In the Linux kernel, the following vulnerability has been resolved:
powerpc/powernv: Add a null pointer check to scom_debug_init_one()
kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
Add a null pointer check, and release 'ent' to avoid memory leaks.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 08:40
Type | Values Removed | Values Added |
---|---|---|
First Time |
Debian debian Linux
Debian Linux linux Kernel Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References |
|
|
References | () https://git.kernel.org/stable/c/2a82c4439b903639e0a1f21990cd399fb0a49c19 - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/9a260f2dd827bbc82cc60eb4f4d8c22707d80742 - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/f84c1446daa552e9699da8d1f8375eac0f65edc7 - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/dd8422ff271c22058560832fc3006324ded895a9 - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/ed8d023cfa97b559db58c0e1afdd2eec7a83d8f2 - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/1eefa93faf69188540b08b024794fa90b1d82e8b - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/a9c05cbb6644a2103c75b6906e9dafb9981ebd13 - Patch, Mailing List | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
04 Nov 2024, 13:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 May 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-17 15:15
Updated : 2024-11-21 08:40
NVD link : CVE-2023-52690
Mitre link : CVE-2023-52690
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
No CWE.