-

CVE-2023-53725

In the Linux kernel, the following vulnerability has been resolved:

clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe

Smatch reports:
drivers/clocksource/timer-cadence-ttc.c:529 ttc_timer_probe()
warn: 'timer_baseaddr' from of_iomap() not released on lines: 498,508,516.

timer_baseaddr may have the problem of not being released after use,
I replaced it with the devm_of_iomap() function and added the clk_put()
function to cleanup the "clk_ce" and "clk_cs".
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < e0a9cc90ea44a50d76a84f9f9bf1703d31fe45e9
Version e932900a3279b5dbb6d8f43c7b369003620e137c
Status affected
Version < 54cc10a0f4b01b522e9519014200f1b33bf7e4aa
Version e932900a3279b5dbb6d8f43c7b369003620e137c
Status affected
Version < ebdff0986513a29be242aace0ef89b6c105b0bf0
Version e932900a3279b5dbb6d8f43c7b369003620e137c
Status affected
Version < 289e2054eeb63c9e133960731c342eeffad218d3
Version e932900a3279b5dbb6d8f43c7b369003620e137c
Status affected
Version < 919dd531ebb7514f205ae7aab87994337ebce1f6
Version e932900a3279b5dbb6d8f43c7b369003620e137c
Status affected
Version < 67d7eebbc424935dec61fb352d1ccae5d16cf429
Version e932900a3279b5dbb6d8f43c7b369003620e137c
Status affected
Version < 99744200f28b2cf5f50767447e51b4b4a977d145
Version e932900a3279b5dbb6d8f43c7b369003620e137c
Status affected
Version < 8b5bf64c89c7100c921bd807ba39b2eb003061ab
Version e932900a3279b5dbb6d8f43c7b369003620e137c
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.10
Status affected
Version < 3.10
Version 0
Status unaffected
Version <= 4.19.*
Version 4.19.291
Status unaffected
Version <= 5.4.*
Version 5.4.251
Status unaffected
Version <= 5.10.*
Version 5.10.188
Status unaffected
Version <= 5.15.*
Version 5.15.121
Status unaffected
Version <= 6.1.*
Version 6.1.39
Status unaffected
Version <= 6.3.*
Version 6.3.13
Status unaffected
Version <= 6.4.*
Version 6.4.4
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.096
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String