-

CVE-2023-53239

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/mdp5: Add check for kzalloc

As kzalloc may fail and return NULL pointer,
it should be better to check the return value
in order to avoid the NULL pointer dereference.

Patchwork: https://patchwork.freedesktop.org/patch/514154/

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 3975ea6eaffe26aec634b5c473e51dc76e73af62
Version 1cff7440a86e04a613665803b42034c467f035fa
Status affected
Version < 49907c8873826ee771ba0ca1629e809c6479f617
Version 1cff7440a86e04a613665803b42034c467f035fa
Status affected
Version < 82943a0730e00c14b03e25a4b2a1a9477ae89d7b
Version 1cff7440a86e04a613665803b42034c467f035fa
Status affected
Version < bc579a2ee8b2e20c152b24b437d094832d8c9c9e
Version 1cff7440a86e04a613665803b42034c467f035fa
Status affected
Version < 37ff771ed008b9cbffd0eab77985968364694ce3
Version 1cff7440a86e04a613665803b42034c467f035fa
Status affected
Version < 13fcfcb2a9a4787fe4e49841d728f6f2e9fa6911
Version 1cff7440a86e04a613665803b42034c467f035fa
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.3
Status affected
Version < 5.3
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.235
Status unaffected
Version <= 5.10.*
Version 5.10.173
Status unaffected
Version <= 5.15.*
Version 5.15.99
Status unaffected
Version <= 6.1.*
Version 6.1.16
Status unaffected
Version <= 6.2.*
Version 6.2.3
Status unaffected
Version <= *
Version 6.3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string