CVE-2023-52690 — NULL Pointer Dereference in Linux
Severity
5.5MEDIUMNVD
OSV7.5
EPSS
0.0%
top 90.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 17
Latest updateJun 26
Description
In the Linux kernel, the following vulnerability has been resolved:
powerpc/powernv: Add a null pointer check to scom_debug_init_one()
kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
Add a null pointer check, and release 'ent' to avoid memory leaks.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages4 packages
▶CVEListV5linux/linuxbfd2f0d49aef8abfe6bf58f12719f39912993cc6 — f84c1446daa552e9699da8d1f8375eac0f65edc7+7
Also affects: Debian Linux 10.0
Patches
🔴Vulnerability Details
10📋Vendor Advisories
10💬Community
1Bugzilla▶
CVE-2023-52690 kernel: powerpc/powernv: Add a null pointer check to scom_debug_init_one()↗2024-05-18