CVE-2023-54319Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.1%
top 79.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: pinctrl: at91-pio4: check return value of devm_kasprintf() devm_kasprintf() returns a pointer to dynamically allocated memory. Pointer could be NULL in case allocation fails. Check pointer validity. Identified with coccinelle (kmerr.cocci script). Depends-on: 1c4e5c470a56 ("pinctrl: at91: use devm_kasprintf() to avoid potential leaks") Depends-on: 5a8f9cf269e8 ("pinctrl: at91-pio4: use proper format specifier for unsigned int

Affected Packages4 packages

Linuxlinux/linux_kernel4.4.04.14.322+7
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linux776180848b574c9c01217fa958f10843ffce584f8d788f2ba830d6d32499b198c526d577c590eedf+9
debiandebian/linux< linux 6.1.52-1 (bookworm)

🔴Vulnerability Details

3
OSV
pinctrl: at91-pio4: check return value of devm_kasprintf()2025-12-30
OSV
CVE-2023-54319: In the Linux kernel, the following vulnerability has been resolved: pinctrl: at91-pio4: check return value of devm_kasprintf() devm_kasprintf() return2025-12-30
GHSA
GHSA-2jx2-7jpf-5pr4: In the Linux kernel, the following vulnerability has been resolved: pinctrl: at91-pio4: check return value of devm_kasprintf() devm_kasprintf() retu2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: pinctrl: at91-pio4: check return value of devm_kasprintf()2025-12-30
Debian
CVE-2023-54319: linux - In the Linux kernel, the following vulnerability has been resolved: pinctrl: at...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54319 Impact, Exploitability, and Mitigation Steps | Wiz