In the Linux kernel, the following vulnerability has been resolved:
powerpc/powernv: Add a null pointer check in opal_powercap_init()
kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
07 Apr 2025, 19:05
Type | Values Removed | Values Added |
---|---|---|
First Time |
Debian
Linux linux Kernel Debian debian Linux Linux |
|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/69f95c5e9220f77ce7c540686b056c2b49e9a664 - Patch | |
References | () https://git.kernel.org/stable/c/6b58d16037217d0c64a2a09b655f370403ec7219 - Patch | |
References | () https://git.kernel.org/stable/c/9da4a56dd3772570512ca58aa8832b052ae910dc - Patch | |
References | () https://git.kernel.org/stable/c/a67a04ad05acb56640798625e73fa54d6d41cce1 - Patch | |
References | () https://git.kernel.org/stable/c/b02ecc35d01a76b4235e008d2dd292895b28ecab - Patch | |
References | () https://git.kernel.org/stable/c/e123015c0ba859cf48aa7f89c5016cc6e98e018d - Patch | |
References | () https://git.kernel.org/stable/c/f152a6bfd187f67afeffc9fd68cbe46f51439be0 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html - Mailing List, Third Party Advisory |
21 Nov 2024, 08:40
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/69f95c5e9220f77ce7c540686b056c2b49e9a664 - | |
References | () https://git.kernel.org/stable/c/6b58d16037217d0c64a2a09b655f370403ec7219 - | |
References | () https://git.kernel.org/stable/c/9da4a56dd3772570512ca58aa8832b052ae910dc - | |
References | () https://git.kernel.org/stable/c/a67a04ad05acb56640798625e73fa54d6d41cce1 - | |
References | () https://git.kernel.org/stable/c/b02ecc35d01a76b4235e008d2dd292895b28ecab - | |
References | () https://git.kernel.org/stable/c/e123015c0ba859cf48aa7f89c5016cc6e98e018d - | |
References | () https://git.kernel.org/stable/c/f152a6bfd187f67afeffc9fd68cbe46f51439be0 - |
04 Nov 2024, 13:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jul 2024, 01:43
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-476 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
25 Jun 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
17 May 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-17 15:15
Updated : 2025-04-07 19:05
NVD link : CVE-2023-52696
Mitre link : CVE-2023-52696
CVE.ORG link : CVE-2023-52696
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference