CVE-2023-52841

In the Linux kernel, the following vulnerability has been resolved: media: vidtv: mux: Add check and kfree for kstrdup Add check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference. Moreover, use kfree() in the later error handling in order to avoid memory leak.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

31 Dec 2024, 19:49

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-401
CWE-476
References () https://git.kernel.org/stable/c/1fd6eb12642e0c32692924ff359c07de4b781d78 - () https://git.kernel.org/stable/c/1fd6eb12642e0c32692924ff359c07de4b781d78 - Patch
References () https://git.kernel.org/stable/c/64863ba8e6b7651d994c6e6d506cc8aa2ac45edb - () https://git.kernel.org/stable/c/64863ba8e6b7651d994c6e6d506cc8aa2ac45edb - Patch
References () https://git.kernel.org/stable/c/980be4c3b0d51c0f873fd750117774561c66cf68 - () https://git.kernel.org/stable/c/980be4c3b0d51c0f873fd750117774561c66cf68 - Patch
References () https://git.kernel.org/stable/c/a254ee1ddc592ae1efcce96b8c014e1bd2d5a2b4 - () https://git.kernel.org/stable/c/a254ee1ddc592ae1efcce96b8c014e1bd2d5a2b4 - Patch
References () https://git.kernel.org/stable/c/aae7598aff291d4d140be1355aa20930af948785 - () https://git.kernel.org/stable/c/aae7598aff291d4d140be1355aa20930af948785 - Patch
References () https://git.kernel.org/stable/c/cb13001411999adb158b39e76d94705eb2da100d - () https://git.kernel.org/stable/c/cb13001411999adb158b39e76d94705eb2da100d - Patch

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1fd6eb12642e0c32692924ff359c07de4b781d78 - () https://git.kernel.org/stable/c/1fd6eb12642e0c32692924ff359c07de4b781d78 -
References () https://git.kernel.org/stable/c/64863ba8e6b7651d994c6e6d506cc8aa2ac45edb - () https://git.kernel.org/stable/c/64863ba8e6b7651d994c6e6d506cc8aa2ac45edb -
References () https://git.kernel.org/stable/c/980be4c3b0d51c0f873fd750117774561c66cf68 - () https://git.kernel.org/stable/c/980be4c3b0d51c0f873fd750117774561c66cf68 -
References () https://git.kernel.org/stable/c/a254ee1ddc592ae1efcce96b8c014e1bd2d5a2b4 - () https://git.kernel.org/stable/c/a254ee1ddc592ae1efcce96b8c014e1bd2d5a2b4 -
References () https://git.kernel.org/stable/c/aae7598aff291d4d140be1355aa20930af948785 - () https://git.kernel.org/stable/c/aae7598aff291d4d140be1355aa20930af948785 -
References () https://git.kernel.org/stable/c/cb13001411999adb158b39e76d94705eb2da100d - () https://git.kernel.org/stable/c/cb13001411999adb158b39e76d94705eb2da100d -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: vidtv: mux: Add check and kfree for kstrdup. Agregue check para el valor de retorno de kstrdup() y devuelva el error si falla para evitar la desreferencia al puntero NULL. Además, utilice kfree() en el manejo de errores posterior para evitar pérdidas de memoria.

21 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 16:15

Updated : 2024-12-31 19:49


NVD link : CVE-2023-52841

Mitre link : CVE-2023-52841

CVE.ORG link : CVE-2023-52841


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime

CWE-476

NULL Pointer Dereference