-

CVE-2023-53288

In the Linux kernel, the following vulnerability has been resolved:

drm/client: Fix memory leak in drm_client_modeset_probe

When a new mode is set to modeset->mode, the previous mode should be freed.
This fixes the following kmemleak report:

drm_mode_duplicate+0x45/0x220 [drm]
drm_client_modeset_probe+0x944/0xf50 [drm]
__drm_fb_helper_initial_config_and_unlock+0xb4/0x2c0 [drm_kms_helper]
drm_fbdev_client_hotplug+0x2bc/0x4d0 [drm_kms_helper]
drm_client_register+0x169/0x240 [drm]
ast_pci_probe+0x142/0x190 [ast]
local_pci_probe+0xdc/0x180
work_for_cpu_fn+0x4e/0xa0
process_one_work+0x8b7/0x1540
worker_thread+0x70a/0xed0
kthread+0x29f/0x340
ret_from_fork+0x1f/0x30

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 5d580017bdb9b3e930b6009e467e5e1589f8ca8a
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 5f2a12f64347f535c6ef55fa7eb36a2874d69b59
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 1369d0c586ad44f2d18fe2f4cbc5bcb24132fa71
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 917bef37cfaca07781c6fbaf6cd9404d27e64e6f
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 8108a494639e56aea77e7196a1d6ea89792b9d4a
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2329cc7a101af1a844fbf706c0724c0baea38365
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 5.4.*
Version 5.4.251
Status unaffected
Version <= 5.10.*
Version 5.10.188
Status unaffected
Version <= 5.15.*
Version 5.15.123
Status unaffected
Version <= 6.1.*
Version 6.1.42
Status unaffected
Version <= 6.4.*
Version 6.4.7
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string