{"id":"CVE-2023-53746","summary":"s390/vfio-ap: fix memory leak in vfio_ap device driver","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ns390/vfio-ap: fix memory leak in vfio_ap device driver\n\nThe device release callback function invoked to release the matrix device\nuses the dev_get_drvdata(device *dev) function to retrieve the\npointer to the vfio_matrix_dev object in order to free its storage. The\nproblem is, this object is not stored as drvdata with the device; since the\nkfree function will accept a NULL pointer, the memory for the\nvfio_matrix_dev object is never freed.\n\nSince the device being released is contained within the vfio_matrix_dev\nobject, the container_of macro will be used to retrieve its pointer.","modified":"2026-04-02T09:45:03.727315Z","published":"2025-12-08T01:19:05.204Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0316-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53746.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/5195de1d5f66b276683240a896783f7f43c4f664"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6a40fda14b4be3e38f03cc42ffd4efbc64fb3e67"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7b6a02f5bf15931464c79dfd487c57f76aae3496"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8f8cf767589f2131ae5d40f3758429095c701c84"},{"type":"WEB","url":"https://git.kernel.org/stable/c/aa2bff25e9bb10c935c7ffe3d5f5975bdccb1749"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ee17dea3072dec0bc34399a32fa884e26342e4ea"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53746.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53746"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1fde573413b549d52183382e639c1d6ce88f5959"},{"fixed":"5195de1d5f66b276683240a896783f7f43c4f664"},{"fixed":"ee17dea3072dec0bc34399a32fa884e26342e4ea"},{"fixed":"aa2bff25e9bb10c935c7ffe3d5f5975bdccb1749"},{"fixed":"6a40fda14b4be3e38f03cc42ffd4efbc64fb3e67"},{"fixed":"7b6a02f5bf15931464c79dfd487c57f76aae3496"},{"fixed":"8f8cf767589f2131ae5d40f3758429095c701c84"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53746.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.240"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.177"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.106"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.23"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.2.10"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53746.json"}}],"schema_version":"1.7.5"}