CVE-2023-52500

In the Linux kernel, the following vulnerability has been resolved: scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command Tags allocated for OPC_INB_SET_CONTROLLER_CONFIG command need to be freed when we receive the response.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*

History

13 Jan 2025, 18:43

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CWE NVD-CWE-Other
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749 - () https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749 - Patch
References () https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7 - () https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7 - Patch
References () https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4 - () https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4 - Patch
References () https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172 - () https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172 - Patch
References () https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d - () https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d - Patch

Information

Published : 2024-03-02 22:15

Updated : 2025-01-13 18:43


NVD link : CVE-2023-52500

Mitre link : CVE-2023-52500

CVE.ORG link : CVE-2023-52500


JSON object : View

Products Affected

linux

  • linux_kernel