-
CVE-2023-53391
- EPSS 0.02%
- Published 18.09.2025 13:33:33
- Last modified 19.09.2025 16:00:27
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs As the ramfs-based tmpfs uses ramfs_init_fs_context() for the init_fs_context method, which allocates fc->s_fs_info, use ramfs_kill_sb() to free it and avoid a memory leak.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
5fada375113767b3b57f1b04f7a4fe64ffaa626f
Version
c3b1b1cbf002e65a3cabd479e68b5f35886a26db
Status
affected
Version <
487f229efea80c00dd7397547ec4f25fb8999d99
Version
c3b1b1cbf002e65a3cabd479e68b5f35886a26db
Status
affected
Version <
1f34bf8b442c6d720e7fa6f15e8702427e48aea9
Version
c3b1b1cbf002e65a3cabd479e68b5f35886a26db
Status
affected
Version <
ebe07db840992a3886694ac3d303b06f4b70ce00
Version
c3b1b1cbf002e65a3cabd479e68b5f35886a26db
Status
affected
Version <
36ce9d76b0a93bae799e27e4f5ac35478c676592
Version
c3b1b1cbf002e65a3cabd479e68b5f35886a26db
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
2.6.30
Status
affected
Version <
2.6.30
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.188
Status
unaffected
Version <=
5.15.*
Version
5.15.121
Status
unaffected
Version <=
6.1.*
Version
6.1.39
Status
unaffected
Version <=
6.4.*
Version
6.4.4
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.047 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|