-

CVE-2023-53744

In the Linux kernel, the following vulnerability has been resolved:

soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe

wkup_m3_ipc_get() takes refcount, which should be freed by
wkup_m3_ipc_put(). Add missing refcount release in the error paths.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 08310f810975c8c9e17c6ffb99fdb76a84e8adb7
Version 5a99ae0092fe24fd581fdb6b9c2b48f94f92cf32
Status affected
Version < 6a50350033e0e0854acf59a8413913b4de04bd7d
Version 5a99ae0092fe24fd581fdb6b9c2b48f94f92cf32
Status affected
Version < 6dbcc493a18dd60947c2168a39df0ec2fe7b5110
Version 5a99ae0092fe24fd581fdb6b9c2b48f94f92cf32
Status affected
Version < e6c6b40c9bf49ce9b5493b146bfeb96359937cfa
Version 5a99ae0092fe24fd581fdb6b9c2b48f94f92cf32
Status affected
Version < 65305e8c0009a1933679dad5c8196060a10f3c8b
Version 5a99ae0092fe24fd581fdb6b9c2b48f94f92cf32
Status affected
Version < 8f3c307b580a4a6425896007325bddefc36e8d91
Version 5a99ae0092fe24fd581fdb6b9c2b48f94f92cf32
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.2
Status affected
Version < 5.2
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.180
Status unaffected
Version <= 5.15.*
Version 5.15.111
Status unaffected
Version <= 6.1.*
Version 6.1.28
Status unaffected
Version <= 6.2.*
Version 6.2.15
Status unaffected
Version <= 6.3.*
Version 6.3.2
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.057
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String