CVE-2023-53211

Source
https://cve.org/CVERecord?id=CVE-2023-53211
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53211.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53211
Downstream
Published
2025-09-15T14:21:39.682Z
Modified
2026-03-11T19:34:38.626828Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
driver core: location: Free struct acpi_pld_info *pld before return false
Details

In the Linux kernel, the following vulnerability has been resolved:

driver core: location: Free struct acpipldinfo *pld before return false

struct acpipldinfo *pld should be freed before the return of allocation failure, to prevent memory leak, add the ACPI_FREE() to fix it.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53211.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bc443c31def574e3bfaed50cb493b8305ad79435
Fixed
8fe72b8f59f63ca776bb8a4fcd2f406057a9fc90
Fixed
5a9de90951bbeaed775e4b8d1b16b4d359e82bf5
Fixed
0d150f967e8410e1e6712484543eec709356a65d

Affected versions

v5.*
v5.18
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v6.*
v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.2
v6.1.3
v6.1.4
v6.1.5
v6.1.6
v6.1.7
v6.1.8
v6.1.9
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.2.1
v6.2.2

Database specific

vanir_signatures
[
    {
        "signature_type": "Function",
        "signature_version": "v1",
        "target": {
            "file": "drivers/base/physical_location.c",
            "function": "dev_add_physical_location"
        },
        "id": "CVE-2023-53211-640e63dd",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8fe72b8f59f63ca776bb8a4fcd2f406057a9fc90",
        "digest": {
            "function_hash": "239008415363568351253912630209317375641",
            "length": 684.0
        }
    },
    {
        "signature_type": "Line",
        "signature_version": "v1",
        "target": {
            "file": "drivers/base/physical_location.c"
        },
        "id": "CVE-2023-53211-b63195b1",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8fe72b8f59f63ca776bb8a4fcd2f406057a9fc90",
        "digest": {
            "line_hashes": [
                "326899183318175528173104741721377951008",
                "74954619514092042326287311220192537032",
                "3783367360390741072275748999628316850",
                "24622383588200289108381550996091745074",
                "171621293677290491400328106608886607877"
            ],
            "threshold": 0.9
        }
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53211.json"