{"id":"CVE-2023-54064","summary":"ipmi:ssif: Fix a memory leak when scanning for an adapter","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nipmi:ssif: Fix a memory leak when scanning for an adapter\n\nThe adapter scan ssif_info_find() sets info-\u003eadapter_name if the adapter\ninfo came from SMBIOS, as it's not set in that case.  However, this\nfunction can be called more than once, and it will leak the adapter name\nif it had already been set.  So check for NULL before setting it.","modified":"2026-03-31T17:29:40.484115386Z","published":"2025-12-24T12:23:10.051Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54064.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/13623b966bb6d36ba61646b69cd49cdac6e4978a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3ad53071fe8547eb8d8813971844cc43246008ee"},{"type":"WEB","url":"https://git.kernel.org/stable/c/74a1194cce60a90723d0fe148863c18931a31153"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7db16d2e791bf2ec3e0249f56b7ec81c35bba6e6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b870caeb18041f856893066ded81c560db3d56cc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b8d72e32e1453d37ee5c8a219f24e7eeadc471ef"},{"type":"WEB","url":"https://git.kernel.org/stable/c/de677f4379fa67f650e367c188a0f80bee9b6732"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54064.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54064"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c4436c9149c5d2bc0c49ab57ec85c75ea1c4d61c"},{"fixed":"de677f4379fa67f650e367c188a0f80bee9b6732"},{"fixed":"13623b966bb6d36ba61646b69cd49cdac6e4978a"},{"fixed":"3ad53071fe8547eb8d8813971844cc43246008ee"},{"fixed":"74a1194cce60a90723d0fe148863c18931a31153"},{"fixed":"7db16d2e791bf2ec3e0249f56b7ec81c35bba6e6"},{"fixed":"b870caeb18041f856893066ded81c560db3d56cc"},{"fixed":"b8d72e32e1453d37ee5c8a219f24e7eeadc471ef"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54064.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.4.0"},{"fixed":"5.4.257"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.195"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.132"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.53"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.5.0"},{"fixed":"6.5.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54064.json"}}],"schema_version":"1.7.5"}