-
CVE-2023-53533
- EPSS 0.03%
- Veröffentlicht 04.10.2025 15:16:45
- Zuletzt bearbeitet 06.10.2025 14:56:21
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: Input: raspberrypi-ts - fix refcount leak in rpi_ts_probe rpi_firmware_get() take reference, we need to release it in error paths as well. Use devm_rpi_firmware_get() helper to handling the resources. Also remove the existing rpi_firmware_put().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
1dfa3c9dd27bdc347733d06e980395768520bc3e
Version
0b9f28fed3f70ff9a0380fe308739dd72a30a6f6
Status
affected
Version <
0d6a5c9489c8a3d434e685066119c4333476dccd
Version
0b9f28fed3f70ff9a0380fe308739dd72a30a6f6
Status
affected
Version <
7acad58049acc6ac148e8b613a6eceeca4bcb4a7
Version
0b9f28fed3f70ff9a0380fe308739dd72a30a6f6
Status
affected
Version <
36d087e49dabd28d2c13a7532dac72d625ce69fb
Version
0b9f28fed3f70ff9a0380fe308739dd72a30a6f6
Status
affected
Version <
9dbbe9db224c23a60dc7b1e00c701be93328c873
Version
0b9f28fed3f70ff9a0380fe308739dd72a30a6f6
Status
affected
Version <
9216aa5cfd86809a2681be3683cd9ac30432de0c
Version
0b9f28fed3f70ff9a0380fe308739dd72a30a6f6
Status
affected
Version <
5bca3688bdbc3b58a2894b8671a8e2378efe28bd
Version
0b9f28fed3f70ff9a0380fe308739dd72a30a6f6
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.0
Status
affected
Version <
5.0
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.243
Status
unaffected
Version <=
5.10.*
Version
5.10.180
Status
unaffected
Version <=
5.15.*
Version
5.15.111
Status
unaffected
Version <=
6.1.*
Version
6.1.28
Status
unaffected
Version <=
6.2.*
Version
6.2.15
Status
unaffected
Version <=
6.3.*
Version
6.3.2
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.083 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|