Vulnerability Details CVE-2023-52472
In the Linux kernel, the following vulnerability has been resolved:
crypto: rsa - add a check for allocation failure
Static checkers insist that the mpi_alloc() allocation can fail so add
a check to prevent a NULL dereference. Small allocations like this
can't actually fail in current kernels, but adding a check is very
simple and makes the static checkers happy.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 0.6%
CVSS Severity
CVSS v3 Score 5.5
Products affected by CVE-2023-52472
-
cpe:2.3:o:linux:linux_kernel:6.5.1
-
cpe:2.3:o:linux:linux_kernel:6.5.10
-
cpe:2.3:o:linux:linux_kernel:6.5.11
-
cpe:2.3:o:linux:linux_kernel:6.5.12
-
cpe:2.3:o:linux:linux_kernel:6.5.13
-
cpe:2.3:o:linux:linux_kernel:6.5.2
-
cpe:2.3:o:linux:linux_kernel:6.5.3
-
cpe:2.3:o:linux:linux_kernel:6.5.4
-
cpe:2.3:o:linux:linux_kernel:6.5.5
-
cpe:2.3:o:linux:linux_kernel:6.5.6
-
cpe:2.3:o:linux:linux_kernel:6.5.7
-
cpe:2.3:o:linux:linux_kernel:6.5.8
-
cpe:2.3:o:linux:linux_kernel:6.5.9
-
cpe:2.3:o:linux:linux_kernel:6.6
-
cpe:2.3:o:linux:linux_kernel:6.6.1
-
cpe:2.3:o:linux:linux_kernel:6.6.10
-
cpe:2.3:o:linux:linux_kernel:6.6.11
-
cpe:2.3:o:linux:linux_kernel:6.6.12
-
cpe:2.3:o:linux:linux_kernel:6.6.13
-
cpe:2.3:o:linux:linux_kernel:6.6.2
-
cpe:2.3:o:linux:linux_kernel:6.6.3
-
cpe:2.3:o:linux:linux_kernel:6.6.4
-
cpe:2.3:o:linux:linux_kernel:6.6.5
-
cpe:2.3:o:linux:linux_kernel:6.6.6
-
cpe:2.3:o:linux:linux_kernel:6.6.7
-
cpe:2.3:o:linux:linux_kernel:6.6.8
-
cpe:2.3:o:linux:linux_kernel:6.6.9
-
cpe:2.3:o:linux:linux_kernel:6.7.1