Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-52472
HistoryFeb 26, 2024 - 12:00 a.m.

CVE-2023-52472

2024-02-2600:00:00
ubuntu.com
ubuntu.com
13
linux kernel
vulnerability
rsa
check
allocation failure
null dereference
static checkers
mpi_alloc
launchpad
memory allocation

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

5.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved: crypto:
rsa - add a check for allocation failure Static checkers insist that the
mpi_alloc() allocation can fail so add a check to prevent a NULL
dereference. Small allocations like this can’t actually fail in current
kernels, but adding a check is very simple and makes the static checkers
happy.

Notes

Author Note
Priority reason: NULL pointer dereference on memory allocation failure which is very unlikely for an attacker to be able to influence and hence cause.
rodrigo-zaiden USN-6765-1 for linux-oem-6.5 wrongly stated that this CVE was fixed in version 6.5.0-1022.23. The mentioned notice was revoked and the state of the fix for linux-oem-6.5 was recovered to the previous state.

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

5.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%