CVE-2023-54049
Published: December 27, 2025Last modified: December 27, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: rpmsg: glink: Add check for kstrdup Add check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference.
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.53-r0) |
| 25 LTS | linux-lts | Not affected (6.6.89-r0) | |
| Stream | linux-lts | Fixed (6.6.58-r0) |
References
- https://git.kernel.org/stable/c/13928a837e0f014dac0322dd9f8a67c486e7f232
- https://git.kernel.org/stable/c/174cf8853857c190a3c4f1f1d2d06cfd095fe859
- https://git.kernel.org/stable/c/5197498c902502127a47abda5359dd7f1d41946f
- https://git.kernel.org/stable/c/71ac2ffd7f80fdd350486f6645dc48456e55a59b
- https://git.kernel.org/stable/c/abd740db896b3c588dced175af98b95852c1854b
- https://git.kernel.org/stable/c/b5c9ee8296a3760760c7b5d2e305f91412adc795
- https://git.kernel.org/stable/c/cae0787e408c30a575760a531ccb69a6b48bbfaf
- https://git.kernel.org/stable/c/e3734a9558afac91df3c655a6f2376b9d14933b7
- https://git.kernel.org/stable/c/efa7f31669f04084ed5996ed467ba529f4c90467