In the Linux kernel, the following vulnerability has been resolved: fbdev:
imsttfb: fix a resource leak in probe I’ve re-written the error handling
but the bug is that if init_imstt() fails we need to call
iounmap(par->cmap_regs).
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
git.kernel.org/linus/aba6ab57a910ad4b940c2024d15f2cdbf5b7f76b (6.7-rc1)
git.kernel.org/stable/c/18d26f9baca7d0d309303e3074a2252b8310884a
git.kernel.org/stable/c/382e1931e0c9cd58a5a8519cdc6cd9dc4d82b485
git.kernel.org/stable/c/6c66d737b2726ac7784269ddf32a31634f8f269d
git.kernel.org/stable/c/7bc7b82fb2191b0d50a80ee4e27030918767dd1d
git.kernel.org/stable/c/8e4b510fe91782522b7ca0ca881b663b5d35e513
git.kernel.org/stable/c/a4dfebec32ec6d420a5506dd56a7834c91be28e4
git.kernel.org/stable/c/aba6ab57a910ad4b940c2024d15f2cdbf5b7f76b
git.kernel.org/stable/c/b346a531159d08c564a312a9eaeea691704f3c00
launchpad.net/bugs/cve/CVE-2023-52838
nvd.nist.gov/vuln/detail/CVE-2023-52838
security-tracker.debian.org/tracker/CVE-2023-52838
www.cve.org/CVERecord?id=CVE-2023-52838