CVE-2023-52675

In the Linux kernel, the following vulnerability has been resolved: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure.
References
Link Resource
https://git.kernel.org/stable/c/024352f7928b28f53609660663329d8c0f4ad032 Patch Mailing List
https://git.kernel.org/stable/c/024352f7928b28f53609660663329d8c0f4ad032 Patch Mailing List
https://git.kernel.org/stable/c/0a233867a39078ebb0f575e2948593bbff5826b3 Patch Mailing List
https://git.kernel.org/stable/c/0a233867a39078ebb0f575e2948593bbff5826b3 Patch Mailing List
https://git.kernel.org/stable/c/1e80aa25d186a7aa212df5acd8c75f55ac8dae34 Patch Mailing List
https://git.kernel.org/stable/c/1e80aa25d186a7aa212df5acd8c75f55ac8dae34 Patch Mailing List
https://git.kernel.org/stable/c/5a669f3511d273c8c1ab1c1d268fbcdf53fc7a05 Patch Mailing List
https://git.kernel.org/stable/c/5a669f3511d273c8c1ab1c1d268fbcdf53fc7a05 Patch Mailing List
https://git.kernel.org/stable/c/75fc599bcdcb1de093c9ced2e3cccc832f3787f3 Patch Mailing List
https://git.kernel.org/stable/c/75fc599bcdcb1de093c9ced2e3cccc832f3787f3 Patch Mailing List
https://git.kernel.org/stable/c/a2da3f9b1a1019c887ee1d164475a8fcdb0a3fec Patch Mailing List
https://git.kernel.org/stable/c/a2da3f9b1a1019c887ee1d164475a8fcdb0a3fec Patch Mailing List
https://git.kernel.org/stable/c/c7d828e12b326ea50fb80c369d7aa87519ed14c6 Patch Mailing List
https://git.kernel.org/stable/c/c7d828e12b326ea50fb80c369d7aa87519ed14c6 Patch Mailing List
https://git.kernel.org/stable/c/f105c263009839d80fad6998324a4e1b3511cba0 Patch Mailing List
https://git.kernel.org/stable/c/f105c263009839d80fad6998324a4e1b3511cba0 Patch Mailing List
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html Mailing List
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:40

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html - Mailing List
References () https://git.kernel.org/stable/c/a2da3f9b1a1019c887ee1d164475a8fcdb0a3fec - () https://git.kernel.org/stable/c/a2da3f9b1a1019c887ee1d164475a8fcdb0a3fec - Patch, Mailing List
References () https://git.kernel.org/stable/c/75fc599bcdcb1de093c9ced2e3cccc832f3787f3 - () https://git.kernel.org/stable/c/75fc599bcdcb1de093c9ced2e3cccc832f3787f3 - Patch, Mailing List
References () https://git.kernel.org/stable/c/f105c263009839d80fad6998324a4e1b3511cba0 - () https://git.kernel.org/stable/c/f105c263009839d80fad6998324a4e1b3511cba0 - Patch, Mailing List
References () https://git.kernel.org/stable/c/c7d828e12b326ea50fb80c369d7aa87519ed14c6 - () https://git.kernel.org/stable/c/c7d828e12b326ea50fb80c369d7aa87519ed14c6 - Patch, Mailing List
References () https://git.kernel.org/stable/c/5a669f3511d273c8c1ab1c1d268fbcdf53fc7a05 - () https://git.kernel.org/stable/c/5a669f3511d273c8c1ab1c1d268fbcdf53fc7a05 - Patch, Mailing List
References () https://git.kernel.org/stable/c/1e80aa25d186a7aa212df5acd8c75f55ac8dae34 - () https://git.kernel.org/stable/c/1e80aa25d186a7aa212df5acd8c75f55ac8dae34 - Patch, Mailing List
References () https://git.kernel.org/stable/c/0a233867a39078ebb0f575e2948593bbff5826b3 - () https://git.kernel.org/stable/c/0a233867a39078ebb0f575e2948593bbff5826b3 - Patch, Mailing List
References () https://git.kernel.org/stable/c/024352f7928b28f53609660663329d8c0f4ad032 - () https://git.kernel.org/stable/c/024352f7928b28f53609660663329d8c0f4ad032 - Patch, Mailing List
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

04 Nov 2024, 13:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html', 'name': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html', 'tags': [], 'refsource': ''}

25 Jun 2024, 21:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html -

17 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-17 15:15

Updated : 2024-11-21 08:40


NVD link : CVE-2023-52675

Mitre link : CVE-2023-52675


JSON object : View

Products Affected

linux

  • linux_kernel
CWE

No CWE.