CVE-2023-53341
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/09/2025
Last modified:
14/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
of/fdt: run soc memory setup when early_init_dt_scan_memory fails<br />
<br />
If memory has been found early_init_dt_scan_memory now returns 1. If<br />
it hasn&#39;t found any memory it will return 0, allowing other memory<br />
setup mechanisms to carry on.<br />
<br />
Previously early_init_dt_scan_memory always returned 0 without<br />
distinguishing between any kind of memory setup being done or not. Any<br />
code path after the early_init_dt_scan memory call in the ramips<br />
plat_mem_setup code wouldn&#39;t be executed anymore. Making<br />
early_init_dt_scan_memory the only way to initialize the memory.<br />
<br />
Some boards, including my mt7621 based Cudy X6 board, depend on memory<br />
initialization being done via the soc_info.mem_detect function<br />
pointer. Those wouldn&#39;t be able to obtain memory and panic the kernel<br />
during early bootup with the message "early_init_dt_alloc_memory_arch:<br />
Failed to allocate 12416 bytes align=0x40".
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.17 (including) | 6.0.19 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1 (including) | 6.1.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



