{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T04:38:19.712","vulnerabilities":[{"cve":{"id":"CVE-2023-53579","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-10-04T16:15:53.597","lastModified":"2026-03-23T18:41:45.090","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: mvebu: fix irq domain leak\n\nUwe Kleine-König pointed out we still have one resource leak in the mvebu\ndriver triggered on driver detach. Let's address it with a custom devm\naction."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-401"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.16.40","versionEndExcluding":"3.17","matchCriteriaId":"DF2842FE-71A6-4182-B132-2372CFC813B1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.8.9","versionEndExcluding":"4.9","matchCriteriaId":"D4CD318C-D206-4CC9-A58E-BF5E125BCC7D"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9.1","versionEndExcluding":"5.15.124","matchCriteriaId":"D8D11BDF-FBA2-443E-B954-7B6A9E52D1BD"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.1.43","matchCriteriaId":"A9E3E7AD-3EAC-485A-8673-5A89FB889587"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2","versionEndExcluding":"6.4.8","matchCriteriaId":"6F5CB671-C757-4B7A-B3D3-283AFE20F0D7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.9:-:*:*:*:*:*:*","matchCriteriaId":"592761F7-6672-484E-8490-1187F4CDD13E"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.9:rc4:*:*:*:*:*:*","matchCriteriaId":"FE21670A-9B31-4AED-93C4-171286BB2A56"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.9:rc5:*:*:*:*:*:*","matchCriteriaId":"059DF035-9B5B-4F84-8EDD-34534ECAA579"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.9:rc6:*:*:*:*:*:*","matchCriteriaId":"B0288B1E-67AB-40F4-98C7-8C686510F664"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.9:rc7:*:*:*:*:*:*","matchCriteriaId":"73A5C6E1-051D-4FDC-8034-BE2896C639F3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.9:rc8:*:*:*:*:*:*","matchCriteriaId":"F96570B2-47BE-4DEF-AAD8-909913366EA0"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*","matchCriteriaId":"0B3E6E4D-E24E-4630-B00C-8C9901C597B0"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*","matchCriteriaId":"E4A01A71-0F09-4DB2-A02F-7EFFBE27C98D"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/44e2afbf650f3264519643fcc9e6b4d2f6e8d547","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/644ee70267a934be27370f9aa618b29af7290544","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/b19e90521286a03bc3793fd598f20277a8f99c85","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/d9b791d8362359d241b4e8f4b4767c681ffdb6ef","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]}]}}]}