-
CVE-2023-53650
- EPSS -
- Published 07.10.2025 15:19:47
- Last modified 07.10.2025 16:15:48
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: fbdev: omapfb: lcd_mipid: Fix an error handling path in mipid_spi_probe() If 'mipid_detect()' fails, we must free 'md' to avoid a memory leak.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
d97840bf5a388c6cbf6e46216887bf17be62acc2
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
Version <
7a8f9293bee51183023c5e37e7ebf0543cd2a134
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
Version <
9e3858f82e3ced1e990ef7116c3a16c84e62093e
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
Version <
ce6e0434e502abdf966164b7c72523fb5fe54635
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
Version <
716efd08985e3104031d1b655930b1f1c45fa8a7
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
Version <
3b4c21804076e461a6453ee4d09872172336aa1d
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
Version <
7cca0af3167dd9603da5fa6fff3392f8338e97e1
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
Version <
09ea1ae4a2ec17774892cfcff50f6d33dfa1e06f
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
Version <
79a3908d1ea6c35157a6d907b1a9d8ec06015e7a
Version
66d2f99d0bb5a2972fb5c1d88b61169510e540d6
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
2.6.32
Status
affected
Version <
2.6.32
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.322
Status
unaffected
Version <=
4.19.*
Version
4.19.291
Status
unaffected
Version <=
5.4.*
Version
5.4.251
Status
unaffected
Version <=
5.10.*
Version
5.10.188
Status
unaffected
Version <=
5.15.*
Version
5.15.121
Status
unaffected
Version <=
6.1.*
Version
6.1.39
Status
unaffected
Version <=
6.3.*
Version
6.3.13
Status
unaffected
Version <=
6.4.*
Version
6.4.4
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|