CVE-2023-52824

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVSS

No CVSS.

References

No reference.

Configurations

No configuration.

History

24 May 2024, 16:15

Type Values Removed Values Added
References
  • {'url': 'https://git.kernel.org/stable/c/0f403ebad98e6151aaa9c96c9aae5549aa4d87cd', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/22260dabcfe30ab70440d91aa1e4a703d13925c4', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/6995df256e4f5841fb45cf40d04f94b62b8067e1', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/c7acf02df1673a4ea7d6401ac4bc773ffe6a88f6', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/ca0776571d3163bd03b3e8c9e3da936abfaecbf6', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
Summary (en) In the Linux kernel, the following vulnerability has been resolved: kernel: watch_queue: copy user-array safely Currently, there is no overflow-check with memdup_user(). Use the new function memdup_array_user() instead of memdup_user() for duplicating the user-space array safely. (en) Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

21 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 16:15

Updated : 2024-05-24 16:15


NVD link : CVE-2023-52824

Mitre link : CVE-2023-52824

CVE.ORG link : CVE-2023-52824


JSON object : View

Products Affected

No product.

CWE

No CWE.