CVE-2023-53779
mfd: dln2: Fix memory leak in dln2_probe()
Description
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
INFO
Published Date :
Dec. 9, 2025, 1:16 a.m.
Last Modified :
Jan. 5, 2026, 10:15 a.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Solution
- Ensure usb_put_dev() is called on error.
- Add usb_put_dev() in error handling.
- Review memory management in probe functions.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2023-53779 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2023-53779 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Rejected by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Jan. 05, 2026
Action Type Old Value New Value -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Jan. 05, 2026
Action Type Old Value New Value Changed Description In the Linux kernel, the following vulnerability has been resolved: mfd: dln2: Fix memory leak in dln2_probe() When dln2_setup_rx_urbs() in dln2_probe() fails, error out_free forgets to call usb_put_dev() to decrease the refcount of dln2->usb_dev. Fix this by adding usb_put_dev() in the error handling code of dln2_probe(). Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Removed Reference kernel.org: https://git.kernel.org/stable/c/1e453cb55014367a84655203c31d57dfa87e005e Removed Reference kernel.org: https://git.kernel.org/stable/c/1fa3fb4f70184254af437ccd59fd1c091a90d518 Removed Reference kernel.org: https://git.kernel.org/stable/c/6a1a72a8cfdad6911a7167405b63545ad781fbe2 Removed Reference kernel.org: https://git.kernel.org/stable/c/71fa6f134d13822a5dd906327de04aad8e903e49 Removed Reference kernel.org: https://git.kernel.org/stable/c/77f43c014a770c4dcbdeed7cda6884c29382eb0f Removed Reference kernel.org: https://git.kernel.org/stable/c/96da8f148396329ba769246cb8ceaa35f1ddfc48 Removed Reference kernel.org: https://git.kernel.org/stable/c/aa5a8673d71124e7dcdd497ec2accebc15bd6ca3 Removed Reference kernel.org: https://git.kernel.org/stable/c/fa045c911f0bfc0305c71618ab5630153faf86a4 -
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Dec. 09, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: mfd: dln2: Fix memory leak in dln2_probe() When dln2_setup_rx_urbs() in dln2_probe() fails, error out_free forgets to call usb_put_dev() to decrease the refcount of dln2->usb_dev. Fix this by adding usb_put_dev() in the error handling code of dln2_probe(). Added Reference https://git.kernel.org/stable/c/1e453cb55014367a84655203c31d57dfa87e005e Added Reference https://git.kernel.org/stable/c/1fa3fb4f70184254af437ccd59fd1c091a90d518 Added Reference https://git.kernel.org/stable/c/6a1a72a8cfdad6911a7167405b63545ad781fbe2 Added Reference https://git.kernel.org/stable/c/71fa6f134d13822a5dd906327de04aad8e903e49 Added Reference https://git.kernel.org/stable/c/77f43c014a770c4dcbdeed7cda6884c29382eb0f Added Reference https://git.kernel.org/stable/c/96da8f148396329ba769246cb8ceaa35f1ddfc48 Added Reference https://git.kernel.org/stable/c/aa5a8673d71124e7dcdd497ec2accebc15bd6ca3 Added Reference https://git.kernel.org/stable/c/fa045c911f0bfc0305c71618ab5630153faf86a4