In the Linux kernel, the following vulnerability has been resolved:
firmware: qcom: qseecom: fix memory leaks in error paths Fix instances of
returning error codes directly instead of jumping to the relevant labels
where memory allocated for the SCM calls would be freed.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/6c57d7b593c4a4e60db65d5ce0fe1d9f79ccbe9b (6.8-rc1)
git.kernel.org/stable/c/6c57d7b593c4a4e60db65d5ce0fe1d9f79ccbe9b
git.kernel.org/stable/c/85fdbf6840455be64eac16bdfe0df3368ee3d0f0
launchpad.net/bugs/cve/CVE-2023-52684
nvd.nist.gov/vuln/detail/CVE-2023-52684
security-tracker.debian.org/tracker/CVE-2023-52684
www.cve.org/CVERecord?id=CVE-2023-52684