CVE-2023-52675

Source
https://cve.org/CVERecord?id=CVE-2023-52675
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52675.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52675
Downstream
Related
Published
2024-05-17T14:24:40.721Z
Modified
2026-04-11T12:46:34.513119Z
Summary
powerpc/imc-pmu: Add a null pointer check in update_events_in_group()
Details

In the Linux kernel, the following vulnerability has been resolved:

powerpc/imc-pmu: Add a null pointer check in updateeventsin_group()

kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52675.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
885dcd709ba9120b9935415b8b0f9d1b94e5826b
Fixed
75fc599bcdcb1de093c9ced2e3cccc832f3787f3
Fixed
1e80aa25d186a7aa212df5acd8c75f55ac8dae34
Fixed
5a669f3511d273c8c1ab1c1d268fbcdf53fc7a05
Fixed
f105c263009839d80fad6998324a4e1b3511cba0
Fixed
a2da3f9b1a1019c887ee1d164475a8fcdb0a3fec
Fixed
024352f7928b28f53609660663329d8c0f4ad032
Fixed
c7d828e12b326ea50fb80c369d7aa87519ed14c6
Fixed
0a233867a39078ebb0f575e2948593bbff5826b3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52675.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.14.0
Fixed
4.19.306
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.268
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.209
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.148
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.75
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.14
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52675.json"