In the Linux kernel, the following vulnerability has been resolved:
powerpc/powernv: Add a null pointer check in opal_powercap_init()
kasprintf() returns a pointer to dynamically allocated memory which can be
NULL upon failure.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < 6.5.0-41.41 | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/e123015c0ba859cf48aa7f89c5016cc6e98e018d (6.8-rc1)
git.kernel.org/stable/c/69f95c5e9220f77ce7c540686b056c2b49e9a664
git.kernel.org/stable/c/6b58d16037217d0c64a2a09b655f370403ec7219
git.kernel.org/stable/c/9da4a56dd3772570512ca58aa8832b052ae910dc
git.kernel.org/stable/c/a67a04ad05acb56640798625e73fa54d6d41cce1
git.kernel.org/stable/c/b02ecc35d01a76b4235e008d2dd292895b28ecab
git.kernel.org/stable/c/e123015c0ba859cf48aa7f89c5016cc6e98e018d
git.kernel.org/stable/c/f152a6bfd187f67afeffc9fd68cbe46f51439be0
launchpad.net/bugs/cve/CVE-2023-52696
nvd.nist.gov/vuln/detail/CVE-2023-52696
security-tracker.debian.org/tracker/CVE-2023-52696
ubuntu.com/security/notices/USN-6818-1
ubuntu.com/security/notices/USN-6818-2
ubuntu.com/security/notices/USN-6818-3
ubuntu.com/security/notices/USN-6818-4
ubuntu.com/security/notices/USN-6819-1
ubuntu.com/security/notices/USN-6819-2
ubuntu.com/security/notices/USN-6819-3
www.cve.org/CVERecord?id=CVE-2023-52696