{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-54319","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-30T12:28:53.859Z","datePublished":"2025-12-30T12:34:13.468Z","dateUpdated":"2026-05-11T19:59:40.207Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:59:40.207Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: at91-pio4: check return value of devm_kasprintf()\n\ndevm_kasprintf() returns a pointer to dynamically allocated memory.\nPointer could be NULL in case allocation fails. Check pointer validity.\nIdentified with coccinelle (kmerr.cocci script).\n\nDepends-on: 1c4e5c470a56 (\"pinctrl: at91: use devm_kasprintf() to avoid potential leaks\")\nDepends-on: 5a8f9cf269e8 (\"pinctrl: at91-pio4: use proper format specifier for unsigned int\")"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/pinctrl/pinctrl-at91-pio4.c"],"versions":[{"version":"776180848b574c9c01217fa958f10843ffce584f","lessThan":"8d788f2ba830d6d32499b198c526d577c590eedf","status":"affected","versionType":"git"},{"version":"776180848b574c9c01217fa958f10843ffce584f","lessThan":"3e8ce1d5a1a9d758b359e5c426543957f35991f8","status":"affected","versionType":"git"},{"version":"776180848b574c9c01217fa958f10843ffce584f","lessThan":"aa3932eb07392d626486428e2ffddc660658e22a","status":"affected","versionType":"git"},{"version":"776180848b574c9c01217fa958f10843ffce584f","lessThan":"f3c7b95c9991dab02e616fc251b6c3516e0bd0ac","status":"affected","versionType":"git"},{"version":"776180848b574c9c01217fa958f10843ffce584f","lessThan":"0a95dd17a73b7603818ad7c46c99d757232be331","status":"affected","versionType":"git"},{"version":"776180848b574c9c01217fa958f10843ffce584f","lessThan":"0af388fce352ed2ab383fd5d1a08db551ca15c38","status":"affected","versionType":"git"},{"version":"776180848b574c9c01217fa958f10843ffce584f","lessThan":"5bfd577cc728270d6cd7af6c652a1e7661f25487","status":"affected","versionType":"git"},{"version":"776180848b574c9c01217fa958f10843ffce584f","lessThan":"8a1fa202f47f39680a4305af744f499a324f8a03","status":"affected","versionType":"git"},{"version":"776180848b574c9c01217fa958f10843ffce584f","lessThan":"f6fd5d4ff8ca0b24cee1af4130bcb1fa96b61aa0","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/pinctrl/pinctrl-at91-pio4.c"],"versions":[{"version":"4.4","status":"affected"},{"version":"0","lessThan":"4.4","status":"unaffected","versionType":"semver"},{"version":"4.14.322","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.291","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.251","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.188","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.121","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.39","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.3.13","lessThanOrEqual":"6.3.*","status":"unaffected","versionType":"semver"},{"version":"6.4.4","lessThanOrEqual":"6.4.*","status":"unaffected","versionType":"semver"},{"version":"6.5","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4","versionEndExcluding":"4.14.322"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4","versionEndExcluding":"4.19.291"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4","versionEndExcluding":"5.4.251"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4","versionEndExcluding":"5.10.188"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4","versionEndExcluding":"5.15.121"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4","versionEndExcluding":"6.1.39"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4","versionEndExcluding":"6.3.13"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4","versionEndExcluding":"6.4.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4","versionEndExcluding":"6.5"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/8d788f2ba830d6d32499b198c526d577c590eedf"},{"url":"https://git.kernel.org/stable/c/3e8ce1d5a1a9d758b359e5c426543957f35991f8"},{"url":"https://git.kernel.org/stable/c/aa3932eb07392d626486428e2ffddc660658e22a"},{"url":"https://git.kernel.org/stable/c/f3c7b95c9991dab02e616fc251b6c3516e0bd0ac"},{"url":"https://git.kernel.org/stable/c/0a95dd17a73b7603818ad7c46c99d757232be331"},{"url":"https://git.kernel.org/stable/c/0af388fce352ed2ab383fd5d1a08db551ca15c38"},{"url":"https://git.kernel.org/stable/c/5bfd577cc728270d6cd7af6c652a1e7661f25487"},{"url":"https://git.kernel.org/stable/c/8a1fa202f47f39680a4305af744f499a324f8a03"},{"url":"https://git.kernel.org/stable/c/f6fd5d4ff8ca0b24cee1af4130bcb1fa96b61aa0"}],"title":"pinctrl: at91-pio4: check return value of devm_kasprintf()","x_generator":{"engine":"bippy-1.2.0"}}}}