-

CVE-2023-54111

In the Linux kernel, the following vulnerability has been resolved:

pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups

of_find_node_by_phandle() returns a node pointer with refcount incremented,
We should use of_node_put() on it when not needed anymore.
Add missing of_node_put() to avoid refcount leak.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < aa017ab5716c9157c65fdce061c4a4a568af53a8
Version d3e5116119bd02ea7716bbe04b39c21bba4bcf42
Status affected
Version < 5868013522297bf628eee4322d99d6d4de4f308e
Version d3e5116119bd02ea7716bbe04b39c21bba4bcf42
Status affected
Version < 954a7a0011d94475f8ba5ceb77a5d11e01cf402f
Version d3e5116119bd02ea7716bbe04b39c21bba4bcf42
Status affected
Version < d562054a3a2eede3507a5461011ee82b671fcb88
Version d3e5116119bd02ea7716bbe04b39c21bba4bcf42
Status affected
Version < 0f735f232ff59863e0b6ebac0849d637e215a9c2
Version d3e5116119bd02ea7716bbe04b39c21bba4bcf42
Status affected
Version < dbef00ef4b9b98d15183340396e5df0fa7a860d8
Version d3e5116119bd02ea7716bbe04b39c21bba4bcf42
Status affected
Version < 3c40b34e3462aab12af3dba77d2e1602afc72e80
Version d3e5116119bd02ea7716bbe04b39c21bba4bcf42
Status affected
Version < c818ae563bf99457f02e8170aabd6b174f629f65
Version d3e5116119bd02ea7716bbe04b39c21bba4bcf42
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.11
Status affected
Version < 3.11
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.308
Status unaffected
Version <= 4.19.*
Version 4.19.276
Status unaffected
Version <= 5.4.*
Version 5.4.270
Status unaffected
Version <= 5.10.*
Version 5.10.173
Status unaffected
Version <= 5.15.*
Version 5.15.99
Status unaffected
Version <= 6.1.*
Version 6.1.16
Status unaffected
Version <= 6.2.*
Version 6.2.3
Status unaffected
Version <= *
Version 6.3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.