In the Linux kernel, the following vulnerability has been resolved:
drivers: base: dd: fix memory leak with using debugfs_lookup()
When calling debugfslookup() the result must have dput() called on it, otherwise the memory will leak over time. To make things simpler, just call debugfslookupandremove() instead which handles all of the logic at once.
[
{
"id": "CVE-2023-53390-0bffaf8d",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@36c893d3a759ae7c91ee7d4871ebfc7504f08c40",
"signature_type": "Function",
"digest": {
"function_hash": "275085736813893710099833775721149754957",
"length": 89.0
},
"deprecated": false,
"target": {
"function": "deferred_probe_exit",
"file": "drivers/base/dd.c"
}
},
{
"id": "CVE-2023-53390-1c1764ea",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8e47e2bf78812adbd73c45c941d3c51add30b58d",
"signature_type": "Function",
"digest": {
"function_hash": "275085736813893710099833775721149754957",
"length": 89.0
},
"deprecated": false,
"target": {
"function": "deferred_probe_exit",
"file": "drivers/base/dd.c"
}
},
{
"id": "CVE-2023-53390-4756a91f",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5a7a9efdb193d3c8a35821548a8e99612c358828",
"signature_type": "Function",
"digest": {
"function_hash": "275085736813893710099833775721149754957",
"length": 89.0
},
"deprecated": false,
"target": {
"function": "deferred_probe_exit",
"file": "drivers/base/dd.c"
}
},
{
"id": "CVE-2023-53390-9766abc3",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@36c893d3a759ae7c91ee7d4871ebfc7504f08c40",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"232108639780167070369110370311636225311",
"33085565308642830366621163190277368428",
"121381277921269906456673368828569628650",
"168228628992673278938077582459605999509"
]
},
"deprecated": false,
"target": {
"file": "drivers/base/dd.c"
}
},
{
"id": "CVE-2023-53390-af4fae0c",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8e47e2bf78812adbd73c45c941d3c51add30b58d",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"232108639780167070369110370311636225311",
"33085565308642830366621163190277368428",
"121381277921269906456673368828569628650",
"168228628992673278938077582459605999509"
]
},
"deprecated": false,
"target": {
"file": "drivers/base/dd.c"
}
},
{
"id": "CVE-2023-53390-bf450e59",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7f1e53f88e8babf293ec052b70aa9d2a3554360c",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"232108639780167070369110370311636225311",
"33085565308642830366621163190277368428",
"121381277921269906456673368828569628650",
"168228628992673278938077582459605999509"
]
},
"deprecated": false,
"target": {
"file": "drivers/base/dd.c"
}
},
{
"id": "CVE-2023-53390-c1dcab07",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7f1e53f88e8babf293ec052b70aa9d2a3554360c",
"signature_type": "Function",
"digest": {
"function_hash": "275085736813893710099833775721149754957",
"length": 89.0
},
"deprecated": false,
"target": {
"function": "deferred_probe_exit",
"file": "drivers/base/dd.c"
}
},
{
"id": "CVE-2023-53390-f0e4a8ff",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5a7a9efdb193d3c8a35821548a8e99612c358828",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"232108639780167070369110370311636225311",
"33085565308642830366621163190277368428",
"121381277921269906456673368828569628650",
"168228628992673278938077582459605999509"
]
},
"deprecated": false,
"target": {
"file": "drivers/base/dd.c"
}
}
]