Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-52929


In the Linux kernel, the following vulnerability has been resolved: nvmem: core: fix cleanup after dev_set_name() If dev_set_name() fails, we leak nvmem->wp_gpio as the cleanup does not put this. While a minimal fix for this would be to add the gpiod_put() call, we can do better if we split device_register(), and use the tested nvmem_release() cleanup code by initialising the device early, and putting the device. This results in a slightly larger fix, but results in clear code. Note: this patch depends on "nvmem: core: initialise nvmem->id early" and "nvmem: core: remove nvmem_config wp_gpio". [Srini: Fixed subject line and error code handing with wp_gpio while applying.]


Published

2025-03-27T17:15:42.353

Last Modified

2025-10-28T18:30:58.967

Status

Analyzed

Source

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Severity

CVSSv3.1: 5.5 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-459

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 6.1.11 Yes
Operating System linux linux_kernel 6.2 Yes
Operating System linux linux_kernel 6.2 Yes
Operating System linux linux_kernel 6.2 Yes
Operating System linux linux_kernel 6.2 Yes
Operating System linux linux_kernel 6.2 Yes
Operating System linux linux_kernel 6.2 Yes

References