-
CVE-2023-53708
- EPSS 0.03%
- Veröffentlicht 22.10.2025 13:23:44
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects
In the Linux kernel, the following vulnerability has been resolved: ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects If a badly constructed firmware includes multiple `ACPI_TYPE_PACKAGE` objects while evaluating the AMD LPS0 _DSM, there will be a memory leak. Explicitly guard against this.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
146f1ed852a87b802ed6e71c31e189c64871383c
Version <
7b7964cd9db30bc84808a40d13a0633b4313f149
Status
affected
Version
146f1ed852a87b802ed6e71c31e189c64871383c
Version <
1ea7e47807279369c82718efd2677ea25c6579e3
Status
affected
Version
146f1ed852a87b802ed6e71c31e189c64871383c
Version <
9e8bbde9293151430884aed882a88eaa22298f72
Status
affected
Version
146f1ed852a87b802ed6e71c31e189c64871383c
Version <
883cf0d4cf288313b71146ddebdf5d647b76c78b
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.11
Status
affected
Version
0
Version <
5.11
Status
unaffected
Version <=
5.15.*
Version
5.15.133
Status
unaffected
Version <=
6.1.*
Version
6.1.55
Status
unaffected
Version <=
6.5.*
Version
6.5.5
Status
unaffected
Version <=
*
Version
6.6
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.093 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|