CVE-2023-53341Use of Uninitialized Resource in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 17

Description

In the Linux kernel, the following vulnerability has been resolved: of/fdt: run soc memory setup when early_init_dt_scan_memory fails If memory has been found early_init_dt_scan_memory now returns 1. If it hasn't found any memory it will return 0, allowing other memory setup mechanisms to carry on. Previously early_init_dt_scan_memory always returned 0 without distinguishing between any kind of memory setup being done or not. Any code path after the early_init_dt_scan memory call in the ramip

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.176.0.19+2
Debianlinux/linux_kernel< 6.1.7-1+2
CVEListV5linux/linux1f012283e9360fb4007308f04cfaeb205e34b68404836fc5b720dfa32ff781383d84f63019abf9b9+3
debiandebian/linux< linux 6.1.7-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-h68c-38x6-5x45: In the Linux kernel, the following vulnerability has been resolved: of/fdt: run soc memory setup when early_init_dt_scan_memory fails If memory has2025-09-17
OSV
CVE-2023-53341: In the Linux kernel, the following vulnerability has been resolved: of/fdt: run soc memory setup when early_init_dt_scan_memory fails If memory has be2025-09-17

📋Vendor Advisories

2
Red Hat
kernel: of/fdt: run soc memory setup when early_init_dt_scan_memory fails2025-09-17
Debian
CVE-2023-53341: linux - In the Linux kernel, the following vulnerability has been resolved: of/fdt: run...2023
CVE-2023-53341 — Use of Uninitialized Resource in Linux | cvebase