-

CVE-2023-54319

In the Linux kernel, the following vulnerability has been resolved:

pinctrl: at91-pio4: check return value of devm_kasprintf()

devm_kasprintf() returns a pointer to dynamically allocated memory.
Pointer could be NULL in case allocation fails. Check pointer validity.
Identified with coccinelle (kmerr.cocci script).

Depends-on: 1c4e5c470a56 ("pinctrl: at91: use devm_kasprintf() to avoid potential leaks")
Depends-on: 5a8f9cf269e8 ("pinctrl: at91-pio4: use proper format specifier for unsigned int")
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 8d788f2ba830d6d32499b198c526d577c590eedf
Version 776180848b574c9c01217fa958f10843ffce584f
Status affected
Version < 3e8ce1d5a1a9d758b359e5c426543957f35991f8
Version 776180848b574c9c01217fa958f10843ffce584f
Status affected
Version < aa3932eb07392d626486428e2ffddc660658e22a
Version 776180848b574c9c01217fa958f10843ffce584f
Status affected
Version < f3c7b95c9991dab02e616fc251b6c3516e0bd0ac
Version 776180848b574c9c01217fa958f10843ffce584f
Status affected
Version < 0a95dd17a73b7603818ad7c46c99d757232be331
Version 776180848b574c9c01217fa958f10843ffce584f
Status affected
Version < 0af388fce352ed2ab383fd5d1a08db551ca15c38
Version 776180848b574c9c01217fa958f10843ffce584f
Status affected
Version < 5bfd577cc728270d6cd7af6c652a1e7661f25487
Version 776180848b574c9c01217fa958f10843ffce584f
Status affected
Version < 8a1fa202f47f39680a4305af744f499a324f8a03
Version 776180848b574c9c01217fa958f10843ffce584f
Status affected
Version < f6fd5d4ff8ca0b24cee1af4130bcb1fa96b61aa0
Version 776180848b574c9c01217fa958f10843ffce584f
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.4
Status affected
Version < 4.4
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.322
Status unaffected
Version <= 4.19.*
Version 4.19.291
Status unaffected
Version <= 5.4.*
Version 5.4.251
Status unaffected
Version <= 5.10.*
Version 5.10.188
Status unaffected
Version <= 5.15.*
Version 5.15.121
Status unaffected
Version <= 6.1.*
Version 6.1.39
Status unaffected
Version <= 6.3.*
Version 6.3.13
Status unaffected
Version <= 6.4.*
Version 6.4.4
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.197
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.