In the Linux kernel, the following vulnerability has been resolved:
firmware: stratix10-svc: Fix a potential resource leak in svccreatememory_pool()
svccreatememorypool() is only called from stratix10svcdrvprobe(). Most of resources in the probe are managed, but not this memremap() call.
There is also no memunmap() call in the file.
So switch to devm_memremap() to avoid a resource leak.
{ "vanir_signatures": [ { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/firmware/stratix10-svc.c", "function": "svc_create_memory_pool" }, "signature_version": "v1", "digest": { "length": 1187.0, "function_hash": "186517479823800346910399457840029947660" }, "id": "CVE-2023-53255-1ea569af", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1995f15590ca222f91193ed11461862b450abfd6" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/firmware/stratix10-svc.c", "function": "svc_create_memory_pool" }, "signature_version": "v1", "digest": { "length": 1187.0, "function_hash": "186517479823800346910399457840029947660" }, "id": "CVE-2023-53255-2da22337", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cb8a31a56df8492fb0d900959238e1a3ff8b8981" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/firmware/stratix10-svc.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "266515767878514875521073324664262747137", "305880629107497131585443332806727145272", "310478144179320753414108520076048869753", "234681402181294006404923767599653035248" ], "threshold": 0.9 }, "id": "CVE-2023-53255-432e2ee9", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e3373e6b6c79aff698442b00d20c9f285d296e46" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/firmware/stratix10-svc.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "266515767878514875521073324664262747137", "305880629107497131585443332806727145272", "310478144179320753414108520076048869753", "234681402181294006404923767599653035248" ], "threshold": 0.9 }, "id": "CVE-2023-53255-539264d0", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cb8a31a56df8492fb0d900959238e1a3ff8b8981" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/firmware/stratix10-svc.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "266515767878514875521073324664262747137", "305880629107497131585443332806727145272", "310478144179320753414108520076048869753", "234681402181294006404923767599653035248" ], "threshold": 0.9 }, "id": "CVE-2023-53255-64228875", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@974ac045a05ad12a0b4578fb303f00dcc22f3aba" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/firmware/stratix10-svc.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "266515767878514875521073324664262747137", "305880629107497131585443332806727145272", "310478144179320753414108520076048869753", "234681402181294006404923767599653035248" ], "threshold": 0.9 }, "id": "CVE-2023-53255-6abc1873", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1995f15590ca222f91193ed11461862b450abfd6" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/firmware/stratix10-svc.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "266515767878514875521073324664262747137", "305880629107497131585443332806727145272", "310478144179320753414108520076048869753", "234681402181294006404923767599653035248" ], "threshold": 0.9 }, "id": "CVE-2023-53255-7083b4ca", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7363de081c793e47866cb54ce7cb8a480cffc259" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/firmware/stratix10-svc.c", "function": "svc_create_memory_pool" }, "signature_version": "v1", "digest": { "length": 1187.0, "function_hash": "186517479823800346910399457840029947660" }, "id": "CVE-2023-53255-a46d8815", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@974ac045a05ad12a0b4578fb303f00dcc22f3aba" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/firmware/stratix10-svc.c", "function": "svc_create_memory_pool" }, "signature_version": "v1", "digest": { "length": 1187.0, "function_hash": "186517479823800346910399457840029947660" }, "id": "CVE-2023-53255-b3df1b10", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7363de081c793e47866cb54ce7cb8a480cffc259" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/firmware/stratix10-svc.c", "function": "svc_create_memory_pool" }, "signature_version": "v1", "digest": { "length": 1187.0, "function_hash": "186517479823800346910399457840029947660" }, "id": "CVE-2023-53255-cc3fef05", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c04ed61ebf01968d7699b121663982493ed577fb" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/firmware/stratix10-svc.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "266515767878514875521073324664262747137", "305880629107497131585443332806727145272", "310478144179320753414108520076048869753", "234681402181294006404923767599653035248" ], "threshold": 0.9 }, "id": "CVE-2023-53255-e1563432", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c04ed61ebf01968d7699b121663982493ed577fb" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/firmware/stratix10-svc.c", "function": "svc_create_memory_pool" }, "signature_version": "v1", "digest": { "length": 1187.0, "function_hash": "186517479823800346910399457840029947660" }, "id": "CVE-2023-53255-fe1bb8a8", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e3373e6b6c79aff698442b00d20c9f285d296e46" } ] }