CVE-2023-53594
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-21
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.16 (inc) to 6.1.16 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.3 (exc) |
| linux | linux_kernel | From 3.12.70 (inc) to 3.13 (exc) |
| linux | linux_kernel | From 3.10.105 (inc) to 3.11 (exc) |
| linux | linux_kernel | From 4.4.40 (inc) to 4.5 (exc) |
| linux | linux_kernel | From 4.8.16 (inc) to 5.15.99 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a resource leak in the Linux kernel's device_add() function. When kobject_add() fails during device_add(), it calls cleanup_glue_dir() to free resources. However, because dev->kobj.parent is set to NULL in kobject_add() before the failure, cleanup_glue_dir() does not call kobject_put() to release resources, causing a resource leak. This can lead to failures such as insmod mac80211_hwsim.ko failing due to sysfs trying to create a duplicate filename.
How can this vulnerability impact me? :
This vulnerability can cause resource leaks in the Linux kernel, potentially leading to failures when loading kernel modules, such as the mac80211_hwsim module failing to load due to duplicate sysfs filenames. This may affect system stability or functionality related to device management.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing error messages related to kobject_add_internal failures, specifically errors indicating duplicate filenames such as '/devices/virtual/mac80211_hwsim'. Checking kernel logs (e.g., using 'dmesg' or 'journalctl -k') for messages containing 'kobject_add_internal failed' or 'sysfs: cannot create duplicate filename' can help identify the issue. For example, running 'dmesg | grep kobject_add_internal' or 'journalctl -k | grep mac80211_hwsim' may reveal relevant errors.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves avoiding loading or inserting the mac80211_hwsim kernel module until the vulnerability is fixed, as the issue occurs during insmod of mac80211_hwsim. Monitoring for kernel updates or patches that fix the resource leak in device_add() and applying them promptly is recommended. Additionally, avoid registering devices with duplicate names in sysfs to prevent triggering the bug.