has been fixed. This fix involves proper freeing of device names before module unloading by correctly managing the kobject's reference count and using device_unregister() to unregister devices. Applying the patch or kernel update that includes these changes will prevent the memory leak.