CVE-2023-54248Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 92.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Add check for kmemdup Since the kmemdup may return NULL pointer, it should be better to add check for the return value in order to avoid NULL pointer dereference.

Affected Packages4 packages

Linuxlinux/linux_kernel5.15.05.15.111+3
Debianlinux/linux_kernel< 6.1.37-1+2
CVEListV5linux/linuxb46acd6a6a627d876898e1c84d3f84902264b445952bbfcedbf895963509861e55a6e4fc105eb842+5
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-jf6q-v9m6-wc7j: In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Add check for kmemdup Since the kmemdup may return NULL pointer, it sh2025-12-30
OSV
CVE-2023-54248: In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Add check for kmemdup Since the kmemdup may return NULL pointer, it shou2025-12-30
OSV
fs/ntfs3: Add check for kmemdup2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: fs/ntfs3: Add check for kmemdup2025-12-30
Debian
CVE-2023-54248: linux - In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: A...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54248 Impact, Exploitability, and Mitigation Steps | Wiz