Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-52467
HistoryFeb 26, 2024 - 12:00 a.m.

CVE-2023-52467

2024-02-2600:00:00
ubuntu.com
ubuntu.com
9
linux kernel
vulnerability
cve-2023-52467
mfd
syscon
null pointer dereference
memory allocation
kasprintf
launchpad
unix

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

5.2

Confidence

High

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved: mfd:
syscon: Fix null pointer dereference in of_syscon_register() kasprintf()
returns a pointer to dynamically allocated memory which can be NULL upon
failure.

Notes

Author Note
Priority reason: NULL pointer dereference on memory allocation failure which is very unlikely for an attacker to be able to influence and hence cause.
rodrigo-zaiden USN-6765-1 for linux-oem-6.5 wrongly stated that this CVE was fixed in version 6.5.0-1022.23. The mentioned notice was revoked and the state of the fix for linux-oem-6.5 was recovered to the previous state.
Rows per page:
1-10 of 481

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

5.2

Confidence

High

EPSS

0

Percentile

5.1%