First published: Wed May 01 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: NTB: fix possible name leak in ntb_register_device() If device_register() fails in ntb_register_device(), the device name allocated by dev_set_name() should be freed. As per the comment in device_register(), callers should use put_device() to give up the reference in the error path. So fix this by calling put_device() in the error path so that the name can be freed in kobject_cleanup(). As a result of this, put_device() in the error path of ntb_register_device() is removed and the actual error is returned. [mani: reworded commit message]
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52652 has a medium severity rating due to its potential to disclose device names.
To fix CVE-2023-52652, you should upgrade to the latest kernel version that includes the resolution.
CVE-2023-52652 affects specific versions of the Linux kernel, particularly those prior to 5.10.223-1 and including various Debian packages.
The impact of CVE-2023-52652 is a potential name leak in ntb_register_device() that could expose sensitive information.
CVE-2023-52652 was disclosed alongside fixes in the Linux kernel for vulnerabilities related to device registration.