-
CVE-2023-54101
- EPSS 0.03%
- Veröffentlicht 24.12.2025 13:06:27
- Zuletzt bearbeitet 29.12.2025 15:58:34
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: driver: soc: xilinx: use _safe loop iterator to avoid a use after free The hash_for_each_possible() loop dereferences "eve_data" to get the next item on the list. However the loop frees eve_data so it leads to a use after free. Use hash_for_each_possible_safe() instead.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
49fca83f6f3f0cafe5bf5b43e8ee81cf73c2d5e0
Version
c7fdb2404f66131bc9c22e06f712717288826487
Status
affected
Version <
f16599e638073ef0b2828bb64f5e99138e9381b5
Version
c7fdb2404f66131bc9c22e06f712717288826487
Status
affected
Version <
256aace3a5d8c987183ba4832dffb36f48ea7d3b
Version
c7fdb2404f66131bc9c22e06f712717288826487
Status
affected
Version <
c58da0ba3e5c86e51e2c1557afaf6f71e00c4533
Version
c7fdb2404f66131bc9c22e06f712717288826487
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.17
Status
affected
Version <
5.17
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.39
Status
unaffected
Version <=
6.3.*
Version
6.3.13
Status
unaffected
Version <=
6.4.*
Version
6.4.4
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.064 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|