CVE-2023-52690

Source
https://cve.org/CVERecord?id=CVE-2023-52690
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52690.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52690
Downstream
Related
Published
2024-05-17T14:24:50.648Z
Modified
2026-04-11T12:46:34.565743Z
Summary
powerpc/powernv: Add a null pointer check to scom_debug_init_one()
Details

In the Linux kernel, the following vulnerability has been resolved:

powerpc/powernv: Add a null pointer check to scomdebuginit_one()

kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Add a null pointer check, and release 'ent' to avoid memory leaks.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52690.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bfd2f0d49aef8abfe6bf58f12719f39912993cc6
Fixed
f84c1446daa552e9699da8d1f8375eac0f65edc7
Fixed
1eefa93faf69188540b08b024794fa90b1d82e8b
Fixed
2a82c4439b903639e0a1f21990cd399fb0a49c19
Fixed
ed8d023cfa97b559db58c0e1afdd2eec7a83d8f2
Fixed
dd8422ff271c22058560832fc3006324ded895a9
Fixed
a9c05cbb6644a2103c75b6906e9dafb9981ebd13
Fixed
9a260f2dd827bbc82cc60eb4f4d8c22707d80742

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52690.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.4.0
Fixed
5.4.268
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.209
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.148
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.75
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.14
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52690.json"