In the Linux kernel, the following vulnerability has been resolved: clk:
mediatek: clk-mt2701: Add check for mtk_alloc_clk_data Add the check for
the return value of mtk_alloc_clk_data() in order to avoid NULL pointer
dereference.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
git.kernel.org/linus/0d6e24b422a2166a9297a8286ff2e6ab9a5e8cd3 (6.7-rc1)
git.kernel.org/stable/c/001e5def774fa1a8f2b29567c0b0cd3e3a859a96
git.kernel.org/stable/c/0d6e24b422a2166a9297a8286ff2e6ab9a5e8cd3
git.kernel.org/stable/c/1953e62366da5460dc712e045f94fb0d8918999d
git.kernel.org/stable/c/1bf9c204aef4cc55ce46a7ff2d4dc7e5f86551a7
git.kernel.org/stable/c/2a18dd653284550900b02107c3c7b3ac5e0eb802
git.kernel.org/stable/c/6fccee2af400edaed9cf349d506c5971d4762739
git.kernel.org/stable/c/d1175cf4bd2b4c5f7c43f677ea1ce9ad2c18d055
git.kernel.org/stable/c/d1461f0c9ca0827c03730fe9652ebbf6316a2a95
git.kernel.org/stable/c/e61934720af4a58ffd43a63ffdd6f3a0bd7d7b47
launchpad.net/bugs/cve/CVE-2023-52875
nvd.nist.gov/vuln/detail/CVE-2023-52875
security-tracker.debian.org/tracker/CVE-2023-52875
www.cve.org/CVERecord?id=CVE-2023-52875