CVE-2023-52585

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() Return invalid error code -EINVAL for invalid block id. Fixes the below: drivers/gpu/drm/amd/amdgpu/amdgpu_ras.c:1183 amdgpu_ras_query_error_status_helper() error: we previously assumed 'info' could be null (see line 1176)
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*

History

14 Mar 2025, 18:57

Type Values Removed Values Added
First Time Netapp
Debian
Linux linux Kernel
Netapp h615c
Netapp h615c Firmware
Netapp h610s
Linux
Netapp h610c Firmware
Netapp h610c
Netapp h610s Firmware
Debian debian Linux
References () https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a - () https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a - Patch
References () https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49 - () https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49 - Patch
References () https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626 - () https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626 - Patch
References () https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b - () https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b - Patch
References () https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915 - () https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915 - Patch
References () https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680 - () https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680 - Patch
References () https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1 - () https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html - Mailing List
References () https://security.netapp.com/advisory/ntap-20240912-0009/ - () https://security.netapp.com/advisory/ntap-20240912-0009/ - Mailing List
CPE cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*

21 Nov 2024, 08:40

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html -
  • () https://security.netapp.com/advisory/ntap-20240912-0009/ -
References () https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a - () https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a -
References () https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49 - () https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49 -
References () https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626 - () https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626 -
References () https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b - () https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b -
References () https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915 - () https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915 -
References () https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680 - () https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680 -
References () https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1 - () https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1 -

06 Nov 2024, 16:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476

04 Nov 2024, 13:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 14:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html -

25 May 2024, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a -
  • () https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626 -
  • () https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b -
  • () https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915 -
  • () https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1 -

06 Mar 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-06 07:15

Updated : 2025-03-14 18:57


NVD link : CVE-2023-52585

Mitre link : CVE-2023-52585

CVE.ORG link : CVE-2023-52585


JSON object : View

Products Affected

debian

  • debian_linux

netapp

  • h615c
  • h610c_firmware
  • h610c
  • h610s_firmware
  • h610s
  • h615c_firmware

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference