U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2023-52664 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: net: atlantic: eliminate double free in error handling logic Driver has a logic leak in ring data allocation/free, where aq_ring_free could be called multiple times on same ring, if system is under stress and got memory allocation error. Ring pointer was used as an indicator of failure, but this is not correct since only ring data is allocated/deallocated. Ring itself is an array member. Changing ring allocation functions to return error code directly. This simplifies error handling and eliminates aq_ring_free on higher layer.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/0edb3ae8bfa31cd544b0c195bdec00e036002b5d
https://git.kernel.org/stable/c/0edb3ae8bfa31cd544b0c195bdec00e036002b5d
https://git.kernel.org/stable/c/b3cb7a830a24527877b0bc900b9bd74a96aea928
https://git.kernel.org/stable/c/b3cb7a830a24527877b0bc900b9bd74a96aea928
https://git.kernel.org/stable/c/c11a870a73a3bc4cc7df6dd877a45b181795fcbf
https://git.kernel.org/stable/c/c11a870a73a3bc4cc7df6dd877a45b181795fcbf
https://git.kernel.org/stable/c/d1fde4a7e1dcc4d49cce285107a7a43c3030878d
https://git.kernel.org/stable/c/d1fde4a7e1dcc4d49cce285107a7a43c3030878d

Weakness Enumeration

CWE-ID CWE Name Source

Change History

3 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2023-52664
NVD Published Date:
05/17/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org