-
CVE-2023-53567
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:17:09
- Zuletzt bearbeitet 06.10.2025 14:56:21
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: spi: qup: Don't skip cleanup in remove's error path Returning early in a platform driver's remove callback is wrong. In this case the dma resources are not released in the error path. this is never retried later and so this is a permanent leak. To fix this, only skip hardware disabling if waking the device fails.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
fd53f41bd86daa39b454fd4637a908ff2123547f
Version
64ff247a978facc437d40f0c9b754675846a98f0
Status
affected
Version <
8632384337038b97910c2f7bb5a3f377aa68d001
Version
64ff247a978facc437d40f0c9b754675846a98f0
Status
affected
Version <
bc88243bbe6140d289bb32b4ee4607ba5ce1124a
Version
64ff247a978facc437d40f0c9b754675846a98f0
Status
affected
Version <
f345d4d71e87d878437417ffbb9a7d4e16d235eb
Version
64ff247a978facc437d40f0c9b754675846a98f0
Status
affected
Version <
2d0f63077f481f11a07f20eab1c1f4367dfaef32
Version
64ff247a978facc437d40f0c9b754675846a98f0
Status
affected
Version <
55ecdcd12bc176b86fecbcb125ac814ac8fe857a
Version
64ff247a978facc437d40f0c9b754675846a98f0
Status
affected
Version <
49c17fccae36505550c9121891722fff337f148a
Version
64ff247a978facc437d40f0c9b754675846a98f0
Status
affected
Version <
61f49171a43ab1f80c73c5c88c508770c461e0f2
Version
64ff247a978facc437d40f0c9b754675846a98f0
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.15
Status
affected
Version <
3.15
Version
0
Status
unaffected
Version <=
4.19.*
Version
4.19.283
Status
unaffected
Version <=
5.4.*
Version
5.4.243
Status
unaffected
Version <=
5.10.*
Version
5.10.180
Status
unaffected
Version <=
5.15.*
Version
5.15.111
Status
unaffected
Version <=
6.1.*
Version
6.1.28
Status
unaffected
Version <=
6.2.*
Version
6.2.15
Status
unaffected
Version <=
6.3.*
Version
6.3.2
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.053 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|