[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2023-52652Date: (C)2024-06-27   (M)2024-06-27


In the linux kernel, the following vulnerability has been resolved ntbfix possible name leak in ntb_register_device() if device_register() failsin ntb_register_device(), the device name allocated by dev_set_name()should be freed. as per the comment in device_register(), callers shoulduse put_device() to give up the reference in the error path. so fix this bycalling put_device() in the error path so that the name can be freed inkobject_cleanup(). as a result of this, put_device() in the error path ofntb_register_device() is removed and the actual error is returned. [manireworded commit message]

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.5CVSS Score : 5.0
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: NONE
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: NONEAvailability: PARTIAL
Integrity: NONE 
Availability: HIGH 
  
Reference:
https://ubuntu.com/security/CVE-2023-52652

OVAL    16
oval:org.secpod.oval:def:708997
oval:org.secpod.oval:def:709005
oval:org.secpod.oval:def:708995
oval:org.secpod.oval:def:709006
...
XCCDF    1

© SecPod Technologies