CVE-2023-54319
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
30/12/2025
Última modificación:
30/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
pinctrl: at91-pio4: check return value of devm_kasprintf()<br />
<br />
devm_kasprintf() returns a pointer to dynamically allocated memory.<br />
Pointer could be NULL in case allocation fails. Check pointer validity.<br />
Identified with coccinelle (kmerr.cocci script).<br />
<br />
Depends-on: 1c4e5c470a56 ("pinctrl: at91: use devm_kasprintf() to avoid potential leaks")<br />
Depends-on: 5a8f9cf269e8 ("pinctrl: at91-pio4: use proper format specifier for unsigned int")
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/0a95dd17a73b7603818ad7c46c99d757232be331
- https://git.kernel.org/stable/c/0af388fce352ed2ab383fd5d1a08db551ca15c38
- https://git.kernel.org/stable/c/3e8ce1d5a1a9d758b359e5c426543957f35991f8
- https://git.kernel.org/stable/c/5bfd577cc728270d6cd7af6c652a1e7661f25487
- https://git.kernel.org/stable/c/8a1fa202f47f39680a4305af744f499a324f8a03
- https://git.kernel.org/stable/c/8d788f2ba830d6d32499b198c526d577c590eedf
- https://git.kernel.org/stable/c/aa3932eb07392d626486428e2ffddc660658e22a
- https://git.kernel.org/stable/c/f3c7b95c9991dab02e616fc251b6c3516e0bd0ac
- https://git.kernel.org/stable/c/f6fd5d4ff8ca0b24cee1af4130bcb1fa96b61aa0



