CVE-2023-54049Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 84.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: rpmsg: glink: Add check for kstrdup Add check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference.

Affected Packages4 packages

Linuxlinux/linux_kernel4.13.04.14.326+7
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linuxb4f8e52b89f69f5563ac4cb9ffdacc4418917af15197498c902502127a47abda5359dd7f1d41946f+9
debiandebian/linux< linux 6.1.55-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-r9ff-8j26-q598: In the Linux kernel, the following vulnerability has been resolved: rpmsg: glink: Add check for kstrdup Add check for the return value of kstrdup()2025-12-24
OSV
CVE-2023-54049: In the Linux kernel, the following vulnerability has been resolved: rpmsg: glink: Add check for kstrdup Add check for the return value of kstrdup() an2025-12-24
OSV
rpmsg: glink: Add check for kstrdup2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: rpmsg: glink: Add check for kstrdup2025-12-24
Debian
CVE-2023-54049: linux - In the Linux kernel, the following vulnerability has been resolved: rpmsg: glin...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54049 Impact, Exploitability, and Mitigation Steps | Wiz