5.5
CVE-2023-52789
- EPSS 0.01%
- Veröffentlicht 21.05.2024 16:15:17
- Zuletzt bearbeitet 15.01.2025 17:57:15
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: tty: vcc: Add check for kstrdup() in vcc_probe() Add check for the return value of kstrdup() and return the error, if it fails in order to avoid NULL pointer dereference.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version < 4.14.331
Linux ≫ Linux Kernel Version >= 4.15 < 4.19.300
Linux ≫ Linux Kernel Version >= 4.20 < 5.4.262
Linux ≫ Linux Kernel Version >= 5.5 < 5.10.202
Linux ≫ Linux Kernel Version >= 5.11 < 5.15.140
Linux ≫ Linux Kernel Version >= 5.16 < 6.1.64
Linux ≫ Linux Kernel Version >= 6.2 < 6.5.13
Linux ≫ Linux Kernel Version >= 6.6 < 6.6.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.01% | 0.017 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-476 NULL Pointer Dereference
The product dereferences a pointer that it expects to be valid but is NULL.