5.5
CVE-2023-52690
- EPSS 0.04%
- Veröffentlicht 17.05.2024 15:15:20
- Zuletzt bearbeitet 21.11.2024 08:40:22
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv: Add a null pointer check to scom_debug_init_one() kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Add a null pointer check, and release 'ent' to avoid memory leaks.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 5.4 < 5.4.268
Linux ≫ Linux Kernel Version >= 5.5 < 5.10.209
Linux ≫ Linux Kernel Version >= 5.11 < 5.15.148
Linux ≫ Linux Kernel Version >= 5.16 < 6.1.75
Linux ≫ Linux Kernel Version >= 6.2 < 6.6.14
Linux ≫ Linux Kernel Version >= 6.7 < 6.7.2
Debian ≫ Debian Linux Version10.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.095 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-476 NULL Pointer Dereference
The product dereferences a pointer that it expects to be valid but is NULL.