CVE-2023-52652

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52652
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52652.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52652
Downstream
Related
Published
2024-05-01T13:03:58.575Z
Modified
2025-11-28T02:35:49.510804Z
Summary
NTB: fix possible name leak in ntb_register_device()
Details

In the Linux kernel, the following vulnerability has been resolved:

NTB: fix possible name leak in ntbregisterdevice()

If deviceregister() fails in ntbregisterdevice(), the device name allocated by devsetname() should be freed. As per the comment in deviceregister(), callers should use putdevice() to give up the reference in the error path. So fix this by calling putdevice() in the error path so that the name can be freed in kobject_cleanup().

As a result of this, putdevice() in the error path of ntbregister_device() is removed and the actual error is returned.

[mani: reworded commit message]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52652.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a1bd3baeb2f18b2b3d0f98ce5fdaa725149b950b
Fixed
a62b9f3d7bbfac874cc0c638bc1776dcf1f8ec06
Fixed
6632a54ac8057cc0b0d789c6f73883e871bcd25c
Fixed
a039690d323221eb5865f1f31db3ec264e7a14b6
Fixed
e8025439ef8e16029dc313d78a351ef192469b7b
Fixed
913421f9f7fd8324dcc41753d0f28b52e177ef04
Fixed
aebfdfe39b9327a3077d0df8db3beb3160c9bdd0

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.2.0
Fixed
5.15.153
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.83
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.23
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.11
Type
ECOSYSTEM
Events
Introduced
6.8.0
Fixed
6.8.2