Home

Description

In the Linux kernel, the following vulnerability has been resolved: soc: aspeed: socinfo: Add kfree for kstrdup Add kfree() in the later error handling in order to avoid memory leak.

PUBLISHED Reserved 2025-10-04 | Published 2025-10-07 | Updated 2025-10-07 | Assigner Linux

Product status

Default status
unaffected

e0218dca5787c851b403fcbc33cdfec795446fca before dfb9676ed25be25ca7cd198d0f0e093b76b7bc7f
affected

e0218dca5787c851b403fcbc33cdfec795446fca before b662856b71343d9e731c1cd4bbe54758c7791abb
affected

e0218dca5787c851b403fcbc33cdfec795446fca before d9a5ad4477d2a11e9b03f00c52694451e9332228
affected

e0218dca5787c851b403fcbc33cdfec795446fca before 6e6d847a8ce18ab2fbec4f579f682486a82d2c6b
affected

Default status
affected

5.11
affected

Any version before 5.11
unaffected

5.15.128
unaffected

6.1.47
unaffected

6.4.12
unaffected

6.5
unaffected

References

git.kernel.org/...c/dfb9676ed25be25ca7cd198d0f0e093b76b7bc7f

git.kernel.org/...c/b662856b71343d9e731c1cd4bbe54758c7791abb

git.kernel.org/...c/d9a5ad4477d2a11e9b03f00c52694451e9332228

git.kernel.org/...c/6e6d847a8ce18ab2fbec4f579f682486a82d2c6b

cve.org (CVE-2023-53617)

nvd.nist.gov (CVE-2023-53617)

Download JSON