Home

Description

In the Linux kernel, the following vulnerability has been resolved: PCI/DOE: Fix memory leak with CONFIG_DEBUG_OBJECTS=y After a pci_doe_task completes, its work_struct needs to be destroyed to avoid a memory leak with CONFIG_DEBUG_OBJECTS=y.

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

9d24322e887b6a3d3f9f9c3e76937a646102c8c1 (git) before 2a0e0f4773fe8032fb17e56f897bee32ce3cdc2b
affected

9d24322e887b6a3d3f9f9c3e76937a646102c8c1 (git) before 95628b830952943631d3d74f73f431f501c5d6f5
affected

9d24322e887b6a3d3f9f9c3e76937a646102c8c1 (git) before abf04be0e7071f2bcd39bf97ba407e7d4439785e
affected

Default status
affected

6.0
affected

Any version before 6.0
unaffected

6.1.24 (semver)
unaffected

6.2.11 (semver)
unaffected

6.3 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/2a0e0f4773fe8032fb17e56f897bee32ce3cdc2b

git.kernel.org/...c/95628b830952943631d3d74f73f431f501c5d6f5

git.kernel.org/...c/abf04be0e7071f2bcd39bf97ba407e7d4439785e

cve.org (CVE-2023-53993)

nvd.nist.gov (CVE-2023-53993)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.