In the Linux kernel, the following vulnerability has been resolved:
crypto: safexcel - Add error handling for dma_map_sg() calls
Macro dma_map_sg() may return 0 on error. This patch enables
checks in case of the macro failure and ensures unmapping of
previously mapped buffers with dma_unmap_sg().
Found by Linux Verification Center (linuxtesting.org) with static
analysis tool SVACE.
References
Configurations
Configuration 1 (hide)
|
History
25 Sep 2025, 16:14
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/4c0ac81a172a69a7733290915276672787e904ec - Patch | |
| References | () https://git.kernel.org/stable/c/8084b788c2fb1260f7d44c032d5124680b20d2b2 - Patch | |
| References | () https://git.kernel.org/stable/c/87e02063d07708cac5bfe9fd3a6a242898758ac8 - Patch | |
| References | () https://git.kernel.org/stable/c/fc0b785802b856566df3ac943e38a072557001c4 - Patch | |
| CWE | CWE-252 | |
| First Time |
Linux
Linux linux Kernel |
Information
Published : 2024-05-17 15:15
Updated : 2025-09-25 16:14
NVD link : CVE-2023-52687
Mitre link : CVE-2023-52687
CVE.ORG link : CVE-2023-52687
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-252
Unchecked Return Value
