Vulnerability Details : CVE-2023-53005
In the Linux kernel, the following vulnerability has been resolved:
trace_events_hist: add check for return value of 'create_hist_field'
Function 'create_hist_field' is called recursively at
trace_events_hist.c:1954 and can return NULL-value that's why we have
to check it to avoid null pointer dereference.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
Vulnerability category: Memory Corruption
Products affected by CVE-2023-53005
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-53005
0.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 2 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-53005
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST | 2025-04-14 |
CWE ids for CVE-2023-53005
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-53005
-
https://git.kernel.org/stable/c/592ba7116fa620425725ff0972691f352ba3caf6
Patch
-
https://git.kernel.org/stable/c/d2d1ada58e7cc100b8d7d6b082d19321ba4a700a
Patch
-
https://git.kernel.org/stable/c/886aa449235f478e262bbd5dcdee6ed6bc202949
Patch
-
https://git.kernel.org/stable/c/8b152e9150d07a885f95e1fd401fc81af202d9a4
Patch
-
https://git.kernel.org/stable/c/31b2414abeaa6de0490e85164badc6dcb1bb8ec9
Patch
-
https://git.kernel.org/stable/c/b4e7e81b4fdfcf457daee6b7a61769f62198d840
Patch
Jump to