CVE-2023-53744
Awaiting Analysis
Awaiting Analysis - Queue
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
In the Linux kernel, the following vulnerability has been resolved:
soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe
wkup_m3_ipc_get() takes refcount, which should be freed by
wkup_m3_ipc_put(). Add missing refcount release in the error paths.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a reference count leak in the Linux kernel's soc: ti: pm33xx driver. Specifically, the function wkup_m3_ipc_get() increments a reference count that should be decremented by wkup_m3_ipc_put(), but the decrement was missing in certain error paths, causing the reference count to leak.
How can this vulnerability impact me? :
The reference count leak can lead to resource management issues within the kernel, potentially causing memory leaks or preventing proper cleanup of resources, which may degrade system stability or performance over time.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70