Overview
- Description
- In the Linux kernel, the following vulnerability has been resolved: nfc: nci: fix possible NULL pointer dereference in send_acknowledge() Handle memory allocation failure from nci_skb_alloc() (calling alloc_skb()) to avoid possible NULL pointer dereference.
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
Weaknesses
- nvd@nist.gov
- CWE-476
Social media
- Hype score
- Not currently trending
🚨 CVE-2023-52919 (Published: 2024-10-22) - Critical vulnerability in Linux nan. Affects specific versions; ensure your systems are updated! 🛡️ For remediation, check the patch details here: https://t.co/Eh9YvPbjmz #CyberSecurity #Linux #CVE
@transilienceai
26 Oct 2024
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2023-52919 (Published: 2024-10-22) - A high-severity vulnerability in Linux nan affects multiple versions. Users are urged to update to the latest stable release to mitigate risks. For more details, check the patch here: https://t.co/wOb7o648fZ #CyberSecurity #Linux
@transilienceai
26 Oct 2024
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2023-52919 (Published: 2024-10-22) affects Linux nan. Critical vulnerability found in specific versions. Users are urged to update to the latest patch available at [Kernel Git](https://t.co/fXOL0ZfiNa) to mitigate risks. Stay secure! #CyberSecurity #Linux
@transilienceai
26 Oct 2024
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2023-52919 (Published: 2024-10-22) - A critical vulnerability in Linux nan affects multiple versions. Users are urged to update to the latest patch available at [Git Kernel](https://t.co/fXOL0ZfiNa) to mitigate risks. Stay secure! #CyberSecurity #Linux
@transilienceai
26 Oct 2024
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2023-52919 In the Linux kernel, the following vulnerability has been resolved: nfc: nci: fix possible NULL pointer dereference in send_acknowledge() Handle memory allocation f… https://t.co/JaIXFtVvtz
@CVEnew
22 Oct 2024
67 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9308CECA-265A-4320-919C-AAA09F971F85", "versionEndExcluding": "4.14.328", "versionStartIncluding": "3.11" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02978144-891F-40EF-83B8-59063740AEF6", "versionEndExcluding": "4.19.297", "versionStartIncluding": "4.15" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9F46843-24C9-4AC7-B6BB-1EF101D05435", "versionEndExcluding": "5.4.259", "versionStartIncluding": "4.20" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D886A8D-A6CD-44FA-ACF5-DD260ECA7A1B", "versionEndExcluding": "5.10.199", "versionStartIncluding": "5.5" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED031B8B-BFA9-4475-A6D1-1419BDE46E7D", "versionEndExcluding": "5.15.137", "versionStartIncluding": "5.11" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8DBCAF5-D3B4-4DBB-A86B-26B0A6F7B805", "versionEndExcluding": "6.1.60", "versionStartIncluding": "5.16" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7530F3AE-8FCB-4E55-B216-62CE4E1CEDA3", "versionEndExcluding": "6.5.9", "versionStartIncluding": "6.2" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84267A4F-DBC2-444F-B41D-69E15E1BEC97" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB440208-241C-4246-9A83-C1715C0DAA6C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DC421F1-3D5A-4BEF-BF76-4E468985D20B" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00AB783B-BE05-40E8-9A55-6AA457D95031" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7C78D0A-C4A2-4D41-B726-8979E33AD0F9" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E114E9DD-F7E1-40CC-AAD5-F14E586CB2E6" } ], "operator": "OR" } ] } ]