-
CVE-2023-53435
- EPSS 0.03%
- Published 18.09.2025 16:15:47
- Last modified 19.09.2025 16:00:27
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: cassini: Fix a memory leak in the error handling path of cas_init_one() cas_saturn_firmware_init() allocates some memory using vmalloc(). This memory is freed in the .remove() function but not it the error handling path of the probe. Add the missing vfree() to avoid a memory leak, should an error occur.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
11c0ed097a874156957b515d0ba7e356142eab87
Version
fcaa40669cd798ca2ac0d15441e8a1d1145f2b16
Status
affected
Version <
60d8e8b88087d68e10c8991a0f6733fa2f963ff0
Version
fcaa40669cd798ca2ac0d15441e8a1d1145f2b16
Status
affected
Version <
e20105d967ab5b53ff50a0e5991fe37324d2ba20
Version
fcaa40669cd798ca2ac0d15441e8a1d1145f2b16
Status
affected
Version <
dc61f7582cc92d547d02e141cd66f5d1f4ed8012
Version
fcaa40669cd798ca2ac0d15441e8a1d1145f2b16
Status
affected
Version <
234e744d86bd95b381d24546df2dba72804e0219
Version
fcaa40669cd798ca2ac0d15441e8a1d1145f2b16
Status
affected
Version <
172146c26f0c1b86ab4e9ebffc7e06f04229fa17
Version
fcaa40669cd798ca2ac0d15441e8a1d1145f2b16
Status
affected
Version <
b8b1a667744741fa7807b09a12797a27f14f3fac
Version
fcaa40669cd798ca2ac0d15441e8a1d1145f2b16
Status
affected
Version <
412cd77a2c24b191c65ea53025222418db09817c
Version
fcaa40669cd798ca2ac0d15441e8a1d1145f2b16
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
2.6.28
Status
affected
Version <
2.6.28
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.316
Status
unaffected
Version <=
4.19.*
Version
4.19.284
Status
unaffected
Version <=
5.4.*
Version
5.4.244
Status
unaffected
Version <=
5.10.*
Version
5.10.181
Status
unaffected
Version <=
5.15.*
Version
5.15.113
Status
unaffected
Version <=
6.1.*
Version
6.1.30
Status
unaffected
Version <=
6.3.*
Version
6.3.4
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.078 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|