CVE-2023-52686

Source
https://cve.org/CVERecord?id=CVE-2023-52686
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52686.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52686
Downstream
Related
Published
2024-05-17T14:24:47.984Z
Modified
2026-04-11T12:46:34.769886Z
Summary
powerpc/powernv: Add a null pointer check in opal_event_init()
Details

In the Linux kernel, the following vulnerability has been resolved:

powerpc/powernv: Add a null pointer check in opaleventinit()

kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52686.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2717a33d60745f2f72e521cdaedf79b00f66f8ca
Fixed
8422d179cf46889c15ceff9ede48c5bfa4e7f0b4
Fixed
e93d7cf4c1ddbcd846739e7ad849f955a4f18031
Fixed
e6ad05e3ae9c84c5a71d7bb2d44dc845ae7990cf
Fixed
c0b111ea786ddcc8be0682612830796ece9436c7
Fixed
9a523e1da6d88c2034f946adfa4f74b236c95ca9
Fixed
a14c55eb461d630b836f80591d8caf1f74e62877
Fixed
e08c2e275fa1874de945b87093f925997722ee42
Fixed
8649829a1dd25199bbf557b2621cedb4bf9b3050

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52686.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.11.0
Fixed
4.19.306
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.268
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.209
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.148
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.75
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.14
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52686.json"