Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-52789

Опубликовано: 21 мая 2024
Источник: debian
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: tty: vcc: Add check for kstrdup() in vcc_probe() Add check for the return value of kstrdup() and return the error, if it fails in order to avoid NULL pointer dereference.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.6.8-1package
linuxfixed6.1.64-1bookwormpackage
linuxfixed5.10.205-1bullseyepackage
linuxfixed4.19.304-1busterpackage

Примечания

  • https://git.kernel.org/linus/d81ffb87aaa75f842cd7aa57091810353755b3e6 (6.7-rc1)

EPSS

Процентиль: 14%
0.00046
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: tty: vcc: Add check for kstrdup() in vcc_probe() Add check for the return value of kstrdup() and return the error, if it fails in order to avoid NULL pointer dereference.

CVSS3: 6
redhat
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: tty: vcc: Add check for kstrdup() in vcc_probe() Add check for the return value of kstrdup() and return the error, if it fails in order to avoid NULL pointer dereference.

CVSS3: 5.5
nvd
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: tty: vcc: Add check for kstrdup() in vcc_probe() Add check for the return value of kstrdup() and return the error, if it fails in order to avoid NULL pointer dereference.

CVSS3: 5.5
github
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: tty: vcc: Add check for kstrdup() in vcc_probe() Add check for the return value of kstrdup() and return the error, if it fails in order to avoid NULL pointer dereference.

CVSS3: 8.8
redos
7 месяцев назад

Множественные уязвимости kernel-lt

EPSS

Процентиль: 14%
0.00046
Низкий