In the Linux kernel, the following vulnerability has been resolved:
kernel/printk/index.c: fix memory leak with using debugfs_lookup()
When calling debugfslookup() the result must have dput() called on it, otherwise the memory will leak over time. To make things simpler, just call debugfslookupandremove() instead which handles all of the logic at once.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53402.json",
"cna_assigner": "Linux"
}[
{
"id": "CVE-2023-53402-5b09fe5d",
"signature_version": "v1",
"digest": {
"function_hash": "181219029980563047064398406440098025082",
"length": 102.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@13969236b6900b5a3625ad2193569588e978f1cc",
"signature_type": "Function",
"target": {
"file": "kernel/printk/index.c",
"function": "pi_remove_file"
}
},
{
"id": "CVE-2023-53402-5fbfb697",
"signature_version": "v1",
"digest": {
"function_hash": "181219029980563047064398406440098025082",
"length": 102.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c578a68ffcdc2e8c72556bebdaae2b7500398e81",
"signature_type": "Function",
"target": {
"file": "kernel/printk/index.c",
"function": "pi_remove_file"
}
},
{
"id": "CVE-2023-53402-75143c3d",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"56367658880353108436417058180971537915",
"147623947007239259709207611544555436237",
"51350461046886615788595541161554632952",
"268512322166876546481617576429499951824"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c578a68ffcdc2e8c72556bebdaae2b7500398e81",
"signature_type": "Line",
"target": {
"file": "kernel/printk/index.c"
}
},
{
"id": "CVE-2023-53402-7fb712a7",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"56367658880353108436417058180971537915",
"147623947007239259709207611544555436237",
"51350461046886615788595541161554632952",
"268512322166876546481617576429499951824"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@55bf243c514553e907efcf2bda92ba090eca8c64",
"signature_type": "Line",
"target": {
"file": "kernel/printk/index.c"
}
},
{
"id": "CVE-2023-53402-b42e2693",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"56367658880353108436417058180971537915",
"147623947007239259709207611544555436237",
"51350461046886615788595541161554632952",
"268512322166876546481617576429499951824"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@13969236b6900b5a3625ad2193569588e978f1cc",
"signature_type": "Line",
"target": {
"file": "kernel/printk/index.c"
}
},
{
"id": "CVE-2023-53402-dac7009d",
"signature_version": "v1",
"digest": {
"function_hash": "181219029980563047064398406440098025082",
"length": 102.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@55bf243c514553e907efcf2bda92ba090eca8c64",
"signature_type": "Function",
"target": {
"file": "kernel/printk/index.c",
"function": "pi_remove_file"
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53402.json"