-

CVE-2023-53239

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/mdp5: Add check for kzalloc

As kzalloc may fail and return NULL pointer,
it should be better to check the return value
in order to avoid the NULL pointer dereference.

Patchwork: https://patchwork.freedesktop.org/patch/514154/

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 3975ea6eaffe26aec634b5c473e51dc76e73af62
Version 1cff7440a86e04a613665803b42034c467f035fa
Status affected
Version < 49907c8873826ee771ba0ca1629e809c6479f617
Version 1cff7440a86e04a613665803b42034c467f035fa
Status affected
Version < 82943a0730e00c14b03e25a4b2a1a9477ae89d7b
Version 1cff7440a86e04a613665803b42034c467f035fa
Status affected
Version < bc579a2ee8b2e20c152b24b437d094832d8c9c9e
Version 1cff7440a86e04a613665803b42034c467f035fa
Status affected
Version < 37ff771ed008b9cbffd0eab77985968364694ce3
Version 1cff7440a86e04a613665803b42034c467f035fa
Status affected
Version < 13fcfcb2a9a4787fe4e49841d728f6f2e9fa6911
Version 1cff7440a86e04a613665803b42034c467f035fa
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.3
Status affected
Version < 5.3
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.235
Status unaffected
Version <= 5.10.*
Version 5.10.173
Status unaffected
Version <= 5.15.*
Version 5.15.99
Status unaffected
Version <= 6.1.*
Version 6.1.16
Status unaffected
Version <= 6.2.*
Version 6.2.3
Status unaffected
Version <= *
Version 6.3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String