{"id":"CVE-2023-53303","summary":"net: microchip: vcap api: Fix possible memory leak for vcap_dup_rule()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: microchip: vcap api: Fix possible memory leak for vcap_dup_rule()\n\nInject fault When select CONFIG_VCAP_KUNIT_TEST, the below memory leak\noccurs. If kzalloc() for duprule succeeds, but the following\nkmemdup() fails, the duprule, ckf and caf memory will be leaked. So kfree\nthem in the error path.\n\nunreferenced object 0xffff122744c50600 (size 192):\n  comm \"kunit_try_catch\", pid 346, jiffies 4294896122 (age 911.812s)\n  hex dump (first 32 bytes):\n    10 27 00 00 04 00 00 00 1e 00 00 00 2c 01 00 00  .'..........,...\n    00 00 00 00 00 00 00 00 18 06 c5 44 27 12 ff ff  ...........D'...\n  backtrace:\n    [\u003c00000000394b0db8\u003e] __kmem_cache_alloc_node+0x274/0x2f8\n    [\u003c0000000001bedc67\u003e] kmalloc_trace+0x38/0x88\n    [\u003c00000000b0612f98\u003e] vcap_dup_rule+0x50/0x460\n    [\u003c000000005d2d3aca\u003e] vcap_add_rule+0x8cc/0x1038\n    [\u003c00000000eef9d0f8\u003e] test_vcap_xn_rule_creator.constprop.0.isra.0+0x238/0x494\n    [\u003c00000000cbda607b\u003e] vcap_api_rule_remove_in_front_test+0x1ac/0x698\n    [\u003c00000000c8766299\u003e] kunit_try_run_case+0xe0/0x20c\n    [\u003c00000000c4fe9186\u003e] kunit_generic_run_threadfn_adapter+0x50/0x94\n    [\u003c00000000f6864acf\u003e] kthread+0x2e8/0x374\n    [\u003c0000000022e639b3\u003e] ret_from_fork+0x10/0x20","modified":"2026-04-11T12:46:44.771084Z","published":"2025-09-16T08:11:33.842Z","related":["SUSE-SU-2025:03600-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53303.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/281f65d29d6da1a9b6907fb0b145aaf34f4e4822"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a26ba60413b2c8f95daf0ee0152cf82abd7bfbe4"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53303.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53303"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"814e7693207f1bd936d600f9b5467f133e3d6e40"},{"fixed":"a26ba60413b2c8f95daf0ee0152cf82abd7bfbe4"},{"fixed":"281f65d29d6da1a9b6907fb0b145aaf34f4e4822"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53303.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"6.3.0"},{"fixed":"6.5.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53303.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}