CVE-2023-54189
Description
In the Linux kernel, the following vulnerability has been resolved:
pstore/ram: Add check for kstrdup
Add check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A missing kstrdup() return-value check in the Linux kernel's pstore/ram driver could lead to a NULL pointer dereference.
Vulnerability
CVE-2023-54189 is a NULL pointer dereference vulnerability in the Linux kernel's pstore/ram driver for persistent storage (pstore/ram). The root cause is the absence of a return-value check for the kstrdup() function call. If kstrdup() fails (e.g., due to memory pressure), the code proceeds to use the returned NULL pointer without validation, leading to a potential crash [1].
Exploitation
Exploitation requires the ability to trigger a memory allocation failure in the kernel's pstore/ram subsystem. This could be achieved by exhausting system memory or by other means that cause kstrdup() to return NULL. No special privileges are needed beyond the ability to trigger the pstore/ram code path, which may be accessible to unprivileged users depending on the system configuration.
Impact
A successful exploit results in a NULL pointer dereference, causing a kernel oops or panic. This leads to a denial of service (DoS) condition, making the system unavailable. There is no evidence of privilege escalation or data corruption from this vulnerability.
Mitigation
The fix adds a check for the return value of kstrdup() and returns an error if it fails, preventing the NULL pointer from being dereferenced [1]. The patch has been applied to the stable kernel tree. Users should update to a kernel version containing the fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
78430a8e8e854a14cb307267b38a9d7dac3adf57ba91a46d32a764a2facd9065c81ae5817d97038d5ec20Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- git.kernel.org/stable/c/065c81ae5817b245bb9feb6d54e027702740b49anvd
- git.kernel.org/stable/c/2a764a2facd9dd88a69777200f65dfd0182765dcnvd
- git.kernel.org/stable/c/38a9d7dac3ad25323145b4aaea3b5f434f50011dnvd
- git.kernel.org/stable/c/8430a8e8e85420d4cb51dcb08b0278ab194ea82fnvd
- git.kernel.org/stable/c/a14cb307267ba7a1715403e071bdc4deda77eef5nvd
- git.kernel.org/stable/c/d97038d5ec2062733c1e016caf9baaf68cf64ea1nvd
- git.kernel.org/stable/c/f57ba91a46d3fc52bfdac9cca5cf5572ec7afd6dnvd
News mentions
0No linked articles in our index yet.