{"id":"CVE-2023-53818","summary":"ARM: zynq: Fix refcount leak in zynq_early_slcr_init","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nARM: zynq: Fix refcount leak in zynq_early_slcr_init\n\nof_find_compatible_node() returns a node pointer with refcount incremented,\nwe should use of_node_put() on error path.\nAdd missing of_node_put() to avoid refcount leak.","modified":"2026-03-20T12:33:21.429149Z","published":"2025-12-09T00:01:16.630Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53818.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1cc12d10d13ae5ad8d3f7432a4c0156d221fc99b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/227f8c1c5c4b3d131b66e57e58d38054f441b915"},{"type":"WEB","url":"https://git.kernel.org/stable/c/351b7e93d02b50b2faae2d4bda28e16a8389cbb7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4c22ee805202087c2553c9175968e9e922d75bc1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9eedb910a3be0005b88c696a8552c0d4c9937cd4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e43a06c73be4b93d308f0df809ee0023b7c37b54"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ede0334bf4df360f4f9446075cffbbb3bc54d0b6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f00bc6727adf840eb208700ea27cda4f3742629d"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53818.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53818"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3329659df0300d1d0aa22f5e7063f83a88ef92aa"},{"fixed":"f00bc6727adf840eb208700ea27cda4f3742629d"},{"fixed":"351b7e93d02b50b2faae2d4bda28e16a8389cbb7"},{"fixed":"ede0334bf4df360f4f9446075cffbbb3bc54d0b6"},{"fixed":"227f8c1c5c4b3d131b66e57e58d38054f441b915"},{"fixed":"1cc12d10d13ae5ad8d3f7432a4c0156d221fc99b"},{"fixed":"e43a06c73be4b93d308f0df809ee0023b7c37b54"},{"fixed":"4c22ee805202087c2553c9175968e9e922d75bc1"},{"fixed":"9eedb910a3be0005b88c696a8552c0d4c9937cd4"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53818.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.0.0"},{"fixed":"4.14.308"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.276"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.235"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.173"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.99"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.2.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53818.json"}}],"schema_version":"1.7.5"}