In the Linux kernel, the following vulnerability has been resolved:
clk: tegra: tegra124-emc: Fix potential memory leak
The tegra and tegra needs to be freed in the error handling path, otherwise it will be leaked.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53505.json",
"cna_assigner": "Linux"
}[
{
"target": {
"function": "load_timings_from_dt",
"file": "drivers/clk/tegra/clk-tegra124-emc.c"
},
"id": "CVE-2023-53505-08f18661",
"digest": {
"function_hash": "32426744389946849012636457263662181079",
"length": 679.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@96bafece6ff380138896f009141fd7337070e680",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function"
},
{
"target": {
"function": "tegra124_clk_register_emc",
"file": "drivers/clk/tegra/clk-tegra124-emc.c"
},
"id": "CVE-2023-53505-68ab41a2",
"digest": {
"function_hash": "278721404490550843241638382841498706540",
"length": 1269.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@96bafece6ff380138896f009141fd7337070e680",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function"
},
{
"target": {
"file": "drivers/clk/tegra/clk-tegra124-emc.c"
},
"id": "CVE-2023-53505-ef9e0aed",
"digest": {
"line_hashes": [
"85165058593264896015300868537593335424",
"116641809366576869677897813783733996102",
"132956128377865410307659462462670669074",
"20528971894686578628507301203332714850",
"244965380324573889446123386774284162448",
"138063689136697049144899234104778444790",
"271467463936227331823407010137590480730",
"96946178715754437176966466901811559939"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@96bafece6ff380138896f009141fd7337070e680",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53505.json"