In the Linux kernel, the following vulnerability has been resolved:
soc: aspeed: socinfo: Add kfree for kstrdup
Add kfree() in the later error handling in order to avoid memory leak.
[
{
"id": "CVE-2023-53617-1d832376",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d9a5ad4477d2a11e9b03f00c52694451e9332228",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"72144918115452157587892894753240784944",
"180898061891718695215361544199393638779",
"13673508682356349719118320385510969272",
"135073739250129240746053247668435463607"
]
},
"deprecated": false,
"target": {
"file": "drivers/soc/aspeed/aspeed-socinfo.c"
}
},
{
"id": "CVE-2023-53617-2b208d53",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dfb9676ed25be25ca7cd198d0f0e093b76b7bc7f",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"72144918115452157587892894753240784944",
"180898061891718695215361544199393638779",
"13673508682356349719118320385510969272",
"135073739250129240746053247668435463607"
]
},
"deprecated": false,
"target": {
"file": "drivers/soc/aspeed/aspeed-socinfo.c"
}
},
{
"id": "CVE-2023-53617-484c30c4",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d9a5ad4477d2a11e9b03f00c52694451e9332228",
"signature_type": "Function",
"digest": {
"function_hash": "180206692477054550399815160112044143340",
"length": 1288.0
},
"deprecated": false,
"target": {
"function": "aspeed_socinfo_init",
"file": "drivers/soc/aspeed/aspeed-socinfo.c"
}
},
{
"id": "CVE-2023-53617-4dd84b8d",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e6d847a8ce18ab2fbec4f579f682486a82d2c6b",
"signature_type": "Function",
"digest": {
"function_hash": "180206692477054550399815160112044143340",
"length": 1288.0
},
"deprecated": false,
"target": {
"function": "aspeed_socinfo_init",
"file": "drivers/soc/aspeed/aspeed-socinfo.c"
}
},
{
"id": "CVE-2023-53617-870cd6c0",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dfb9676ed25be25ca7cd198d0f0e093b76b7bc7f",
"signature_type": "Function",
"digest": {
"function_hash": "180206692477054550399815160112044143340",
"length": 1288.0
},
"deprecated": false,
"target": {
"function": "aspeed_socinfo_init",
"file": "drivers/soc/aspeed/aspeed-socinfo.c"
}
},
{
"id": "CVE-2023-53617-903d33ba",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b662856b71343d9e731c1cd4bbe54758c7791abb",
"signature_type": "Function",
"digest": {
"function_hash": "180206692477054550399815160112044143340",
"length": 1288.0
},
"deprecated": false,
"target": {
"function": "aspeed_socinfo_init",
"file": "drivers/soc/aspeed/aspeed-socinfo.c"
}
},
{
"id": "CVE-2023-53617-b2c14c5e",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e6d847a8ce18ab2fbec4f579f682486a82d2c6b",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"72144918115452157587892894753240784944",
"180898061891718695215361544199393638779",
"13673508682356349719118320385510969272",
"135073739250129240746053247668435463607"
]
},
"deprecated": false,
"target": {
"file": "drivers/soc/aspeed/aspeed-socinfo.c"
}
},
{
"id": "CVE-2023-53617-ff83a835",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b662856b71343d9e731c1cd4bbe54758c7791abb",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"72144918115452157587892894753240784944",
"180898061891718695215361544199393638779",
"13673508682356349719118320385510969272",
"135073739250129240746053247668435463607"
]
},
"deprecated": false,
"target": {
"file": "drivers/soc/aspeed/aspeed-socinfo.c"
}
}
]