In the Linux kernel, the following vulnerability has been resolved:
drm/client: Fix memory leak in drm_client_modeset_probe
When a new mode is set to modeset->mode, the previous mode should be freed.
This fixes the following kmemleak report:
drm_mode_duplicate+0x45/0x220 [drm]
drm_client_modeset_probe+0x944/0xf50 [drm]
__drm_fb_helper_initial_config_and_unlock+0xb4/0x2c0 [drm_kms_helper]
drm_fbdev_client_hotplug+0x2bc/0x4d0 [drm_kms_helper]
drm_client_register+0x169/0x240 [drm]
ast_pci_probe+0x142/0x190 [ast]
local_pci_probe+0xdc/0x180
work_for_cpu_fn+0x4e/0xa0
process_one_work+0x8b7/0x1540
worker_thread+0x70a/0xed0
kthread+0x29f/0x340
ret_from_fork+0x1f/0x30
References
Configurations
Configuration 1 (hide)
|
History
03 Dec 2025, 16:44
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-401 | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/1369d0c586ad44f2d18fe2f4cbc5bcb24132fa71 - Patch | |
| References | () https://git.kernel.org/stable/c/2329cc7a101af1a844fbf706c0724c0baea38365 - Patch | |
| References | () https://git.kernel.org/stable/c/5d580017bdb9b3e930b6009e467e5e1589f8ca8a - Patch | |
| References | () https://git.kernel.org/stable/c/5f2a12f64347f535c6ef55fa7eb36a2874d69b59 - Patch | |
| References | () https://git.kernel.org/stable/c/8108a494639e56aea77e7196a1d6ea89792b9d4a - Patch | |
| References | () https://git.kernel.org/stable/c/917bef37cfaca07781c6fbaf6cd9404d27e64e6f - Patch |
Information
Published : 2025-09-16 08:15
Updated : 2025-12-03 16:44
NVD link : CVE-2023-53288
Mitre link : CVE-2023-53288
CVE.ORG link : CVE-2023-53288
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime
