-

CVE-2023-53708

ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects

In the Linux kernel, the following vulnerability has been resolved:

ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects

If a badly constructed firmware includes multiple `ACPI_TYPE_PACKAGE`
objects while evaluating the AMD LPS0 _DSM, there will be a memory
leak.  Explicitly guard against this.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 146f1ed852a87b802ed6e71c31e189c64871383c
Version < 7b7964cd9db30bc84808a40d13a0633b4313f149
Status affected
Version 146f1ed852a87b802ed6e71c31e189c64871383c
Version < 1ea7e47807279369c82718efd2677ea25c6579e3
Status affected
Version 146f1ed852a87b802ed6e71c31e189c64871383c
Version < 9e8bbde9293151430884aed882a88eaa22298f72
Status affected
Version 146f1ed852a87b802ed6e71c31e189c64871383c
Version < 883cf0d4cf288313b71146ddebdf5d647b76c78b
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.11
Status affected
Version 0
Version < 5.11
Status unaffected
Version <= 5.15.*
Version 5.15.133
Status unaffected
Version <= 6.1.*
Version 6.1.55
Status unaffected
Version <= 6.5.*
Version 6.5.5
Status unaffected
Version <= *
Version 6.6
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.093
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.