CVE-2023-52650

In the Linux kernel, the following vulnerability has been resolved: drm/tegra: dsi: Add missing check for of_find_device_by_node Add check for the return value of of_find_device_by_node() and return the error if it fails in order to avoid NULL pointer dereference.
References
Link Resource
https://git.kernel.org/stable/c/3169eaf1365541fd8e521091010c44fbe14691fc Patch
https://git.kernel.org/stable/c/47a13d0b9d8527518639ab5c39667f69d6203e80 Patch
https://git.kernel.org/stable/c/50c0ad785a780c72a2fdaba10b38c645ffb4eae6 Patch
https://git.kernel.org/stable/c/52aa507148c4aad41436e2005d742ffcafad9976 Patch
https://git.kernel.org/stable/c/92003981a6df5dc84af8a5904f8ee112fa324129 Patch
https://git.kernel.org/stable/c/93128052bf832359531c3c0a9e3567b2b8682a2d Patch
https://git.kernel.org/stable/c/afe6fcb9775882230cd29b529203eabd5d2a638d Patch
https://git.kernel.org/stable/c/c5d2342d24ef6e08fc90a529fe3dc59de421a2b9 Patch
https://git.kernel.org/stable/c/f05631a8525c3b5e5994ecb1304d2d878956c0f5 Patch
https://git.kernel.org/stable/c/3169eaf1365541fd8e521091010c44fbe14691fc Patch
https://git.kernel.org/stable/c/47a13d0b9d8527518639ab5c39667f69d6203e80 Patch
https://git.kernel.org/stable/c/50c0ad785a780c72a2fdaba10b38c645ffb4eae6 Patch
https://git.kernel.org/stable/c/52aa507148c4aad41436e2005d742ffcafad9976 Patch
https://git.kernel.org/stable/c/92003981a6df5dc84af8a5904f8ee112fa324129 Patch
https://git.kernel.org/stable/c/93128052bf832359531c3c0a9e3567b2b8682a2d Patch
https://git.kernel.org/stable/c/afe6fcb9775882230cd29b529203eabd5d2a638d Patch
https://git.kernel.org/stable/c/c5d2342d24ef6e08fc90a529fe3dc59de421a2b9 Patch
https://git.kernel.org/stable/c/f05631a8525c3b5e5994ecb1304d2d878956c0f5 Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

23 Dec 2024, 14:09

Type Values Removed Values Added
CWE CWE-476
References () https://git.kernel.org/stable/c/3169eaf1365541fd8e521091010c44fbe14691fc - () https://git.kernel.org/stable/c/3169eaf1365541fd8e521091010c44fbe14691fc - Patch
References () https://git.kernel.org/stable/c/47a13d0b9d8527518639ab5c39667f69d6203e80 - () https://git.kernel.org/stable/c/47a13d0b9d8527518639ab5c39667f69d6203e80 - Patch
References () https://git.kernel.org/stable/c/50c0ad785a780c72a2fdaba10b38c645ffb4eae6 - () https://git.kernel.org/stable/c/50c0ad785a780c72a2fdaba10b38c645ffb4eae6 - Patch
References () https://git.kernel.org/stable/c/52aa507148c4aad41436e2005d742ffcafad9976 - () https://git.kernel.org/stable/c/52aa507148c4aad41436e2005d742ffcafad9976 - Patch
References () https://git.kernel.org/stable/c/92003981a6df5dc84af8a5904f8ee112fa324129 - () https://git.kernel.org/stable/c/92003981a6df5dc84af8a5904f8ee112fa324129 - Patch
References () https://git.kernel.org/stable/c/93128052bf832359531c3c0a9e3567b2b8682a2d - () https://git.kernel.org/stable/c/93128052bf832359531c3c0a9e3567b2b8682a2d - Patch
References () https://git.kernel.org/stable/c/afe6fcb9775882230cd29b529203eabd5d2a638d - () https://git.kernel.org/stable/c/afe6fcb9775882230cd29b529203eabd5d2a638d - Patch
References () https://git.kernel.org/stable/c/c5d2342d24ef6e08fc90a529fe3dc59de421a2b9 - () https://git.kernel.org/stable/c/c5d2342d24ef6e08fc90a529fe3dc59de421a2b9 - Patch
References () https://git.kernel.org/stable/c/f05631a8525c3b5e5994ecb1304d2d878956c0f5 - () https://git.kernel.org/stable/c/f05631a8525c3b5e5994ecb1304d2d878956c0f5 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List, Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Debian debian Linux
Debian
Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Nov 2024, 08:40

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/3169eaf1365541fd8e521091010c44fbe14691fc - () https://git.kernel.org/stable/c/3169eaf1365541fd8e521091010c44fbe14691fc -
References () https://git.kernel.org/stable/c/47a13d0b9d8527518639ab5c39667f69d6203e80 - () https://git.kernel.org/stable/c/47a13d0b9d8527518639ab5c39667f69d6203e80 -
References () https://git.kernel.org/stable/c/50c0ad785a780c72a2fdaba10b38c645ffb4eae6 - () https://git.kernel.org/stable/c/50c0ad785a780c72a2fdaba10b38c645ffb4eae6 -
References () https://git.kernel.org/stable/c/52aa507148c4aad41436e2005d742ffcafad9976 - () https://git.kernel.org/stable/c/52aa507148c4aad41436e2005d742ffcafad9976 -
References () https://git.kernel.org/stable/c/92003981a6df5dc84af8a5904f8ee112fa324129 - () https://git.kernel.org/stable/c/92003981a6df5dc84af8a5904f8ee112fa324129 -
References () https://git.kernel.org/stable/c/93128052bf832359531c3c0a9e3567b2b8682a2d - () https://git.kernel.org/stable/c/93128052bf832359531c3c0a9e3567b2b8682a2d -
References () https://git.kernel.org/stable/c/afe6fcb9775882230cd29b529203eabd5d2a638d - () https://git.kernel.org/stable/c/afe6fcb9775882230cd29b529203eabd5d2a638d -
References () https://git.kernel.org/stable/c/c5d2342d24ef6e08fc90a529fe3dc59de421a2b9 - () https://git.kernel.org/stable/c/c5d2342d24ef6e08fc90a529fe3dc59de421a2b9 -
References () https://git.kernel.org/stable/c/f05631a8525c3b5e5994ecb1304d2d878956c0f5 - () https://git.kernel.org/stable/c/f05631a8525c3b5e5994ecb1304d2d878956c0f5 -

04 Nov 2024, 13:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 23:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: drm/tegra: dsi: Agregar verificación faltante para of_find_device_by_node Agregue verificación para el valor de retorno de of_find_device_by_node() y devuelva el error si falla para evitar la desreferencia al puntero NULL.
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

01 May 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 13:15

Updated : 2024-12-23 14:09


NVD link : CVE-2023-52650

Mitre link : CVE-2023-52650

CVE.ORG link : CVE-2023-52650


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-476

NULL Pointer Dereference