
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-52789 is a vulnerability in the Linux kernel's tty vcc driver that was discovered and resolved in 2023. The vulnerability stems from an unchecked return value of kstrdup() in the vcc_probe() function, which could potentially lead to a NULL pointer dereference (Debian Security, NVD).
The vulnerability exists in the Linux kernel's tty/vcc.c driver where the kstrdup() function's return value was not properly checked in the vcc_probe() function. This could lead to a NULL pointer dereference if the memory allocation fails. The issue has been assigned a CVSS v3.1 base score of 5.5 (Medium), with attack vector being Local (AV:L), attack complexity Low (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), scope unchanged (S:U), and high impact on availability (A:H) (NVD).
The vulnerability could lead to a NULL pointer dereference in the Linux kernel's tty vcc driver, potentially causing system crashes or denial of service conditions. The impact is primarily on system availability, with no direct effect on confidentiality or integrity (NVD).
The vulnerability has been fixed by adding proper checks for the kstrdup() return value in the vcc_probe() function. The fix has been implemented across multiple Linux kernel versions, including 5.15.0-100.110 for Ubuntu 22.04 LTS and 5.4.0-173.191 for Ubuntu 20.04 LTS. Users are advised to update their kernel to the latest patched version (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."