{"id":"CVE-2023-53505","summary":"clk: tegra: tegra124-emc: Fix potential memory leak","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nclk: tegra: tegra124-emc: Fix potential memory leak\n\nThe tegra and tegra needs to be freed in the error handling path, otherwise\nit will be leaked.","modified":"2026-04-11T12:46:48.239853Z","published":"2025-10-01T11:45:55.859Z","related":["SUSE-SU-2025:03600-1","SUSE-SU-2025:03615-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:3761-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53505.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/404e9f741acfb188212f7142d91e247630dd77cc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4e59e355f9fcccd9edf65d09f769bb4c163a1c36"},{"type":"WEB","url":"https://git.kernel.org/stable/c/53a06e5924c0d43c11379a08c5a78529c3e61595"},{"type":"WEB","url":"https://git.kernel.org/stable/c/801c8341f7aff07c494b53e627970b72635af5d3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/96bafece6ff380138896f009141fd7337070e680"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e969c144d908ea9387442659f103d374c8ff682d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fd1c117bb5d7e033bf1aa25ac97ff421f81a1199"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53505.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53505"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2db04f16b589c6c96bd07df3f1ef8558bfdb6810"},{"fixed":"801c8341f7aff07c494b53e627970b72635af5d3"},{"fixed":"404e9f741acfb188212f7142d91e247630dd77cc"},{"fixed":"fd1c117bb5d7e033bf1aa25ac97ff421f81a1199"},{"fixed":"96bafece6ff380138896f009141fd7337070e680"},{"fixed":"e969c144d908ea9387442659f103d374c8ff682d"},{"fixed":"4e59e355f9fcccd9edf65d09f769bb4c163a1c36"},{"fixed":"53a06e5924c0d43c11379a08c5a78529c3e61595"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53505.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.2.0"},{"fixed":"5.4.251"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.188"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.121"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.39"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.3.13"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.4.0"},{"fixed":"6.4.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53505.json"}}],"schema_version":"1.7.5"}