In the Linux kernel, the following vulnerability has been resolved:
pstore/platform: Add check for kstrdup
Add check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52869.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52869.json"
[
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bb166bdae1a7d7db30e9be7e6ccaba606debc05f",
"digest": {
"function_hash": "30230739667419083121335041457709515301",
"length": 1362.0
},
"id": "CVE-2023-52869-7d078efc",
"deprecated": false,
"target": {
"file": "fs/pstore/platform.c",
"function": "pstore_register"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bb166bdae1a7d7db30e9be7e6ccaba606debc05f",
"digest": {
"line_hashes": [
"338445943368580691676409559441009802957",
"124781641050946505916132596056438547947",
"302489745291286646060752650819349131324",
"97377290659628714108220577844127064047",
"317920513919240689361939898768434231596",
"253875734760747300702407174686096065472",
"179284675756372642156355291613395123438",
"124306380192951178212891826339415915869",
"208936264241791501802271364327625915549",
"101704209588192109876714719905647501118",
"138805965024778547159099261744519094284",
"1029478608665260840480586366516367921",
"310584850785990570315346244967132299713",
"229390305943260157368919656525584213179",
"315904550904179407115195596320328443992",
"330997504250336020177808849901299437157"
],
"threshold": 0.9
},
"id": "CVE-2023-52869-d07772ae",
"deprecated": false,
"target": {
"file": "fs/pstore/platform.c"
}
}
]