In the Linux kernel, the following vulnerability has been resolved:
powerpc/powernv: Add a null pointer check in opaleventinit()
kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure.
{ "vanir_signatures": [ { "signature_version": "v1", "digest": { "length": 2242.0, "function_hash": "135078759086626509336168479273409455621" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9a523e1da6d88c2034f946adfa4f74b236c95ca9", "deprecated": false, "target": { "file": "arch/powerpc/platforms/powernv/opal-irqchip.c", "function": "opal_event_init" }, "signature_type": "Function", "id": "CVE-2023-52686-223fd952" }, { "signature_version": "v1", "digest": { "length": 2242.0, "function_hash": "135078759086626509336168479273409455621" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8422d179cf46889c15ceff9ede48c5bfa4e7f0b4", "deprecated": false, "target": { "file": "arch/powerpc/platforms/powernv/opal-irqchip.c", "function": "opal_event_init" }, "signature_type": "Function", "id": "CVE-2023-52686-5abfd7a6" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "327499745418019556586967584544675996070", "74691356507035705837412559282044882847", "242176451929566537906083946613872021690" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8422d179cf46889c15ceff9ede48c5bfa4e7f0b4", "deprecated": false, "target": { "file": "arch/powerpc/platforms/powernv/opal-irqchip.c" }, "signature_type": "Line", "id": "CVE-2023-52686-602b8d9b" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "327499745418019556586967584544675996070", "74691356507035705837412559282044882847", "242176451929566537906083946613872021690" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e6ad05e3ae9c84c5a71d7bb2d44dc845ae7990cf", "deprecated": false, "target": { "file": "arch/powerpc/platforms/powernv/opal-irqchip.c" }, "signature_type": "Line", "id": "CVE-2023-52686-6f3eeb59" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "327499745418019556586967584544675996070", "74691356507035705837412559282044882847", "242176451929566537906083946613872021690" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8649829a1dd25199bbf557b2621cedb4bf9b3050", "deprecated": false, "target": { "file": "arch/powerpc/platforms/powernv/opal-irqchip.c" }, "signature_type": "Line", "id": "CVE-2023-52686-7413a5dc" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "327499745418019556586967584544675996070", "74691356507035705837412559282044882847", "242176451929566537906083946613872021690" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9a523e1da6d88c2034f946adfa4f74b236c95ca9", "deprecated": false, "target": { "file": "arch/powerpc/platforms/powernv/opal-irqchip.c" }, "signature_type": "Line", "id": "CVE-2023-52686-91817cbe" }, { "signature_version": "v1", "digest": { "length": 2242.0, "function_hash": "135078759086626509336168479273409455621" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8649829a1dd25199bbf557b2621cedb4bf9b3050", "deprecated": false, "target": { "file": "arch/powerpc/platforms/powernv/opal-irqchip.c", "function": "opal_event_init" }, "signature_type": "Function", "id": "CVE-2023-52686-dce641c5" }, { "signature_version": "v1", "digest": { "length": 2242.0, "function_hash": "135078759086626509336168479273409455621" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e6ad05e3ae9c84c5a71d7bb2d44dc845ae7990cf", "deprecated": false, "target": { "file": "arch/powerpc/platforms/powernv/opal-irqchip.c", "function": "opal_event_init" }, "signature_type": "Function", "id": "CVE-2023-52686-fd489e8d" } ] }