CVE-2023-52814

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix potential null pointer derefernce The amdgpu_ras_get_context may return NULL if device not support ras feature, so add check before using.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/80285ae1ec8717b597b20de38866c29d84d321a1 - Patch () https://git.kernel.org/stable/c/80285ae1ec8717b597b20de38866c29d84d321a1 - Patch
References () https://git.kernel.org/stable/c/9b70fc7d70e8ef7c4a65034c9487f58609e708a1 - Patch () https://git.kernel.org/stable/c/9b70fc7d70e8ef7c4a65034c9487f58609e708a1 - Patch
References () https://git.kernel.org/stable/c/b0702ee4d811708251cdf54d4a1d3e888d365111 - Patch () https://git.kernel.org/stable/c/b0702ee4d811708251cdf54d4a1d3e888d365111 - Patch
References () https://git.kernel.org/stable/c/b93a25de28af153312f0fc979b0663fc4bd3442b - Patch () https://git.kernel.org/stable/c/b93a25de28af153312f0fc979b0663fc4bd3442b - Patch
References () https://git.kernel.org/stable/c/c11cf5e117f50f5a767054600885acd981449afe - Patch () https://git.kernel.org/stable/c/c11cf5e117f50f5a767054600885acd981449afe - Patch
References () https://git.kernel.org/stable/c/da46e63482fdc5e35c008865c22ac64027f6f0c2 - Patch () https://git.kernel.org/stable/c/da46e63482fdc5e35c008865c22ac64027f6f0c2 - Patch

24 May 2024, 01:14

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/80285ae1ec8717b597b20de38866c29d84d321a1 - () https://git.kernel.org/stable/c/80285ae1ec8717b597b20de38866c29d84d321a1 - Patch
References () https://git.kernel.org/stable/c/9b70fc7d70e8ef7c4a65034c9487f58609e708a1 - () https://git.kernel.org/stable/c/9b70fc7d70e8ef7c4a65034c9487f58609e708a1 - Patch
References () https://git.kernel.org/stable/c/b0702ee4d811708251cdf54d4a1d3e888d365111 - () https://git.kernel.org/stable/c/b0702ee4d811708251cdf54d4a1d3e888d365111 - Patch
References () https://git.kernel.org/stable/c/b93a25de28af153312f0fc979b0663fc4bd3442b - () https://git.kernel.org/stable/c/b93a25de28af153312f0fc979b0663fc4bd3442b - Patch
References () https://git.kernel.org/stable/c/c11cf5e117f50f5a767054600885acd981449afe - () https://git.kernel.org/stable/c/c11cf5e117f50f5a767054600885acd981449afe - Patch
References () https://git.kernel.org/stable/c/da46e63482fdc5e35c008865c22ac64027f6f0c2 - () https://git.kernel.org/stable/c/da46e63482fdc5e35c008865c22ac64027f6f0c2 - Patch
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: drm/amdgpu: soluciona una posible desreferencia del puntero null. Amdgpu_ras_get_context puede devolver NULL si el dispositivo no admite la función ras, así que agregue la verificación antes de usarlo.
CWE CWE-476

21 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 16:15

Updated : 2024-11-21 08:40


NVD link : CVE-2023-52814

Mitre link : CVE-2023-52814

CVE.ORG link : CVE-2023-52814


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference