CVE-2023-52585

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() Return invalid error code -EINVAL for invalid block id. Fixes the below: drivers/gpu/drm/amd/amdgpu/amdgpu_ras.c:1183 amdgpu_ras_query_error_status_helper() error: we previously assumed 'info' could be null (see line 1176)
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*

History

14 Mar 2025, 18:57

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a - () https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a - Patch
References () https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49 - () https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49 - Patch
References () https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626 - () https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626 - Patch
References () https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b - () https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b - Patch
References () https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915 - () https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915 - Patch
References () https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680 - () https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680 - Patch
References () https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1 - () https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html - Mailing List
References () https://security.netapp.com/advisory/ntap-20240912-0009/ - () https://security.netapp.com/advisory/ntap-20240912-0009/ - Mailing List
First Time Netapp
Netapp h610c
Netapp h610s
Netapp h610s Firmware
Debian debian Linux
Netapp h615c Firmware
Debian
Netapp h610c Firmware
Linux
Linux linux Kernel
Netapp h615c
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*

21 Nov 2024, 08:40

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html -
  • () https://security.netapp.com/advisory/ntap-20240912-0009/ -
References () https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a - () https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a -
References () https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49 - () https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49 -
References () https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626 - () https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626 -
References () https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b - () https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b -
References () https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915 - () https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915 -
References () https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680 - () https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680 -
References () https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1 - () https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1 -

06 Nov 2024, 16:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476

04 Nov 2024, 13:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 14:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html -

25 May 2024, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a -
  • () https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626 -
  • () https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b -
  • () https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915 -
  • () https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1 -

06 Mar 2024, 15:18

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: corrige una posible desreferencia NULL en amdgpu_ras_query_error_status_helper() Devuelve un código de error no válido -EINVAL para una identificación de bloque no válida. Corrige lo siguiente: drivers/gpu/drm/amd/amdgpu/amdgpu_ras.c:1183 error amdgpu_ras_query_error_status_helper(): anteriormente asumimos que la 'información' podría ser nula (consulte la línea 1176)

06 Mar 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-06 07:15

Updated : 2025-03-14 18:57


NVD link : CVE-2023-52585

Mitre link : CVE-2023-52585

CVE.ORG link : CVE-2023-52585


JSON object : View

Products Affected

netapp

  • h610s_firmware
  • h615c_firmware
  • h610c_firmware
  • h610s
  • h615c
  • h610c

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference