๐Ÿ” CVE Alert

CVE-2023-53746

UNKNOWN 0.0

s390/vfio-ap: fix memory leak in vfio_ap device driver

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: s390/vfio-ap: fix memory leak in vfio_ap device driver The device release callback function invoked to release the matrix device uses the dev_get_drvdata(device *dev) function to retrieve the pointer to the vfio_matrix_dev object in order to free its storage. The problem is, this object is not stored as drvdata with the device; since the kfree function will accept a NULL pointer, the memory for the vfio_matrix_dev object is never freed. Since the device being released is contained within the vfio_matrix_dev object, the container_of macro will be used to retrieve its pointer.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 8, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1fde573413b549d52183382e639c1d6ce88f5959 < 5195de1d5f66b276683240a896783f7f43c4f664 1fde573413b549d52183382e639c1d6ce88f5959 < ee17dea3072dec0bc34399a32fa884e26342e4ea 1fde573413b549d52183382e639c1d6ce88f5959 < aa2bff25e9bb10c935c7ffe3d5f5975bdccb1749 1fde573413b549d52183382e639c1d6ce88f5959 < 6a40fda14b4be3e38f03cc42ffd4efbc64fb3e67 1fde573413b549d52183382e639c1d6ce88f5959 < 7b6a02f5bf15931464c79dfd487c57f76aae3496 1fde573413b549d52183382e639c1d6ce88f5959 < 8f8cf767589f2131ae5d40f3758429095c701c84
Linux / Linux
4.20

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/5195de1d5f66b276683240a896783f7f43c4f664 git.kernel.org: https://git.kernel.org/stable/c/ee17dea3072dec0bc34399a32fa884e26342e4ea git.kernel.org: https://git.kernel.org/stable/c/aa2bff25e9bb10c935c7ffe3d5f5975bdccb1749 git.kernel.org: https://git.kernel.org/stable/c/6a40fda14b4be3e38f03cc42ffd4efbc64fb3e67 git.kernel.org: https://git.kernel.org/stable/c/7b6a02f5bf15931464c79dfd487c57f76aae3496 git.kernel.org: https://git.kernel.org/stable/c/8f8cf767589f2131ae5d40f3758429095c701c84