{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-53852","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-09T01:27:17.827Z","datePublished":"2025-12-09T01:30:17.449Z","dateUpdated":"2026-05-11T19:52:45.826Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:52:45.826Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-core: fix memory leak in dhchap_secret_store\n\nFree dhchap_secret in nvme_ctrl_dhchap_secret_store() before we return\nfix following kmemleack:-\n\nunreferenced object 0xffff8886376ea800 (size 64):\n  comm \"check\", pid 22048, jiffies 4344316705 (age 92.199s)\n  hex dump (first 32 bytes):\n    44 48 48 43 2d 31 3a 30 30 3a 6e 78 72 35 4b 67  DHHC-1:00:nxr5Kg\n    75 58 34 75 6f 41 78 73 4a 61 34 63 2f 68 75 4c  uX4uoAxsJa4c/huL\n  backtrace:\n    [<0000000030ce5d4b>] __kmalloc+0x4b/0x130\n    [<000000009be1cdc1>] nvme_ctrl_dhchap_secret_store+0x8f/0x160 [nvme_core]\n    [<00000000ac06c96a>] kernfs_fop_write_iter+0x12b/0x1c0\n    [<00000000437e7ced>] vfs_write+0x2ba/0x3c0\n    [<00000000f9491baf>] ksys_write+0x5f/0xe0\n    [<000000001c46513d>] do_syscall_64+0x3b/0x90\n    [<00000000ecf348fe>] entry_SYSCALL_64_after_hwframe+0x72/0xdc\nunreferenced object 0xffff8886376eaf00 (size 64):\n  comm \"check\", pid 22048, jiffies 4344316736 (age 92.168s)\n  hex dump (first 32 bytes):\n    44 48 48 43 2d 31 3a 30 30 3a 6e 78 72 35 4b 67  DHHC-1:00:nxr5Kg\n    75 58 34 75 6f 41 78 73 4a 61 34 63 2f 68 75 4c  uX4uoAxsJa4c/huL\n  backtrace:\n    [<0000000030ce5d4b>] __kmalloc+0x4b/0x130\n    [<000000009be1cdc1>] nvme_ctrl_dhchap_secret_store+0x8f/0x160 [nvme_core]\n    [<00000000ac06c96a>] kernfs_fop_write_iter+0x12b/0x1c0\n    [<00000000437e7ced>] vfs_write+0x2ba/0x3c0\n    [<00000000f9491baf>] ksys_write+0x5f/0xe0\n    [<000000001c46513d>] do_syscall_64+0x3b/0x90\n    [<00000000ecf348fe>] entry_SYSCALL_64_after_hwframe+0x72/0xdc"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/nvme/host/core.c"],"versions":[{"version":"f50fff73d620cd6e8f48bc58d4f1c944615a3fea","lessThan":"2e9b141307554521d60fecf6bf1d2edc8dd0181d","status":"affected","versionType":"git"},{"version":"f50fff73d620cd6e8f48bc58d4f1c944615a3fea","lessThan":"c41ac086d2abaf7527a5685f9c0a1c209ab7e0aa","status":"affected","versionType":"git"},{"version":"f50fff73d620cd6e8f48bc58d4f1c944615a3fea","lessThan":"6a5eda5017959541ab82c5d56bcf784b8294e298","status":"affected","versionType":"git"},{"version":"f50fff73d620cd6e8f48bc58d4f1c944615a3fea","lessThan":"a836ca33c5b07d34dd5347af9f64d25651d12674","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/nvme/host/core.c"],"versions":[{"version":"6.0","status":"affected"},{"version":"0","lessThan":"6.0","status":"unaffected","versionType":"semver"},{"version":"6.1.39","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.3.13","lessThanOrEqual":"6.3.*","status":"unaffected","versionType":"semver"},{"version":"6.4.4","lessThanOrEqual":"6.4.*","status":"unaffected","versionType":"semver"},{"version":"6.5","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0","versionEndExcluding":"6.1.39"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0","versionEndExcluding":"6.3.13"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0","versionEndExcluding":"6.4.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0","versionEndExcluding":"6.5"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/2e9b141307554521d60fecf6bf1d2edc8dd0181d"},{"url":"https://git.kernel.org/stable/c/c41ac086d2abaf7527a5685f9c0a1c209ab7e0aa"},{"url":"https://git.kernel.org/stable/c/6a5eda5017959541ab82c5d56bcf784b8294e298"},{"url":"https://git.kernel.org/stable/c/a836ca33c5b07d34dd5347af9f64d25651d12674"}],"title":"nvme-core: fix memory leak in dhchap_secret_store","x_generator":{"engine":"bippy-1.2.0"}}}}