In the Linux kernel, the following vulnerability has been resolved:
powerpc/powernv: Add a null pointer check to scom_debug_init_one()
kasprintf() returns a pointer to dynamically allocated memory which can be
NULL upon failure. Add a null pointer check, and release ‘ent’ to avoid
memory leaks.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < 6.5.0-41.41 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < 6.5.0-1021.21 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
git.kernel.org/linus/9a260f2dd827bbc82cc60eb4f4d8c22707d80742 (6.8-rc1)
git.kernel.org/stable/c/1eefa93faf69188540b08b024794fa90b1d82e8b
git.kernel.org/stable/c/2a82c4439b903639e0a1f21990cd399fb0a49c19
git.kernel.org/stable/c/9a260f2dd827bbc82cc60eb4f4d8c22707d80742
git.kernel.org/stable/c/a9c05cbb6644a2103c75b6906e9dafb9981ebd13
git.kernel.org/stable/c/dd8422ff271c22058560832fc3006324ded895a9
git.kernel.org/stable/c/ed8d023cfa97b559db58c0e1afdd2eec7a83d8f2
git.kernel.org/stable/c/f84c1446daa552e9699da8d1f8375eac0f65edc7
launchpad.net/bugs/cve/CVE-2023-52690
nvd.nist.gov/vuln/detail/CVE-2023-52690
security-tracker.debian.org/tracker/CVE-2023-52690
ubuntu.com/security/notices/USN-6818-1
ubuntu.com/security/notices/USN-6818-2
ubuntu.com/security/notices/USN-6818-3
ubuntu.com/security/notices/USN-6818-4
ubuntu.com/security/notices/USN-6819-1
ubuntu.com/security/notices/USN-6819-2
ubuntu.com/security/notices/USN-6819-3
ubuntu.com/security/notices/USN-6819-4
www.cve.org/CVERecord?id=CVE-2023-52690