-
CVE-2023-53617
- EPSS -
- Published 07.10.2025 15:19:24
- Last modified 07.10.2025 16:15:44
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: soc: aspeed: socinfo: Add kfree for kstrdup Add kfree() in the later error handling in order to avoid memory leak.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
dfb9676ed25be25ca7cd198d0f0e093b76b7bc7f
Version
e0218dca5787c851b403fcbc33cdfec795446fca
Status
affected
Version <
b662856b71343d9e731c1cd4bbe54758c7791abb
Version
e0218dca5787c851b403fcbc33cdfec795446fca
Status
affected
Version <
d9a5ad4477d2a11e9b03f00c52694451e9332228
Version
e0218dca5787c851b403fcbc33cdfec795446fca
Status
affected
Version <
6e6d847a8ce18ab2fbec4f579f682486a82d2c6b
Version
e0218dca5787c851b403fcbc33cdfec795446fca
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.11
Status
affected
Version <
5.11
Version
0
Status
unaffected
Version <=
5.15.*
Version
5.15.128
Status
unaffected
Version <=
6.1.*
Version
6.1.47
Status
unaffected
Version <=
6.4.*
Version
6.4.12
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|