CVE-2023-53708

Source
https://cve.org/CVERecord?id=CVE-2023-53708
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53708.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53708
Downstream
Related
Published
2025-10-22T13:23:44.496Z
Modified
2026-03-20T12:33:18.297645Z
Summary
ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects
Details

In the Linux kernel, the following vulnerability has been resolved:

ACPI: x86: s2idle: Catch multiple ACPITYPEPACKAGE objects

If a badly constructed firmware includes multiple ACPI_TYPE_PACKAGE objects while evaluating the AMD LPS0 _DSM, there will be a memory leak. Explicitly guard against this.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53708.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
146f1ed852a87b802ed6e71c31e189c64871383c
Fixed
7b7964cd9db30bc84808a40d13a0633b4313f149
Fixed
1ea7e47807279369c82718efd2677ea25c6579e3
Fixed
9e8bbde9293151430884aed882a88eaa22298f72
Fixed
883cf0d4cf288313b71146ddebdf5d647b76c78b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53708.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.133
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.55
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.5.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53708.json"