-
CVE-2023-53650
- EPSS -
- Veröffentlicht 07.10.2025 15:19:47
- Zuletzt bearbeitet 07.10.2025 16:15:48
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: fbdev: omapfb: lcd_mipid: Fix an error handling path in mipid_spi_probe() If 'mipid_detect()' fails, we must free 'md' to avoid a memory leak.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
d97840bf5a388c6cbf6e46216887bf17be62acc2
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
Version <
7a8f9293bee51183023c5e37e7ebf0543cd2a134
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
Version <
9e3858f82e3ced1e990ef7116c3a16c84e62093e
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
Version <
ce6e0434e502abdf966164b7c72523fb5fe54635
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
Version <
716efd08985e3104031d1b655930b1f1c45fa8a7
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
Version <
3b4c21804076e461a6453ee4d09872172336aa1d
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
Version <
7cca0af3167dd9603da5fa6fff3392f8338e97e1
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
Version <
09ea1ae4a2ec17774892cfcff50f6d33dfa1e06f
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
Version <
79a3908d1ea6c35157a6d907b1a9d8ec06015e7a
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.32
Status
affected
Version <
2.6.32
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.322
Status
unaffected
Version <=
4.19.*
Version
4.19.291
Status
unaffected
Version <=
5.4.*
Version
5.4.251
Status
unaffected
Version <=
5.10.*
Version
5.10.188
Status
unaffected
Version <=
5.15.*
Version
5.15.121
Status
unaffected
Version <=
6.1.*
Version
6.1.39
Status
unaffected
Version <=
6.3.*
Version
6.3.13
Status
unaffected
Version <=
6.4.*
Version
6.4.4
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|