-

CVE-2023-53687

In the Linux kernel, the following vulnerability has been resolved:

tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() when iterating clk

When the best clk is searched, we iterate over all possible clk.

If we find a better match, the previous one, if any, needs to be freed.
If a better match has already been found, we still need to free the new
one, otherwise it leaks.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 933e5b2998bc3a527d15efbf1e97c9e63297aa3c
Version 5f5a7a5578c5885201cf9c85856f023fe8b81765
Status affected
Version < 01dd8a43a84616c830782166ba3cceb01ad95363
Version 5f5a7a5578c5885201cf9c85856f023fe8b81765
Status affected
Version < 46574e5a0a2aee41e6ebb979cfe1dbaea8693e16
Version 5f5a7a5578c5885201cf9c85856f023fe8b81765
Status affected
Version < 1962717c4649e026a4252fe6625175affd28a593
Version 5f5a7a5578c5885201cf9c85856f023fe8b81765
Status affected
Version < 9dd8091959bc41fee51d0827276a2b982e84adf0
Version 5f5a7a5578c5885201cf9c85856f023fe8b81765
Status affected
Version < f0bf102ef9b05d7294bd8d506755465f6867d944
Version 5f5a7a5578c5885201cf9c85856f023fe8b81765
Status affected
Version < 1f426293fef1c13742b2a685bf7e363f51f6ee03
Version 5f5a7a5578c5885201cf9c85856f023fe8b81765
Status affected
Version < 832e231cff476102e8204a9e7bddfe5c6154a375
Version 5f5a7a5578c5885201cf9c85856f023fe8b81765
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.3
Status affected
Version < 3.3
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.322
Status unaffected
Version <= 4.19.*
Version 4.19.291
Status unaffected
Version <= 5.4.*
Version 5.4.251
Status unaffected
Version <= 5.10.*
Version 5.10.188
Status unaffected
Version <= 5.15.*
Version 5.15.121
Status unaffected
Version <= 6.1.*
Version 6.1.40
Status unaffected
Version <= 6.4.*
Version 6.4.5
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string