-

CVE-2023-54279

In the Linux kernel, the following vulnerability has been resolved:

MIPS: fw: Allow firmware to pass a empty env

fw_getenv will use env entry to determine style of env,
however it is legal for firmware to just pass a empty list.

Check if first entry exist before running strchr to avoid
null pointer dereference.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < f334b31625683418aaa2a335470eec950a95a254
Version 14aecdd419217e041fb5dd2749d11f58503bdf62
Status affected
Version < 830181ddced5a05a711dc9da8043203b1f33a77e
Version 14aecdd419217e041fb5dd2749d11f58503bdf62
Status affected
Version < 0f91290774c798199ba4b8df93de5c3156b5163d
Version 14aecdd419217e041fb5dd2749d11f58503bdf62
Status affected
Version < 47e61cadc7a5f3dffd42d2d6fda81be163f1ab82
Version 14aecdd419217e041fb5dd2749d11f58503bdf62
Status affected
Version < 3ef93b7bd9e042db240843f24a80e14da38c6830
Version 14aecdd419217e041fb5dd2749d11f58503bdf62
Status affected
Version < a6b54af407873227caef6262e992f5422cdcb6ae
Version 14aecdd419217e041fb5dd2749d11f58503bdf62
Status affected
Version < ad79828f133e98585ab2236cad04a55eb7141bbe
Version 14aecdd419217e041fb5dd2749d11f58503bdf62
Status affected
Version < aeed787bbbbe1b842beec9a065a36c915226f704
Version 14aecdd419217e041fb5dd2749d11f58503bdf62
Status affected
Version < ee1809ed7bc456a72dc8410b475b73021a3a68d5
Version 14aecdd419217e041fb5dd2749d11f58503bdf62
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.10
Status affected
Version < 3.10
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.315
Status unaffected
Version <= 4.19.*
Version 4.19.283
Status unaffected
Version <= 5.4.*
Version 5.4.243
Status unaffected
Version <= 5.10.*
Version 5.10.180
Status unaffected
Version <= 5.15.*
Version 5.15.111
Status unaffected
Version <= 6.1.*
Version 6.1.28
Status unaffected
Version <= 6.2.*
Version 6.2.15
Status unaffected
Version <= 6.3.*
Version 6.3.2
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.145
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.