In the Linux kernel, the following vulnerability has been resolved:
scsi: mpt3sas: Fix a memory leak
Add a forgotten kfree().
[
{
"id": "CVE-2023-53512-5eee9e70",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"278732444924799378611739763763989433587",
"335564365583451033403743946327601761997",
"240770484664046365985090796199908850528",
"332404202099641627496390359095207183292"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@28137ea3eb05a87329a7154a8ff410d9e8bcc0a5",
"target": {
"file": "drivers/scsi/mpt3sas/mpt3sas_base.c"
}
},
{
"id": "CVE-2023-53512-90402f39",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"278732444924799378611739763763989433587",
"335564365583451033403743946327601761997",
"240770484664046365985090796199908850528",
"332404202099641627496390359095207183292"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@378cc0eec4aa546ce1ae17515e2dfab719d4fb1e",
"target": {
"file": "drivers/scsi/mpt3sas/mpt3sas_base.c"
}
},
{
"id": "CVE-2023-53512-d8067ae9",
"signature_version": "v1",
"digest": {
"length": 3573.0,
"function_hash": "320639209662107958210716305721118550571"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@28137ea3eb05a87329a7154a8ff410d9e8bcc0a5",
"target": {
"file": "drivers/scsi/mpt3sas/mpt3sas_base.c",
"function": "_base_release_memory_pools"
}
},
{
"id": "CVE-2023-53512-f211d7bd",
"signature_version": "v1",
"digest": {
"length": 3573.0,
"function_hash": "320639209662107958210716305721118550571"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@378cc0eec4aa546ce1ae17515e2dfab719d4fb1e",
"target": {
"file": "drivers/scsi/mpt3sas/mpt3sas_base.c",
"function": "_base_release_memory_pools"
}
}
]