First published: Thu Mar 27 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: efi: fix potential NULL deref in efi_mem_reserve_persistent When iterating on a linked list, a result of memremap is dereferenced without checking it for NULL. This patch adds a check that falls back on allocating a new page in case memremap doesn't succeed. Found by Linux Verification Center (linuxtesting.org) with SVACE. [ardb: return -ENOMEM instead of breaking out of the loop]
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.1.16<5.4.232 | |
Linux Kernel | >=5.5<5.10.168 | |
Linux Kernel | >=5.11<5.15.93 | |
Linux Kernel | >=5.16<6.1.11 | |
Linux Kernel | =6.2-rc1 | |
Linux Kernel | =6.2-rc2 | |
Linux Kernel | =6.2-rc3 | |
Linux Kernel | =6.2-rc4 | |
Linux Kernel | =6.2-rc5 | |
Linux Kernel | =6.2-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-52976 is considered moderate since it involves a potential NULL dereference in the Linux kernel.
To fix CVE-2023-52976, update your Linux kernel to the latest version where this vulnerability has been patched.
CVE-2023-52976 could potentially lead to null pointer dereferences, resulting in system crashes or instability.
CVE-2023-52976 affects various versions of the Linux kernel prior to the patch being applied.
As of now, there is no public indication that CVE-2023-52976 is being actively exploited in the wild.