CVE-2023-52663

In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: amd: Fix memory leak in amd_sof_acp_probe() Driver uses kasprintf() to initialize fw_{code,data}_bin members of struct acp_dev_data, but kfree() is never called to deallocate the memory, which results in a memory leak. Fix the issue by switching to devm_kasprintf(). Additionally, ensure the allocation was successful by checking the pointer validity.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

07 Jan 2025, 16:58

Type Values Removed Values Added
CWE CWE-401
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/222be59e5eed1554119294edc743ee548c2371d0 - () https://git.kernel.org/stable/c/222be59e5eed1554119294edc743ee548c2371d0 - Patch
References () https://git.kernel.org/stable/c/7296152e58858f928db448826eb7ba5ae611297b - () https://git.kernel.org/stable/c/7296152e58858f928db448826eb7ba5ae611297b - Patch
References () https://git.kernel.org/stable/c/88028c45d5871dfc449b2b0a27abf6428453a5ec - () https://git.kernel.org/stable/c/88028c45d5871dfc449b2b0a27abf6428453a5ec - Patch
References () https://git.kernel.org/stable/c/be4760799c6a7c01184467287f0de41e0dd255f8 - () https://git.kernel.org/stable/c/be4760799c6a7c01184467287f0de41e0dd255f8 - Patch

21 Nov 2024, 08:40

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: ASoC: SOF: amd: corrige la pérdida de memoria en amd_sof_acp_probe() El controlador usa kasprintf() para inicializar los miembros fw_{code,data}_bin de la estructura acp_dev_data, pero kfree() nunca se llama para desasignar la memoria, lo que resulta en una pérdida de memoria. Solucione el problema cambiando a devm_kasprintf(). Además, asegúrese de que la asignación se haya realizado correctamente comprobando la validez del puntero.
References () https://git.kernel.org/stable/c/222be59e5eed1554119294edc743ee548c2371d0 - () https://git.kernel.org/stable/c/222be59e5eed1554119294edc743ee548c2371d0 -
References () https://git.kernel.org/stable/c/7296152e58858f928db448826eb7ba5ae611297b - () https://git.kernel.org/stable/c/7296152e58858f928db448826eb7ba5ae611297b -
References () https://git.kernel.org/stable/c/88028c45d5871dfc449b2b0a27abf6428453a5ec - () https://git.kernel.org/stable/c/88028c45d5871dfc449b2b0a27abf6428453a5ec -
References () https://git.kernel.org/stable/c/be4760799c6a7c01184467287f0de41e0dd255f8 - () https://git.kernel.org/stable/c/be4760799c6a7c01184467287f0de41e0dd255f8 -

17 May 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-17 14:15

Updated : 2025-01-07 16:58


NVD link : CVE-2023-52663

Mitre link : CVE-2023-52663

CVE.ORG link : CVE-2023-52663


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime