-
CVE-2023-53681
- EPSS -
- Veröffentlicht 07.10.2025 15:21:35
- Zuletzt bearbeitet 07.10.2025 16:15:52
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent In some specific situations, the return value of __bch_btree_node_alloc may be NULL. This may lead to a potential NULL pointer dereference in caller function like a calling chain : btree_split->bch_btree_node_alloc->__bch_btree_node_alloc. Fix it by initializing the return value in __bch_btree_node_alloc.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
587b4e8bb5dac682f09280ab35db4632b29d5ac4
Version
cafe563591446cf80bfbc2fe3bc72a2e36cf1060
Status
affected
Version <
b070f29a61436f6f8a2e3abc7ea4f4be81695198
Version
cafe563591446cf80bfbc2fe3bc72a2e36cf1060
Status
affected
Version <
a4405f6ee03323410d7b10966fd67b35f71b1944
Version
cafe563591446cf80bfbc2fe3bc72a2e36cf1060
Status
affected
Version <
f67b0e3081f2a24170280a33ac66f6b112083c03
Version
cafe563591446cf80bfbc2fe3bc72a2e36cf1060
Status
affected
Version <
7ecea5ce3dc17339c280c75b58ac93d8c8620d9f
Version
cafe563591446cf80bfbc2fe3bc72a2e36cf1060
Status
affected
Version <
4514847aee18d9391a0cf3aad75d3567c72795a4
Version
cafe563591446cf80bfbc2fe3bc72a2e36cf1060
Status
affected
Version <
80fca8a10b604afad6c14213fdfd816c4eda3ee4
Version
cafe563591446cf80bfbc2fe3bc72a2e36cf1060
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.10
Status
affected
Version <
3.10
Version
0
Status
unaffected
Version <=
4.19.*
Version
4.19.291
Status
unaffected
Version <=
5.4.*
Version
5.4.253
Status
unaffected
Version <=
5.10.*
Version
5.10.188
Status
unaffected
Version <=
5.15.*
Version
5.15.121
Status
unaffected
Version <=
6.1.*
Version
6.1.39
Status
unaffected
Version <=
6.4.*
Version
6.4.4
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|