CVE-2023-52585
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
06/03/2024
Last modified:
14/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()<br />
<br />
Return invalid error code -EINVAL for invalid block id.<br />
<br />
Fixes the below:<br />
<br />
drivers/gpu/drm/amd/amdgpu/amdgpu_ras.c:1183 amdgpu_ras_query_error_status_helper() error: we previously assumed &#39;info&#39; could be null (see line 1176)
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7.4 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4 (including) | 5.4.277 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.218 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.160 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.92 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.32 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.4 (excluding) |
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a
- https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49
- https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626
- https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b
- https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915
- https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680
- https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1
- https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a
- https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49
- https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626
- https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b
- https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915
- https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680
- https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1
- https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html
- https://security.netapp.com/advisory/ntap-20240912-0009/



