-
CVE-2023-53687
- EPSS 0.02%
- Veröffentlicht 07.10.2025 15:21:39
- Zuletzt bearbeitet 07.10.2025 16:15:53
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() when iterating clk When the best clk is searched, we iterate over all possible clk. If we find a better match, the previous one, if any, needs to be freed. If a better match has already been found, we still need to free the new one, otherwise it leaks.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
933e5b2998bc3a527d15efbf1e97c9e63297aa3c
Version
5f5a7a5578c5885201cf9c85856f023fe8b81765
Status
affected
Version <
01dd8a43a84616c830782166ba3cceb01ad95363
Version
5f5a7a5578c5885201cf9c85856f023fe8b81765
Status
affected
Version <
46574e5a0a2aee41e6ebb979cfe1dbaea8693e16
Version
5f5a7a5578c5885201cf9c85856f023fe8b81765
Status
affected
Version <
1962717c4649e026a4252fe6625175affd28a593
Version
5f5a7a5578c5885201cf9c85856f023fe8b81765
Status
affected
Version <
9dd8091959bc41fee51d0827276a2b982e84adf0
Version
5f5a7a5578c5885201cf9c85856f023fe8b81765
Status
affected
Version <
f0bf102ef9b05d7294bd8d506755465f6867d944
Version
5f5a7a5578c5885201cf9c85856f023fe8b81765
Status
affected
Version <
1f426293fef1c13742b2a685bf7e363f51f6ee03
Version
5f5a7a5578c5885201cf9c85856f023fe8b81765
Status
affected
Version <
832e231cff476102e8204a9e7bddfe5c6154a375
Version
5f5a7a5578c5885201cf9c85856f023fe8b81765
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.3
Status
affected
Version <
3.3
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.322
Status
unaffected
Version <=
4.19.*
Version
4.19.291
Status
unaffected
Version <=
5.4.*
Version
5.4.251
Status
unaffected
Version <=
5.10.*
Version
5.10.188
Status
unaffected
Version <=
5.15.*
Version
5.15.121
Status
unaffected
Version <=
6.1.*
Version
6.1.40
Status
unaffected
Version <=
6.4.*
Version
6.4.5
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.053 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|